Behavioral task
behavioral1
Sample
986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213.xls
Resource
win10v2004-20241007-en
General
-
Target
986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213
-
Size
122KB
-
MD5
2136126af329fdbbe2daa91c818cf987
-
SHA1
dea8921d1758aacb5a55d804280a8f0f089278ff
-
SHA256
986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213
-
SHA512
2d264fa369b07ab69c8843502b1e6adaf2a8dfd4f85cafb6f58893761895bf6546e25729d5e6a149b3787f3cc4f0c22e82867c1468223d8944757dd4ab585d4d
-
SSDEEP
3072:YOehv7q2Pjx45uoDGTj+5xtekEvi8/dgZBFoTLTmxW5WxVe+41WsdiXUchlL:xehv7q2Pjx45uoDGTj+5xtFEvi8/dgZ3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213.xls windows office2003
GsreG4hts9id8
rs5udfdreh
serh3wdrttTS4
hDStysh4oeed