Behavioral task
behavioral1
Sample
107ac44d59448921e130d700d82c71ab1dcf80523cb4ec0e91039debaf68822f.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
107ac44d59448921e130d700d82c71ab1dcf80523cb4ec0e91039debaf68822f.xls
Resource
win10v2004-20240508-en
General
-
Target
107ac44d59448921e130d700d82c71ab1dcf80523cb4ec0e91039debaf68822f
-
Size
1.5MB
-
MD5
b3973ba3b9646b14c20401d8d6b383e9
-
SHA1
287697e6a6b78b854f51d3e6daa6350c96a5ff37
-
SHA256
107ac44d59448921e130d700d82c71ab1dcf80523cb4ec0e91039debaf68822f
-
SHA512
549f47aa35c03108fea113db3496f9cb38faa9d46caaf70fd013246120d019a55b0e0a00963fd5ed29917ba6d8eb94f0133513bb7091db2932bfd1571a590721
-
SSDEEP
12288:UpuMqVj3YkwO9v2dY4peJPwYWPzm1SWxD+SgQnwbrXDj7KzNmTC7ASSIMGDyIkJD:U6j3YkwO9kpViAYD+S6/FTC/Oj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
107ac44d59448921e130d700d82c71ab1dcf80523cb4ec0e91039debaf68822f.xls windows office2003
Kangatang
ThisWorkbook