Behavioral task
behavioral1
Sample
ef05c4b8b1b237d149dc921ef44f3cb6683288ced8a48e74c3e2dae79b655d96.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ef05c4b8b1b237d149dc921ef44f3cb6683288ced8a48e74c3e2dae79b655d96.xls
Resource
win10v2004-20240508-en
General
-
Target
ef05c4b8b1b237d149dc921ef44f3cb6683288ced8a48e74c3e2dae79b655d96
-
Size
58KB
-
MD5
d599ca37013077ff78825ff6896e7b89
-
SHA1
f39ce266b5b5adf65b95deac5e8a370655bb8786
-
SHA256
ef05c4b8b1b237d149dc921ef44f3cb6683288ced8a48e74c3e2dae79b655d96
-
SHA512
6546abad9d84eab419b39931e5787ad4454ef97a6500c7a6e36cd928dd70600592c503bad4c3eba3938eb219f5ea96a2f9ed5376a41b65f7d3eb6c36d8ab121d
-
SSDEEP
1536:LbcHVYmKXuMOWZIQyNtLcR+8sB7GWDpfctumTH+oWyweL:LbcHVYmKXuMOWZIQyNtLcR+8sB7GWDpg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ef05c4b8b1b237d149dc921ef44f3cb6683288ced8a48e74c3e2dae79b655d96.xls windows office2003
Kangatang