Behavioral task
behavioral1
Sample
e3fbdc16ef190c13265be0943b74053e5d69c490f0c368aabe7b79aaa7d98976.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e3fbdc16ef190c13265be0943b74053e5d69c490f0c368aabe7b79aaa7d98976.xls
Resource
win10v2004-20240508-en
General
-
Target
e3fbdc16ef190c13265be0943b74053e5d69c490f0c368aabe7b79aaa7d98976
-
Size
178KB
-
MD5
671d1990ded6441d442b5617942c538e
-
SHA1
5dd6cace5f4d3e6e62ca4be899851b94aca6ffcf
-
SHA256
e3fbdc16ef190c13265be0943b74053e5d69c490f0c368aabe7b79aaa7d98976
-
SHA512
e7f375c80e5845c7c47c8a902804a00b6a3aa14a8b4274a6530c0f8d59135d63f5095aadb6d5dc5d3025c168063de5d0a27d1c467728b58d291601ed488ccc39
-
SSDEEP
3072:+L8+14P9xEtjPOtioVjDGUU1qfDlaGGx+cL+LIfdA3XW1M8LG/LhUUe2o6O5WRj2:+LF14FxEtjPOtioVjDGUU1qfDlavx+Wb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e3fbdc16ef190c13265be0943b74053e5d69c490f0c368aabe7b79aaa7d98976.xls windows office2003
Kangatang
ThisWorkbook