Behavioral task
behavioral1
Sample
3d99a719ec01917c87e776ac92f08f2130fb1d254f47befb1341fe20c2302d97.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d99a719ec01917c87e776ac92f08f2130fb1d254f47befb1341fe20c2302d97.xls
Resource
win10v2004-20240611-en
General
-
Target
3d99a719ec01917c87e776ac92f08f2130fb1d254f47befb1341fe20c2302d97
-
Size
138KB
-
MD5
2a489d8fea64d65ee5d3f93b911b2471
-
SHA1
1ccc1a75fba714024f274d40ee85c5c24f1ee01b
-
SHA256
3d99a719ec01917c87e776ac92f08f2130fb1d254f47befb1341fe20c2302d97
-
SHA512
6df7473a1cda720141280d5c9a43c263c0213331ac02fce3693c2c3fb1133b8ce17c02aa4cac16c27509de14375024d1696b718b07fa014027c68e21ed60b101
-
SSDEEP
3072:pJxEtjPOtioVjDGUU1qfDlaGGx+cL/IERTKm+ZftJ6k2:3xEtjPOtioVjDGUU1qfDlavx+W/IEReq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3d99a719ec01917c87e776ac92f08f2130fb1d254f47befb1341fe20c2302d97.xls windows office2003
Kangatang