Behavioral task
behavioral1
Sample
84234d37e1b1fb3e679950b20c893e67f3eb12ce9bd9936185fde1d8b87018bb.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84234d37e1b1fb3e679950b20c893e67f3eb12ce9bd9936185fde1d8b87018bb.xls
Resource
win10v2004-20240426-en
General
-
Target
84234d37e1b1fb3e679950b20c893e67f3eb12ce9bd9936185fde1d8b87018bb
-
Size
66KB
-
MD5
f878da98be2f59a85c6d9ccfe8d8f74d
-
SHA1
0ba3c1e1bd5338a84d31e7a820bf504f82f47cf7
-
SHA256
84234d37e1b1fb3e679950b20c893e67f3eb12ce9bd9936185fde1d8b87018bb
-
SHA512
520f766979df258aa25a0aba43e3a48a08c5865aedb1be3dc205f576b67de5e4a10f00ce0ca2bf78ecf5241662bb9151cedc91378481704e016029917586113a
-
SSDEEP
1536:m8k3hOdsylKlgryzc4bNhZFGzE+cL/gldAB68i4:m8k3hOdsylKlgryzc4bNhZFGzE+cL/gZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
84234d37e1b1fb3e679950b20c893e67f3eb12ce9bd9936185fde1d8b87018bb.xls windows office2003
Kangatang