Behavioral task
behavioral1
Sample
73d4bebe0791a4c51bea6960f359f4fbd1cc56de1f3783b3eea8aa033d96dae5.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
73d4bebe0791a4c51bea6960f359f4fbd1cc56de1f3783b3eea8aa033d96dae5.xls
Resource
win10v2004-20241007-en
General
-
Target
73d4bebe0791a4c51bea6960f359f4fbd1cc56de1f3783b3eea8aa033d96dae5
-
Size
30KB
-
MD5
13c70ac6126b805147389e89b63abb3e
-
SHA1
f238cc6afbcbb46aa4c90d05cbde9aaed12ccb7a
-
SHA256
73d4bebe0791a4c51bea6960f359f4fbd1cc56de1f3783b3eea8aa033d96dae5
-
SHA512
2aed61410dc84505073bb90a27b53f332fd3c276b785181f874f1cc8882fcc13425745fbe51d5d3c165ca87de0b3efb3223e310d6d8adb4400f285a2e4878b5d
-
SSDEEP
768:qYlSFsv66g3KnF439NKC54kkGfn+cL2XdA87wruPh+tCQmX6H8:hSFsv66g3KnF439NKC54kkGfn+cL2Xd0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
73d4bebe0791a4c51bea6960f359f4fbd1cc56de1f3783b3eea8aa033d96dae5.xls windows office2003