Behavioral task
behavioral1
Sample
0e7f6e2f985dd4631ced45422faed193708c0351bf13b07680dc1f2161ff9f7e.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e7f6e2f985dd4631ced45422faed193708c0351bf13b07680dc1f2161ff9f7e.xls
Resource
win10v2004-20240508-en
General
-
Target
0e7f6e2f985dd4631ced45422faed193708c0351bf13b07680dc1f2161ff9f7e
-
Size
3.7MB
-
MD5
e4179a5e676e4795e3997e8510bf923c
-
SHA1
1b52c6c40ecb4659a5eb9f5ee9570f73e745f5e3
-
SHA256
0e7f6e2f985dd4631ced45422faed193708c0351bf13b07680dc1f2161ff9f7e
-
SHA512
13f26ff73c8310cb9aa2d747d6cfb0d2b8e2f56d25070e2148218d2ad34ad416e7bc613df334f8a03b45952e03607a2c67ee4821521c279c475363229bfd1911
-
SSDEEP
6144:6k3hbdlylKsgqopeJBWhZFVE+W/lGAt+ztHj:tx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0e7f6e2f985dd4631ced45422faed193708c0351bf13b07680dc1f2161ff9f7e.xls windows office2003
Kangatang
ThisWorkbook