Behavioral task
behavioral1
Sample
53dbce82cc21d082f1b004fc7a6b87134e50bcbbfd750bb95eb724e96c71cc73.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
53dbce82cc21d082f1b004fc7a6b87134e50bcbbfd750bb95eb724e96c71cc73.xls
Resource
win10v2004-20240508-en
General
-
Target
53dbce82cc21d082f1b004fc7a6b87134e50bcbbfd750bb95eb724e96c71cc73.zip
-
Size
19KB
-
MD5
5ff762804b757a3eed99cad1519a7f44
-
SHA1
a0b7f7b12018dff3dfdbc12d1caa5486b4c40f12
-
SHA256
5b633104cfb891e571e5a43cdd4aa22fb586c9e7d5a9516d9d8933b564a6a65a
-
SHA512
d3bd2a0211c1ef63ba005ad608e8244866333560ddbfd8ad45e80a02271ba934d881771db6f06debca41e2ae3e14806ea0c183c10c73bea49ec12d49fc4ba7a5
-
SSDEEP
384:F83Nt2hXQ0Ygu4tlywQqWVpunpcuOR0BQiB6gYqoj9B:uz2XQsnyh5VpuSuK0saoxB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/53dbce82cc21d082f1b004fc7a6b87134e50bcbbfd750bb95eb724e96c71cc73 office_macro_on_action -
resource static1/unpack001/53dbce82cc21d082f1b004fc7a6b87134e50bcbbfd750bb95eb724e96c71cc73
Files
-
53dbce82cc21d082f1b004fc7a6b87134e50bcbbfd750bb95eb724e96c71cc73.zip.zip
Password: infected
-
53dbce82cc21d082f1b004fc7a6b87134e50bcbbfd750bb95eb724e96c71cc73.xls windows office2003
Kangatang
ThisWorkbook