Behavioral task
behavioral1
Sample
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554.xls
Resource
win10v2004-20240508-en
General
-
Target
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554
-
Size
177KB
-
MD5
aacff78415df8fa847231f99a5698a63
-
SHA1
d2b43ad822acbfe76c253dddc3fed139caadca09
-
SHA256
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554
-
SHA512
fd951dc11ad6787c19d940bb81113621242c1920203c3a9322a08dd1e1f3d36116a8a325f04945e27c1beea71a253f9bc0be4ba67cf96b59267c60edeeff0db1
-
SSDEEP
3072:pL8Z14oIxEtjPOtioVjDGUU1qfDlaGGx+cL+LIfdAksW6M8LG/LhUUeTsd/k8STR:pLm14dxEtjPOtioVjDGUU1qfDlavx+W0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554.xls windows office2003
Kangatang
ThisWorkbook