Behavioral task
behavioral1
Sample
6e71e5cd702fb57472fb10764eb6f745b068baa00df958ab73c7bb2988e33e5d.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6e71e5cd702fb57472fb10764eb6f745b068baa00df958ab73c7bb2988e33e5d.xls
Resource
win10v2004-20240802-en
General
-
Target
6e71e5cd702fb57472fb10764eb6f745b068baa00df958ab73c7bb2988e33e5d
-
Size
47KB
-
MD5
cf5c74b7fda5fac58b190f8bb7da93cf
-
SHA1
b22c015b4156c22261cbc292e81526ff626751b2
-
SHA256
6e71e5cd702fb57472fb10764eb6f745b068baa00df958ab73c7bb2988e33e5d
-
SHA512
49e57c67fc0cf00fe25796e7ea31066fff8923c425185a1a007bea0640e105dfb7f027507c3633181ca34f18a29115a72074825c448eec595bd4bc80434d48f4
-
SSDEEP
768:tn8xEtjPOtioVjDGUU1qfDlaGGx+cL+LIfdAWkpGfyuexEFHD7bGlPkEXMJxF:t8xEtjPOtioVjDGUU1qfDlaGGx+cL+La
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6e71e5cd702fb57472fb10764eb6f745b068baa00df958ab73c7bb2988e33e5d.xls .ps1 windows office2003 polyglot
ThisWorkbook
Sheet1