Behavioral task
behavioral1
Sample
414c6b92a44656a6e626db26f277aa4079f90ddf4c5dff1727e66720f8c6104e.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
414c6b92a44656a6e626db26f277aa4079f90ddf4c5dff1727e66720f8c6104e.xls
Resource
win10v2004-20240508-en
General
-
Target
414c6b92a44656a6e626db26f277aa4079f90ddf4c5dff1727e66720f8c6104e
-
Size
139KB
-
MD5
b1880ac168b08aa9ce09306add5a5495
-
SHA1
faf7f2741cb7c1676fcfa39d1b4790ee63378355
-
SHA256
414c6b92a44656a6e626db26f277aa4079f90ddf4c5dff1727e66720f8c6104e
-
SHA512
3526e4c0add27f22f97ce6526829f931e33dac96dc143e9d8bbd594c507fb9c4b531e4087d4f039e46791bf6f802d59642432355ab8f9d99cd1443218c0d794c
-
SSDEEP
3072:C/y+xEtjPOtioVjDGUU1qfDlaGGx+cUY85A+ilk1Pl/7gW1lq2om8ZgHuE5WBl2F:OxEtjPOtioVjDGUU1qfDlavx+DY85A+e
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
414c6b92a44656a6e626db26f277aa4079f90ddf4c5dff1727e66720f8c6104e.xls windows office2003
Kangatang