Behavioral task
behavioral1
Sample
8eb55e5974d2c6c245e0c5326f6cb158b05a6bee3ea54672e459b05bb7d6be5f.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8eb55e5974d2c6c245e0c5326f6cb158b05a6bee3ea54672e459b05bb7d6be5f.xls
Resource
win10v2004-20240802-en
General
-
Target
8eb55e5974d2c6c245e0c5326f6cb158b05a6bee3ea54672e459b05bb7d6be5f
-
Size
80KB
-
MD5
54624e78400719095444eb564f88e244
-
SHA1
a8966e7ba9835d16eb0424c0c1c5237f64dfad64
-
SHA256
8eb55e5974d2c6c245e0c5326f6cb158b05a6bee3ea54672e459b05bb7d6be5f
-
SHA512
3e4ec3658715772152cad653e18ba22302c4c7729338c5d679b4fd0e6883a6be3b20836170b00129612d2e648f7c90f999a66bb96d14486854adfaa7c9cba6f7
-
SSDEEP
768:FZkYFwihSleLmkijfvWp2vhePuVVHDDoU88NewAp40qmlQ0Q4oQdum8io:lwihS5vqYvhePUdSOew3rNV4Fum8io
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8eb55e5974d2c6c245e0c5326f6cb158b05a6bee3ea54672e459b05bb7d6be5f.xls windows office2003