Behavioral task
behavioral1
Sample
fcd28137fe2c277a5ed348ca6c867a449c331a0bc0b72fd1308419ef5442e938.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fcd28137fe2c277a5ed348ca6c867a449c331a0bc0b72fd1308419ef5442e938.xls
Resource
win10v2004-20240508-en
General
-
Target
fcd28137fe2c277a5ed348ca6c867a449c331a0bc0b72fd1308419ef5442e938
-
Size
49KB
-
MD5
63efb55453fbb2b08e19467021d1666f
-
SHA1
4807bf5cf38949c34e30735fe078034f07bf59bb
-
SHA256
fcd28137fe2c277a5ed348ca6c867a449c331a0bc0b72fd1308419ef5442e938
-
SHA512
f84e58a67360755a3ff303198fbca473a0ec8c70b1ec6735a007f5f83d9bcb9051646057ebb0bc1dc9aaa15c6675977887a4c7453c0d1ce096fe571d64118271
-
SSDEEP
384:wXXGT5hCeA+ri2XwBIdblQGVAUYSX2BYb3sFt6UmAi12+BH:iXyjri2XwBIB99YSmC9wuH
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fcd28137fe2c277a5ed348ca6c867a449c331a0bc0b72fd1308419ef5442e938.xls windows office2003
Kangatang
ThisWorkbook