Behavioral task
behavioral1
Sample
dd6f4ff94cf19e3cf0bbebc7de29f05cc879f6f71960726eb6c69a7780263d60.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dd6f4ff94cf19e3cf0bbebc7de29f05cc879f6f71960726eb6c69a7780263d60.xls
Resource
win10v2004-20240508-en
General
-
Target
dd6f4ff94cf19e3cf0bbebc7de29f05cc879f6f71960726eb6c69a7780263d60
-
Size
182KB
-
MD5
9f6ff3699c52e050e6c0df940562e47b
-
SHA1
9373cb23797aa7a1ab4c08d268a62ad61f36deda
-
SHA256
dd6f4ff94cf19e3cf0bbebc7de29f05cc879f6f71960726eb6c69a7780263d60
-
SHA512
7f07270ac113038e577ee9f36e6a0ec295ee3cf8f52f5da944bec4406616d26260ee5ef84778329fba3011a7db8884eada5f3a2f1e89bdee925b462eb7f8d775
-
SSDEEP
3072:PS4L2l4f0xTxEtjPOtioVjDGUU1qfDlaGGx+cL+LIfdAezkAS0M8/l/whIe0g0Lu:PSI2l4sxEtjPOtioVjDGUU1qfDlavx+J
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
dd6f4ff94cf19e3cf0bbebc7de29f05cc879f6f71960726eb6c69a7780263d60.xls windows office2003
Kangatang