Behavioral task
behavioral1
Sample
94cc02e9ad8f5ca7861c8aef7dbf0720c95286dc304efbf267156bef0f9e0a90.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
94cc02e9ad8f5ca7861c8aef7dbf0720c95286dc304efbf267156bef0f9e0a90.xls
Resource
win10v2004-20240508-en
General
-
Target
94cc02e9ad8f5ca7861c8aef7dbf0720c95286dc304efbf267156bef0f9e0a90
-
Size
113KB
-
MD5
b4826e82e9c3f2153c1c40ce74211afe
-
SHA1
9ddfd6f3199eab0fdc0674b421a7eb3d81026276
-
SHA256
94cc02e9ad8f5ca7861c8aef7dbf0720c95286dc304efbf267156bef0f9e0a90
-
SHA512
cb83a1820bce344e0e868c97f03709df44239a79a42af30ac6c060692680d4d594207085c7618463a3371074464e4c733aaa08b0641ce808db8c4eec3520ccc1
-
SSDEEP
3072:dk3hOdsylKlgryzc4bNhZFGzE+cL/gEAyMQawF7tA88MmSsN4Va:dk3hOdsylKlgryzc4bNhZF+E+W/gEAy3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
94cc02e9ad8f5ca7861c8aef7dbf0720c95286dc304efbf267156bef0f9e0a90.xls windows office2003
Kangatang
ThisWorkbook