Behavioral task
behavioral1
Sample
49f45fc3201889cae948c0ab2b55e030.xls
Resource
win7-20221111-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
49f45fc3201889cae948c0ab2b55e030.xls
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
49f45fc3201889cae948c0ab2b55e030
-
Size
155KB
-
MD5
49f45fc3201889cae948c0ab2b55e030
-
SHA1
8ecd95359c094f42de80bef908351921e8b49b1f
-
SHA256
bbd26e0a1e3dd92737cc5b767f86d27a50d7f5e429001b14a815659f85c9b512
-
SHA512
df06c0af8e4a29e4d8d9f350e8c90dd4fa8943fe4a78cdc02cbb1dd1e24c268ea8585033fc8c1bbfd9beb5ae26d488a117c15969b675f95edd9c369262da95b9
-
SSDEEP
3072:32k3hOdsylKlgryzc4bNhZFGzE+cLgLg0dRu7lOUKFPibKGBT+lUrxnoQ:Gk3hOdsylKlgryzc4bNhZF+E+WgLg0dJ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
49f45fc3201889cae948c0ab2b55e030.xls windows office2003
Kangatang
ThisWorkbook