Behavioral task
behavioral1
Sample
57b4b67a470a2a44cb4d0faf85256ad49c6b7121b70534f895f5fdcf769ae567.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
57b4b67a470a2a44cb4d0faf85256ad49c6b7121b70534f895f5fdcf769ae567.xls
Resource
win10v2004-20240508-en
General
-
Target
57b4b67a470a2a44cb4d0faf85256ad49c6b7121b70534f895f5fdcf769ae567
-
Size
145KB
-
MD5
b1e43d77df0df1b1d10d7441512070ce
-
SHA1
f12e58e542c31e6c122870a874118b81cb03684f
-
SHA256
57b4b67a470a2a44cb4d0faf85256ad49c6b7121b70534f895f5fdcf769ae567
-
SHA512
eee3194596848555d90a764de95f7902ff6bf190886f47935509e083a7203e9a3aae956756eda6bc43d749d4254c3373fe0cef25e7e9f36d8025d0d7b9a4dd26
-
SSDEEP
3072:WplQvxEtjPOtioVjDGUU1qfDlaGGx+cUY85A+ilk+ZmRvUHWqDC+cKySJ/9iMeCd:rxEtjPOtioVjDGUU1qfDlavx+DY85A+C
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
57b4b67a470a2a44cb4d0faf85256ad49c6b7121b70534f895f5fdcf769ae567.xls windows office2003
Kangatang
ThisWorkbook