Behavioral task
behavioral1
Sample
72cc3be74c75375e949db952226b8ca9f938dc42f13a71e71334b24bc47b4279.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
72cc3be74c75375e949db952226b8ca9f938dc42f13a71e71334b24bc47b4279.xls
Resource
win10v2004-20240508-en
General
-
Target
72cc3be74c75375e949db952226b8ca9f938dc42f13a71e71334b24bc47b4279
-
Size
177KB
-
MD5
92e08f6cdbeb8ff6330e5af67f470c1f
-
SHA1
6061960578392e0d6652c10bd1150c996f977c06
-
SHA256
72cc3be74c75375e949db952226b8ca9f938dc42f13a71e71334b24bc47b4279
-
SHA512
5e99a29106ac6864e394a1a7620d9c702dcf00202887864ca8c1bcdbddd5d3a3c334c89ffd81d78661e18d2812564cb098c61d1f7afc7d8fa643d5d2017aeefc
-
SSDEEP
3072:lL8Z14bIxEtjPOtioVjDGUU1qfDlaGGx+cL+LIfdAksW6M8LG/LhUUeTsd/k8STR:lLm148xEtjPOtioVjDGUU1qfDlavx+W0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
72cc3be74c75375e949db952226b8ca9f938dc42f13a71e71334b24bc47b4279.xls windows office2003
Kangatang
ThisWorkbook