Behavioral task
behavioral1
Sample
9d0ad5152c72fb02e73d0b947ba913753db46cf25549c97651233969a12d4d12.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d0ad5152c72fb02e73d0b947ba913753db46cf25549c97651233969a12d4d12.xls
Resource
win10v2004-20241007-en
General
-
Target
9d0ad5152c72fb02e73d0b947ba913753db46cf25549c97651233969a12d4d12
-
Size
67KB
-
MD5
6674d4a1309f96c4758577f0265e034c
-
SHA1
be61fbb9cfb14bd590032938450047fd7edaf5d3
-
SHA256
9d0ad5152c72fb02e73d0b947ba913753db46cf25549c97651233969a12d4d12
-
SHA512
e53d7255adbc34a2909e0a942fc1404da9273c2f153ddf6816e940c587e90ffb32e00bfb5e1aa83949bc8aec1e774c9671c987af3e386bd7c7c3c39cff177c8e
-
SSDEEP
768:nbKZnzhbQRizju/ho+No/Rcc5Z5K8F8ds53C5s5U6O:netzhb2izjupE78dV5s5U6O
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9d0ad5152c72fb02e73d0b947ba913753db46cf25549c97651233969a12d4d12.xls windows office2003