Behavioral task
behavioral1
Sample
b0e57a99252a8640fe59b2cf8fc1a1a1ea477856c36d1b3ef349e67609db6d22.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b0e57a99252a8640fe59b2cf8fc1a1a1ea477856c36d1b3ef349e67609db6d22.xls
Resource
win10v2004-20240611-en
General
-
Target
b0e57a99252a8640fe59b2cf8fc1a1a1ea477856c36d1b3ef349e67609db6d22
-
Size
1.8MB
-
MD5
4a823ddeda0de6191fa9b69d60f04598
-
SHA1
6c603bd747f89f5c25986eff42361d008d5892b3
-
SHA256
b0e57a99252a8640fe59b2cf8fc1a1a1ea477856c36d1b3ef349e67609db6d22
-
SHA512
226bf1e979a67d1b04d7d4eb85e8468020a0bea3995d3b0fa1145ebc34fbdb6e07729881c1dae9dc3b7a26def5fef66cbe0d1623c07df71a10a9125d6b6b7e9a
-
SSDEEP
12288:uCDYrushsjKyiKtBwH/OWb9YY4cfVHKB:uCDkABmWWb9YYrfUB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b0e57a99252a8640fe59b2cf8fc1a1a1ea477856c36d1b3ef349e67609db6d22.xls windows office2003
Kangatang