Behavioral task
behavioral1
Sample
5ecb58bbf85004c86fe7b6b0c75885c16b8d0e5da4b2c84704535437e7019baf.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5ecb58bbf85004c86fe7b6b0c75885c16b8d0e5da4b2c84704535437e7019baf.xls
Resource
win10v2004-20241007-en
General
-
Target
5ecb58bbf85004c86fe7b6b0c75885c16b8d0e5da4b2c84704535437e7019baf
-
Size
82KB
-
MD5
916c96b99c73cc205459d436442020c8
-
SHA1
75d05f41691bfc709d8a3fc34490e80a58e072e6
-
SHA256
5ecb58bbf85004c86fe7b6b0c75885c16b8d0e5da4b2c84704535437e7019baf
-
SHA512
e564f9a56656cd26d82f9e4c3730b577a09c97f308942104b82554b9c50d615accae284da41962b93841cb73c6dd334b94595c3e08cf2601dabf1c74b88bceee
-
SSDEEP
1536:HDevTk3hbdlylKsgqopeJBWhZFGkE+kDax904PX/vX/Pv8TiVYUelh2m8i:HDevTk3hbdlylKsgqopeJBWhZFGkE+kD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
5ecb58bbf85004c86fe7b6b0c75885c16b8d0e5da4b2c84704535437e7019baf.xls windows office2003