Behavioral task
behavioral1
Sample
d5d0b20029c409b48a94fc465a61e2304c4de0b645ce7cef80ed587b7697a314.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5d0b20029c409b48a94fc465a61e2304c4de0b645ce7cef80ed587b7697a314.xls
Resource
win10v2004-20240611-en
General
-
Target
d5d0b20029c409b48a94fc465a61e2304c4de0b645ce7cef80ed587b7697a314
-
Size
3.7MB
-
MD5
ca95417ad064cca27542be0ccff46414
-
SHA1
9c39d78adcceaa8de84fea653a7fbb5c91c4a3b6
-
SHA256
d5d0b20029c409b48a94fc465a61e2304c4de0b645ce7cef80ed587b7697a314
-
SHA512
e7fa419ae7abceab5b39c80cd8dcd915e1f4c2f0b5fe911c50680eba8abab7c8776d1a8876c1cc0026cfdf043d3afdfbaf80973f8cc95518061bea1026ad5b54
-
SSDEEP
6144:Rk3hbdlylKsgqopeJBWhZFVE+W/lGAM+ztHG:Dx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d5d0b20029c409b48a94fc465a61e2304c4de0b645ce7cef80ed587b7697a314.xls windows office2003
Kangatang
ThisWorkbook