Behavioral task
behavioral1
Sample
ad80c5232e6cbccd491efdec9760718e.xls
Resource
win7-20221111-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad80c5232e6cbccd491efdec9760718e.xls
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
ad80c5232e6cbccd491efdec9760718e
-
Size
40KB
-
MD5
ad80c5232e6cbccd491efdec9760718e
-
SHA1
0bf86ae291b9114d300f8171bb0750e7cf5eb30e
-
SHA256
e7ea5fb4ac575761fe26a4d473eeac9931067557b790b5e48450f58345fc28d7
-
SHA512
42f87399593a12197b48c9e57222a07ccb9b3940d6ff37abf188c679bbac62c71cca19e2c27af4dfceb27c634e74c3ce75dc30dc2ff51d2e1c07a28d6f564ba5
-
SSDEEP
384:u+pfvqufC/9zibrnG+vDTGFiSV0UO7E3C2t06XZX8888FgNo0DDeSflxmL1Ixzu:vvquqzibrnG+bTeOiCF6XZlwfl++zu
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ad80c5232e6cbccd491efdec9760718e.xls windows office2003
Kangatang
ThisWorkbook