Behavioral task
behavioral1
Sample
ba8c48e5c781d9922adace2de522a0e01b56095a0882e59d9b12cb3ed3987507.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ba8c48e5c781d9922adace2de522a0e01b56095a0882e59d9b12cb3ed3987507.xls
Resource
win10v2004-20240426-en
General
-
Target
ba8c48e5c781d9922adace2de522a0e01b56095a0882e59d9b12cb3ed3987507
-
Size
11.4MB
-
MD5
40504f3ba1fd16508abb541ff7f16d5a
-
SHA1
0599a0f9e4a1b98b67eb05f02ef2f62a918313d4
-
SHA256
ba8c48e5c781d9922adace2de522a0e01b56095a0882e59d9b12cb3ed3987507
-
SHA512
4d8c5390ecd99cb62a4df710b48d93d0485d1cf056ea0e2f51fc1ed6223001703de412b290c3d34866b46dfd81a9c1416bc2621789500af7c4042b942aaeebdf
-
SSDEEP
49152:Bcf8NE3n7oChZ6O+si12K2in+daDPU1JQk/f4:UN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ba8c48e5c781d9922adace2de522a0e01b56095a0882e59d9b12cb3ed3987507.xls windows office2003
Kangatang
Kangatang_2
Kangatang_3
Kangatang_4
Kangatang_5
Kangatang_6
Kangatang_7
Kangatang_8
Kangatang_9
Kangatang_10
Kangatang_11
Kangatang_12
Kangatang_13
Kangatang_14
Kangatang_15
Kangatang_16
Kangatang_17
Kangatang_18
Kangatang_19
Kangatang_20
Kangatang_21
Kangatang_22
Kangatang_23
Kangatang_24
Kangatang_25
Kangatang_26
Kangatang_27
Kangatang_28
Kangatang_29
Kangatang_30
Kangatang_31
Kangatang_32
Kangatang_33
Kangatang_34
Kangatang_35
Kangatang_36
Kangatang_37
Kangatang_38
Kangatang_39
Kangatang_40
Kangatang_41
Kangatang_42
Kangatang_43
Kangatang_44
Kangatang_45
Kangatang_46
Kangatang_47
Kangatang_48
Kangatang_49
Kangatang_50
Kangatang_51
Kangatang_52
Kangatang_53
Kangatang_54