Behavioral task
behavioral1
Sample
9a1af2050a49760945233921e1010556.xls
Resource
win7-20220812-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
9a1af2050a49760945233921e1010556.xls
Resource
win10v2004-20221111-en
5 signatures
150 seconds
General
-
Target
9a1af2050a49760945233921e1010556
-
Size
145KB
-
MD5
9a1af2050a49760945233921e1010556
-
SHA1
7c0534924c47774d0fd261d2f020b2f9cad896bf
-
SHA256
cc68db187da2ca511d766152347db40abb59df13c576dc0a3fdff718454690ce
-
SHA512
6d92ec1319ac809b2e81567457ba9f4810ac331b0349328c490bc3af12a1b028792ebc878aa25ffc7cd452f625f0501ff9a2a2bd684f61a1e04a1d6322a83e92
-
SSDEEP
1536:s0mf31n5ejezeneyeVe9enekdxDkebc5ejezeneyeVe9enekdxDkebcQyyQyPCJ/:+9pyQrYw3Pqh+duRKvWblptTBa
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9a1af2050a49760945233921e1010556.xls windows office2003
Kangatang
ThisWorkbook