Behavioral task
behavioral1
Sample
001b78b5fecc2878bc4d8ca7411887ebbaf68acba81bba10704587e2b2ad411e.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
001b78b5fecc2878bc4d8ca7411887ebbaf68acba81bba10704587e2b2ad411e.xls
Resource
win10v2004-20240802-en
General
-
Target
001b78b5fecc2878bc4d8ca7411887ebbaf68acba81bba10704587e2b2ad411e
-
Size
730KB
-
MD5
0b74aea4b742b03549653e8a53859c5e
-
SHA1
99f8b1b39c41eee4a21defaed093887565b87260
-
SHA256
001b78b5fecc2878bc4d8ca7411887ebbaf68acba81bba10704587e2b2ad411e
-
SHA512
df33a9d2d6072bbe9973d3443fefcdf203ed24d435f1422776d36e501598529fa6796bf79345379933d6e01081a168b853c91a1e784ef8e13c74dda7cec1e482
-
SSDEEP
12288:pak57U75XTEYSyzLGNKWeAF6PdW/NjppwEj2jjYgGOjjRrHS3pwpt:pak5Y5XTjzLGreAppwZ23pwp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
001b78b5fecc2878bc4d8ca7411887ebbaf68acba81bba10704587e2b2ad411e.xls windows office2003