Behavioral task
behavioral1
Sample
231e4be9369ec57d9f6a4c7272548cbd3328d69eaf3caad8794abd3932e34145.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
231e4be9369ec57d9f6a4c7272548cbd3328d69eaf3caad8794abd3932e34145.xls
Resource
win10v2004-20240802-en
General
-
Target
231e4be9369ec57d9f6a4c7272548cbd3328d69eaf3caad8794abd3932e34145
-
Size
33KB
-
MD5
82c31095340cacb356ca227fb658b236
-
SHA1
31c99e7861bba12ea645d4ccdcdc77c262d93db4
-
SHA256
231e4be9369ec57d9f6a4c7272548cbd3328d69eaf3caad8794abd3932e34145
-
SHA512
d78a78d2ec63561df35b4cef292224f858cb4ce63a7fd2745938d3dffb7e5363e2106646d092296427626b883fd9f1262ddb22ba6ca22df5f95f8aaf347ca04b
-
SSDEEP
768:xcfpHk3hbdlylKsgqopeJBWhZFGkE+cL/xGRxsjZveYWB4MIbhEB47O7n25Q:Exk3hbdlylKsgqopeJBWhZFGkE+cL/xI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
231e4be9369ec57d9f6a4c7272548cbd3328d69eaf3caad8794abd3932e34145.xls windows office2003