Behavioral task
behavioral1
Sample
4a5fc0a798f5d5adfb3f7c57029cdbc326f315f4ac2585a488f5e389a079a553.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4a5fc0a798f5d5adfb3f7c57029cdbc326f315f4ac2585a488f5e389a079a553.xls
Resource
win10v2004-20241007-en
General
-
Target
4a5fc0a798f5d5adfb3f7c57029cdbc326f315f4ac2585a488f5e389a079a553
-
Size
154KB
-
MD5
5e6f865e27224cbd47b6cbfe7fb5c771
-
SHA1
1bb70583ee521fd4b7d12941b65ddd9abf24e205
-
SHA256
4a5fc0a798f5d5adfb3f7c57029cdbc326f315f4ac2585a488f5e389a079a553
-
SHA512
652ee4d3a677ca41f3fdb89d3831f334c536047c34423833fbec04ac15b850510fa424006e9092b5d0da282653ca8dfd59779fba2022c9fe2f984b96840c1d49
-
SSDEEP
3072:YKGxEtjPOtioVjDGUU1qfDlaGGx+ckR0Ox+IfqozW4WZ0sB83hl+Qs:YNxEtjPOtioVjDGUU1qfDlavx+xRnx+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4a5fc0a798f5d5adfb3f7c57029cdbc326f315f4ac2585a488f5e389a079a553.xls windows office2003
Kangatang