Behavioral task
behavioral1
Sample
5558e178926201cc724cb7417861aac6d805bd3fc2964494fe5c5035e1a3e9ba.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5558e178926201cc724cb7417861aac6d805bd3fc2964494fe5c5035e1a3e9ba.xls
Resource
win10v2004-20240508-en
General
-
Target
5558e178926201cc724cb7417861aac6d805bd3fc2964494fe5c5035e1a3e9ba
-
Size
86KB
-
MD5
947ca27286416a835a6f64b6a5bba830
-
SHA1
10059806da92fec78919e620d64368be59a48df5
-
SHA256
5558e178926201cc724cb7417861aac6d805bd3fc2964494fe5c5035e1a3e9ba
-
SHA512
e9c794e81848d0d675b450ad139dd00c67bd69cb262b5775fa78fc18750b6566e01b2a8785d6818df4bfb5137e735cb208a30311db35b5638ba24b41b0ab5fc8
-
SSDEEP
1536:IPUo8FbyDVVrS3zTWYnBkeqWnpjdza861:IPUbFbyDVV6Qsbzh6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5558e178926201cc724cb7417861aac6d805bd3fc2964494fe5c5035e1a3e9ba.xls windows office2003
Kangatang
ThisWorkbook