Behavioral task
behavioral1
Sample
c8fbe23ff45ddd5706df269a8a93d902eff3933c1c565c58f5ae730f9c50336d.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c8fbe23ff45ddd5706df269a8a93d902eff3933c1c565c58f5ae730f9c50336d.xls
Resource
win10v2004-20241007-en
General
-
Target
c8fbe23ff45ddd5706df269a8a93d902eff3933c1c565c58f5ae730f9c50336d
-
Size
927KB
-
MD5
486c0e21ebdf2996818e2a7288d9112d
-
SHA1
58aa1c81fcc16c5a9a5c7eea5ae9b6ce264f9b20
-
SHA256
c8fbe23ff45ddd5706df269a8a93d902eff3933c1c565c58f5ae730f9c50336d
-
SHA512
e54d12681b4ee2e4912d8a97b25ad0fbfbd182ac10b2719eb3d34faf34797aaeb687d7b595754b5a926377b60dbe4d2bfa543b09003f16b2576cfaa230c5bd89
-
SSDEEP
12288:v7vmwAeTeZJlQlRmtwh7HvtDyNzE0AncNcNEp:CeTe2lRmtwRcw0AcNcNS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c8fbe23ff45ddd5706df269a8a93d902eff3933c1c565c58f5ae730f9c50336d.xls windows office2003