Behavioral task
behavioral1
Sample
c301bf758cabf33e519fa6f13ab1a32cb3f60f62121a9ed4dc47eb8430b3bf90.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c301bf758cabf33e519fa6f13ab1a32cb3f60f62121a9ed4dc47eb8430b3bf90.xls
Resource
win10v2004-20240802-en
General
-
Target
c301bf758cabf33e519fa6f13ab1a32cb3f60f62121a9ed4dc47eb8430b3bf90
-
Size
76KB
-
MD5
b0c2173296ac42c02d7b337a16a20dd4
-
SHA1
d8f2e14faa2bef2786b32bd7f5ecf60411f336b9
-
SHA256
c301bf758cabf33e519fa6f13ab1a32cb3f60f62121a9ed4dc47eb8430b3bf90
-
SHA512
def5dbfe4522ad299459119d65cce98d5e92553707671c3925cf0fdf644a7a792c3d75af6b17f19ee1e04a1c4a4cecc8f954ac904e8ff4a604b88f5df24c75f2
-
SSDEEP
1536:RzxEtjPOtioVjDGUU1qfDlaGGx+cWgLI0dAk6s+eqlqn85L:RzxEtjPOtioVjDGUU1qfDlaGGx+cWgLB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c301bf758cabf33e519fa6f13ab1a32cb3f60f62121a9ed4dc47eb8430b3bf90.xls windows office2003