Behavioral task
behavioral1
Sample
39b3310c9d4cb3605c45e84d45298980c6386f07924dee7aff0d2cebba130093.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
39b3310c9d4cb3605c45e84d45298980c6386f07924dee7aff0d2cebba130093.xls
Resource
win10v2004-20240226-en
General
-
Target
39b3310c9d4cb3605c45e84d45298980c6386f07924dee7aff0d2cebba130093
-
Size
55KB
-
MD5
92d597811e8790cd7abc01ed484822f7
-
SHA1
13a7bec97ca0a53e70314b2f5e00b5e99ec8d5bb
-
SHA256
39b3310c9d4cb3605c45e84d45298980c6386f07924dee7aff0d2cebba130093
-
SHA512
6f57f1ccfac8a08451cdf272c1f2aeefd84b006aabb0f8648ddcd3b84c05497cc96234f84165e96b6cc93aaf189db257bf751ca40624a080c853b8e258f3b8de
-
SSDEEP
384:NM8GbzHxC/9ziytiyiS9aKLGyEg/Xk8pQgBqbuRr42s8vF+m+d3AFnAaUmAo1puf:NM8GEziytiGLQOGYqKS8vsmgixM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
39b3310c9d4cb3605c45e84d45298980c6386f07924dee7aff0d2cebba130093.xls windows office2003
Kangatang
ThisWorkbook