Behavioral task
behavioral1
Sample
4554e0aa9b3aad1f639878ee75979180ab75e440f22d2ba9f35b2db187d4d1a8.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4554e0aa9b3aad1f639878ee75979180ab75e440f22d2ba9f35b2db187d4d1a8.xls
Resource
win10v2004-20221111-en
General
-
Target
4554e0aa9b3aad1f639878ee75979180ab75e440f22d2ba9f35b2db187d4d1a8.xlsx
-
Size
718KB
-
MD5
df0fb45aa93dd372dfa2ae1770097833
-
SHA1
706617479afdcd5024adccad4ebe8501ac56debf
-
SHA256
4554e0aa9b3aad1f639878ee75979180ab75e440f22d2ba9f35b2db187d4d1a8
-
SHA512
156a2e99b6bb512e397f4bdf8f0616f95e9186c312751f7f373d83e3121e88cc21581484ad458036784e721b3b84ed57fd0b8b219a83a466c95177f918a83b5b
-
SSDEEP
12288:OMY0YUIMw0qByNmXoq/Dotm3jRJcXTQv1G2DqB8LyVsG16U4CDGA2Wfg1ow9dOAR:OMY0YUIMZqUNmXoqrotm3jRJcXTQv1G
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4554e0aa9b3aad1f639878ee75979180ab75e440f22d2ba9f35b2db187d4d1a8.xlsx.xls .xlsx windows office2003
Kangatang
ThisWorkbook