Behavioral task
behavioral1
Sample
c108d04b44797ac328ba422a33a155fce67f8b14e19258fe68af00240cf9b05c.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c108d04b44797ac328ba422a33a155fce67f8b14e19258fe68af00240cf9b05c.xls
Resource
win10v2004-20240611-en
General
-
Target
c108d04b44797ac328ba422a33a155fce67f8b14e19258fe68af00240cf9b05c
-
Size
64KB
-
MD5
86e10b001e617168209a0a41940bd2a8
-
SHA1
f72ff70e7eecceed879677a0e6b907bbc390aeae
-
SHA256
c108d04b44797ac328ba422a33a155fce67f8b14e19258fe68af00240cf9b05c
-
SHA512
f7017b796824237393e3a7395b62003c8d13f446d134c0a49c1282fb3e524f7d792d251d0c8ab6aca72f4ef29dd88203ac3fb54c69c7e270dbeb17063f9cc0a2
-
SSDEEP
1536:wCClIepk3hbdlylKsgwyzcTbWhZFGkE+cL/xEygSvje6SRdpz5LG/ILza86:kpk3hbdlylKsgwyzcTbWhZFGkE+cL/x/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c108d04b44797ac328ba422a33a155fce67f8b14e19258fe68af00240cf9b05c.xls windows office2003
Kangatang
ThisWorkbook