Behavioral task
behavioral1
Sample
e5ac17133592fbfe103d8879d9dccdd56041151c98099cea947f96c3b7a199bd.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e5ac17133592fbfe103d8879d9dccdd56041151c98099cea947f96c3b7a199bd.xls
Resource
win10v2004-20240802-en
General
-
Target
e5ac17133592fbfe103d8879d9dccdd56041151c98099cea947f96c3b7a199bd
-
Size
32KB
-
MD5
a268b64d2e5c2a078a4a5ad33b00291a
-
SHA1
4a37e3d8542b752fa2df51b315101cdfc9badc6e
-
SHA256
e5ac17133592fbfe103d8879d9dccdd56041151c98099cea947f96c3b7a199bd
-
SHA512
8f1e819f05c709b743b4ad76a3aecf54c8dfc108ea5756439cb7bfc78a2f1c3f533617b89dffe3086470a0fc0c8017b72bf0f49abb0f3445e9b184935e9cb994
-
SSDEEP
768:GKO3vT2W+lsSIH1hkWxZKxyZxggmAd+56OZpiD68s33wqAKlutISo2B5N50P2FUz:GKO1SIH1bxZKxywgmAd+tZpiD68s33wJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e5ac17133592fbfe103d8879d9dccdd56041151c98099cea947f96c3b7a199bd.xls windows office2003