Behavioral task
behavioral1
Sample
22c32b601fdae5d763b80ebe3219d81520930795f7f4ca90aa5f202e1027d51a.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
22c32b601fdae5d763b80ebe3219d81520930795f7f4ca90aa5f202e1027d51a.xls
Resource
win10v2004-20240426-en
General
-
Target
22c32b601fdae5d763b80ebe3219d81520930795f7f4ca90aa5f202e1027d51a
-
Size
182KB
-
MD5
9c338633e636a25d80847424c52776ef
-
SHA1
73da35c6ffd8142442944c8f27f24779548b9227
-
SHA256
22c32b601fdae5d763b80ebe3219d81520930795f7f4ca90aa5f202e1027d51a
-
SHA512
482ca1b5b54a229403e19836252fe2f49acf341504541ee2c3268bf6c7822a5e334aef76b836e7b6ad390f0b00dee0edfca9ab4d381ae476469135af3d7097a9
-
SSDEEP
3072:fS4L2l4f0STxEtjPOtioVjDGUU1qfDlaGGx+cL+LIfdAezkAS0M8/l/whIe0g0Lu:fSI2l4xxEtjPOtioVjDGUU1qfDlavx+J
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
22c32b601fdae5d763b80ebe3219d81520930795f7f4ca90aa5f202e1027d51a.xls windows office2003
Kangatang