Behavioral task
behavioral1
Sample
fb88364278923925cf7453e1ae377e253fefb1a03b51af949e80fc2488f8bea4.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
fb88364278923925cf7453e1ae377e253fefb1a03b51af949e80fc2488f8bea4.xls
Resource
win10v2004-20240508-en
General
-
Target
fb88364278923925cf7453e1ae377e253fefb1a03b51af949e80fc2488f8bea4
-
Size
1.6MB
-
MD5
4e6782f6bb79c804003fd79e389059dd
-
SHA1
9db47d5613c3a714fff5286f874dc2582c8c4613
-
SHA256
fb88364278923925cf7453e1ae377e253fefb1a03b51af949e80fc2488f8bea4
-
SHA512
d63aeecf5aecd53d969ea7b328ef2b53f30c7bf585b28845d52e0183b7ff7122cca36545fac12428d35aa31738df97ff85796135b520bf2f39edb98f25eb8431
-
SSDEEP
24576:FA3eN5muA3eN5miZVrlyGIZwnL1ixQuwVeqaPSUPQfK5djd1:FGeVGemQnLsxQuwVqP6a
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fb88364278923925cf7453e1ae377e253fefb1a03b51af949e80fc2488f8bea4.xls windows office2003
Kangatang