Behavioral task
behavioral1
Sample
bc30c09358f62a09077a23d59a1434344948eb5280f692f05d0609a4bce641cc.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc30c09358f62a09077a23d59a1434344948eb5280f692f05d0609a4bce641cc.xls
Resource
win10v2004-20241007-en
General
-
Target
bc30c09358f62a09077a23d59a1434344948eb5280f692f05d0609a4bce641cc
-
Size
318KB
-
MD5
7d2226bad6557ff98eadc3e3afc6c420
-
SHA1
b90b7745c5e97489b68709b959d5f6ff3351e987
-
SHA256
bc30c09358f62a09077a23d59a1434344948eb5280f692f05d0609a4bce641cc
-
SHA512
a086d510e4dfb9056e09250d4236dbf490966f12f5e013be8e8f9e06db407a9279c8f2166f83639da42676c1246472b55ffeda59479facc0d2471becc9079665
-
SSDEEP
6144:30k3hOdsylKlgryzc4bNhZF+E+gagHA+xVScHmrwXai6YXFDOVj1k1MgQzA+um4i:Rrv34gOc8H
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bc30c09358f62a09077a23d59a1434344948eb5280f692f05d0609a4bce641cc.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Module1
Kangatang