Behavioral task
behavioral1
Sample
d32321e6b099ed9fa1e573e522f008126968e9cbd2b585f47c0f0fe8a44aeee4.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d32321e6b099ed9fa1e573e522f008126968e9cbd2b585f47c0f0fe8a44aeee4.xls
Resource
win10v2004-20240226-en
General
-
Target
d32321e6b099ed9fa1e573e522f008126968e9cbd2b585f47c0f0fe8a44aeee4
-
Size
56KB
-
MD5
2801798966e4cd98511961cc49f619c6
-
SHA1
cd950c17b482232e5f6c506bf5ff6140ae5952d6
-
SHA256
d32321e6b099ed9fa1e573e522f008126968e9cbd2b585f47c0f0fe8a44aeee4
-
SHA512
15563a744674e13ba2ad6f81b9849a42785cce7540abb10779fef7bd991bc7cdeb27b324543d431987534391b3cf5ce884102a2daf3300c5ef8dcf35d0a37749
-
SSDEEP
1536:zE8pE9EGwqlUnOSFsv66g3KnF439NKC54kkGfn+cL/3GAVPHQw+8qTza86:ASFsv66g3KnF439NKC54kkGfn+cL/3Gu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d32321e6b099ed9fa1e573e522f008126968e9cbd2b585f47c0f0fe8a44aeee4.xls windows office2003
Kangatang
ThisWorkbook