Behavioral task
behavioral1
Sample
ab9207ddcb8681fa4d4f8233832529fb2578cd427fd0d02d9cd9250b327cd078.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab9207ddcb8681fa4d4f8233832529fb2578cd427fd0d02d9cd9250b327cd078.xls
Resource
win10v2004-20240802-en
General
-
Target
ab9207ddcb8681fa4d4f8233832529fb2578cd427fd0d02d9cd9250b327cd078
-
Size
51KB
-
MD5
edc866f7afb89d4ca93257151a62231f
-
SHA1
04ec168cf24b96679c6eecd770138c3358ff58d5
-
SHA256
ab9207ddcb8681fa4d4f8233832529fb2578cd427fd0d02d9cd9250b327cd078
-
SHA512
d6517adaebcbc83b808643e3db2785e11608efca324094b08d88502147aeb2c8820d7bb907311dc8a9fa7a2c8f4925c706249cfa45c8ded29287a66511c76ca1
-
SSDEEP
1536:Wlk3hOdsylKlgryzc4bNhZFGzE+kD/gEAwh4o+Yj5aJViCydw+RpodTba:Wlk3hOdsylKlgryzc4bNhZFGzE+kD/gy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ab9207ddcb8681fa4d4f8233832529fb2578cd427fd0d02d9cd9250b327cd078.xls windows office2003