Behavioral task
behavioral1
Sample
b43cb7984dae79ce6776823b5fd0565dc8641f4eb5976f2f25afa930e40a0590.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b43cb7984dae79ce6776823b5fd0565dc8641f4eb5976f2f25afa930e40a0590.xls
Resource
win10v2004-20240508-en
General
-
Target
b43cb7984dae79ce6776823b5fd0565dc8641f4eb5976f2f25afa930e40a0590
-
Size
68KB
-
MD5
b5ff784a9dfa4babea90dc49a72e3850
-
SHA1
4af1ad083a5de70fd5c75f9b0542aee0ec32395e
-
SHA256
b43cb7984dae79ce6776823b5fd0565dc8641f4eb5976f2f25afa930e40a0590
-
SHA512
95b1061eae0d657607d061c33ead4a444771ed31c123f94ff1ce705673f2211fefe20859b954c3466875afee26328114b60c4fa2643c0f3bafec12d89b2780c2
-
SSDEEP
1536:0hHrYmKXuMOWZIQyNtLcR+8sB7GWDpfctumTn+ZWypeLXqFKza83:0hHrYmKXuMOWZIQyNtLcR+8sB7GWDpf0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
b43cb7984dae79ce6776823b5fd0565dc8641f4eb5976f2f25afa930e40a0590.xls windows office2003
Kangatang
ThisWorkbook