Behavioral task
behavioral1
Sample
6e401f8d73098a02ea751a468ec52037b07540d16e27389d1b10e064a7ed8f34.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e401f8d73098a02ea751a468ec52037b07540d16e27389d1b10e064a7ed8f34.xls
Resource
win10v2004-20241007-en
General
-
Target
6e401f8d73098a02ea751a468ec52037b07540d16e27389d1b10e064a7ed8f34
-
Size
150KB
-
MD5
5071ddd6611af850ec9c2e416e967ab2
-
SHA1
2c92a10b5128c3434d1644d434410b8531479d33
-
SHA256
6e401f8d73098a02ea751a468ec52037b07540d16e27389d1b10e064a7ed8f34
-
SHA512
e3a802107ed940b74ca97b08d0fa9910e38b73a2d536346495e947ea5ed692d6c14b5e41956ffbc922d9b2b0b6c617f42f9aa7d4fe7830f02bf0a923948e4982
-
SSDEEP
3072:ZcKoSsxzNDZLDZjlbR868O8KlVH3dehvMqAPjxO5xyZUE5V5xtezEVg8/dgDGx0g:ZcKoSsxzNDZLDZjlbR868O8KlVH3dehq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6e401f8d73098a02ea751a468ec52037b07540d16e27389d1b10e064a7ed8f34.xls windows office2003
gDFt4etujSDssdf
dfkj3ghrksldjkgf
bDSFgs4ysustjshgs
fgkwjkFGzaxd