Behavioral task
behavioral1
Sample
9e9f534c4a5948d4de16ccb2982436f25ad9a53125e18eafaa66f6904f5041dd.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e9f534c4a5948d4de16ccb2982436f25ad9a53125e18eafaa66f6904f5041dd.xls
Resource
win10v2004-20240611-en
General
-
Target
9e9f534c4a5948d4de16ccb2982436f25ad9a53125e18eafaa66f6904f5041dd
-
Size
143KB
-
MD5
45c9619c28a59563db6719c0a7749bb2
-
SHA1
11eb056ca383270549b21f101fa3f2b5fe3ce3eb
-
SHA256
9e9f534c4a5948d4de16ccb2982436f25ad9a53125e18eafaa66f6904f5041dd
-
SHA512
52266a70962b9282fadd10bcc97d8935ed7f42c3d404ad706cd3e072d9f071b316e80213f50497a65aeb0aecb0746aad2a0e2cd2744e6dbd40a16c30425b0dcc
-
SSDEEP
3072:/IBQvxEtjPOtioVjDGUU1qfDlaGGx+cUY85A+ilk4ZmRvkI4qDC+cKySrD9iMKwj:hxEtjPOtioVjDGUU1qfDlavx+DY85A+v
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9e9f534c4a5948d4de16ccb2982436f25ad9a53125e18eafaa66f6904f5041dd.xls windows office2003
Kangatang
ThisWorkbook