Behavioral task
behavioral1
Sample
0f1a84d3e0225535ab4e3a0628f98140d124645924a6b01ad595804c964ed7fb.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f1a84d3e0225535ab4e3a0628f98140d124645924a6b01ad595804c964ed7fb.xls
Resource
win10v2004-20240802-en
General
-
Target
0f1a84d3e0225535ab4e3a0628f98140d124645924a6b01ad595804c964ed7fb
-
Size
691KB
-
MD5
3331fe02d46e585c5c5a0d30ea8b159a
-
SHA1
57c2abb450940b1953ffd0561aef9b0a0b018be5
-
SHA256
0f1a84d3e0225535ab4e3a0628f98140d124645924a6b01ad595804c964ed7fb
-
SHA512
fef4729c608d926442ad9f5c7555743feeba1f8f684130b0a7d47558440dde0be06dacba31534ded49368313e58434036d760e56dc35b6d61eba306f0985c0bf
-
SSDEEP
6144:fXGSLClloZMLG9ezF44uc+HHLeBUGApDlXg1mHgRTZ/dw+K3V0zNgEhj:z3V0zNgA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0f1a84d3e0225535ab4e3a0628f98140d124645924a6b01ad595804c964ed7fb.xls windows office2003
Kangatang