Behavioral task
behavioral1
Sample
75c2d4c330eac5c23f9848f7fe7efb5606feeaed9ac856d4ab4062d61523f803.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
75c2d4c330eac5c23f9848f7fe7efb5606feeaed9ac856d4ab4062d61523f803.xls
Resource
win10v2004-20241007-en
General
-
Target
75c2d4c330eac5c23f9848f7fe7efb5606feeaed9ac856d4ab4062d61523f803
-
Size
122KB
-
MD5
316cbded4130613ed2b096a562108966
-
SHA1
46828254f96c15dc18c02322e950187791df27ea
-
SHA256
75c2d4c330eac5c23f9848f7fe7efb5606feeaed9ac856d4ab4062d61523f803
-
SHA512
8d32bcc6ec3cea0860839a042d9471ff923bf5b06f1ad68011bce0dd18075023a21e52f8c3ce112130983060909e6b88b210a5a6a50f08737af3f5f70a68a151
-
SSDEEP
3072:9Oehv7q2Pjx45uoDGTj+5xtekEvi8/dgZBFoTLTmxW5WxVe+41WsdiXUchlL:Qehv7q2Pjx45uoDGTj+5xtFEvi8/dgZ3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
75c2d4c330eac5c23f9848f7fe7efb5606feeaed9ac856d4ab4062d61523f803.xls windows office2003
GsreG4hts9id8
rs5udfdreh
serh3wdrttTS4
hDStysh4oeed