Behavioral task
behavioral1
Sample
85c72cffa717698cc782686461a9e6082859e117120dc750eeb8689bb26c6034.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85c72cffa717698cc782686461a9e6082859e117120dc750eeb8689bb26c6034.xls
Resource
win10v2004-20240508-en
General
-
Target
85c72cffa717698cc782686461a9e6082859e117120dc750eeb8689bb26c6034
-
Size
43KB
-
MD5
e3abe1785f2b7720fa9005525cdb431b
-
SHA1
aadd3f2ffcac652e0c93ac137aa1220244ad6de4
-
SHA256
85c72cffa717698cc782686461a9e6082859e117120dc750eeb8689bb26c6034
-
SHA512
fbe2dd3a129c4be540adccd8c5f7e3e513a4403dbe969fbc209803cc0268e49615e18dd74c2f6cae19346b23dfbc0b4371da42a8b7b67f6494785d69b1e7abda
-
SSDEEP
768:aHhjQJk3hbdlylKsgqopeJBWhZFGkE+cL4LxlnmnezsX5KQTud8H+LD0:ekk3hbdlylKsgqopeJBWhZFGkE+cL4LB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
85c72cffa717698cc782686461a9e6082859e117120dc750eeb8689bb26c6034.xls windows office2003
Kangatang
ThisWorkbook