Behavioral task
behavioral1
Sample
27f3a9e108b1a9aafa119a905edd4abd193573e2e5a7d7af8e913eda86a10e6d.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27f3a9e108b1a9aafa119a905edd4abd193573e2e5a7d7af8e913eda86a10e6d.xls
Resource
win10v2004-20240802-en
General
-
Target
27f3a9e108b1a9aafa119a905edd4abd193573e2e5a7d7af8e913eda86a10e6d
-
Size
70KB
-
MD5
60f1fd21082469f7755886f13ec6f0f2
-
SHA1
cc8deba238770ad727193a85bdb8d417f1adb6da
-
SHA256
27f3a9e108b1a9aafa119a905edd4abd193573e2e5a7d7af8e913eda86a10e6d
-
SHA512
8e2a17910a3ab8fa0b2929b453367df85d2c4b06b62edb511018821dd78c03802419efb2d29857e206ce01275fab589201a6fda780853683cf4fca2085d2937e
-
SSDEEP
1536:N318Hk3dS9cW5y1EXyr48LvH/7MOTzrjlEsVYem68quqJ3brs3EP5cxDu0N83iG:NiHk3dS9cW5y1EXyr48LvH/7MOTzrjl5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
27f3a9e108b1a9aafa119a905edd4abd193573e2e5a7d7af8e913eda86a10e6d.xls windows office2003