Behavioral task
behavioral1
Sample
41a8c68cd1a82e14fb7632aa5507c977767829a4cd6e045d1cfec13be130a600.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
41a8c68cd1a82e14fb7632aa5507c977767829a4cd6e045d1cfec13be130a600.xls
Resource
win10v2004-20240508-en
General
-
Target
41a8c68cd1a82e14fb7632aa5507c977767829a4cd6e045d1cfec13be130a600
-
Size
58KB
-
MD5
80428e1ac76ae4774fb9631508b81651
-
SHA1
6f75fb71bb004571e78e7c31246cfce35dd31ca9
-
SHA256
41a8c68cd1a82e14fb7632aa5507c977767829a4cd6e045d1cfec13be130a600
-
SHA512
e756a388fd5204ea19e714647f337abd688836584ccd5fd3ab11e240487013680ba7cc69036aedb919dfad8838bf635b835e58a1f6afbe2d18b0c01e823b4522
-
SSDEEP
1536:uMcHVYmKXuMOWZIQyNtLcR+8sB7GWDpfctumTH+oWyweL:uMcHVYmKXuMOWZIQyNtLcR+8sB7GWDpg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
41a8c68cd1a82e14fb7632aa5507c977767829a4cd6e045d1cfec13be130a600.xls windows office2003
Kangatang