Behavioral task
behavioral1
Sample
0bf30705a5b8697baf8cf6bfb16fa9317b3d2ff35a45e5108241e384ad5f788c.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0bf30705a5b8697baf8cf6bfb16fa9317b3d2ff35a45e5108241e384ad5f788c.xls
Resource
win10v2004-20240802-en
General
-
Target
0bf30705a5b8697baf8cf6bfb16fa9317b3d2ff35a45e5108241e384ad5f788c
-
Size
812KB
-
MD5
8ea55a853e134f1e6b3b871d42fe6398
-
SHA1
476a23b2269f0bbdeb8226d0bc549640c15c1196
-
SHA256
0bf30705a5b8697baf8cf6bfb16fa9317b3d2ff35a45e5108241e384ad5f788c
-
SHA512
51d89df0207b71495267d85393d5f09c76a9f7f82f41c8a35e831d0c07f94110da37460ce6c059eaa1eed5144856c168e2d8622b822a3bd125c801df5c6838be
-
SSDEEP
6144:0YHsoyFIp5SqUrzNSXY+yLEMN6kwFFUrNxF2Mw7ahxYG8XsTd+xH/YIV6sGaGCSD:Yx3pO/EMGLutR6BFl20MU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0bf30705a5b8697baf8cf6bfb16fa9317b3d2ff35a45e5108241e384ad5f788c.xls windows office2003