Behavioral task
behavioral1
Sample
1433572a9a905fee1acb7bea68986d69f49086a2bda714780092708fe4563b4e.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1433572a9a905fee1acb7bea68986d69f49086a2bda714780092708fe4563b4e.xls
Resource
win10v2004-20240802-en
General
-
Target
1433572a9a905fee1acb7bea68986d69f49086a2bda714780092708fe4563b4e
-
Size
134KB
-
MD5
13a4324755af6532bc25730e2215a6c8
-
SHA1
06769f89d510af62d65ee6a8f97d718686e6e0e7
-
SHA256
1433572a9a905fee1acb7bea68986d69f49086a2bda714780092708fe4563b4e
-
SHA512
4909ce4db072f1c61e49e4bf2db5034b838ee13ec8db24c52fba82f4630f70d668f80a323c44f52082c7090bbea820261576ba4f95f5ae911adb0e260626d459
-
SSDEEP
3072:jcKoSsxzNDZLDZjlbR868O8KlVH3jehvMqAPjxO5xyZUE5V5xtezEVg8/dg4Gx0G:jcKoSsxzNDZLDZjlbR868O8KlVH3jehn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1433572a9a905fee1acb7bea68986d69f49086a2bda714780092708fe4563b4e.xls windows office2003
DFsheklsrfHDf
HDsfgRds4htkde