Behavioral task
behavioral1
Sample
c2d702ea450259b915e4533432e04f723dfda28c4a8c2ec80bb6a18d29e7074d.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c2d702ea450259b915e4533432e04f723dfda28c4a8c2ec80bb6a18d29e7074d.xls
Resource
win10v2004-20240611-en
General
-
Target
c2d702ea450259b915e4533432e04f723dfda28c4a8c2ec80bb6a18d29e7074d
-
Size
43KB
-
MD5
0a5ee69e93ad5de088f5a7fb68e2def0
-
SHA1
99471a368c3d7039681f8162471f5450686ab2db
-
SHA256
c2d702ea450259b915e4533432e04f723dfda28c4a8c2ec80bb6a18d29e7074d
-
SHA512
262ea17722c1458c82b4535a4632c1c97d0acafbfa7cb7b19ce995d55206bfdd26ab2d6af11c8ef17f56bd93895e51fd9f631ed52080d7de97d9175d5d2d9046
-
SSDEEP
768:P+Jyk3hOdsylKlgryzc4bNhZFGzE+cLagHAZsRmmdv6J+55:2Mk3hOdsylKlgryzc4bNhZFGzE+cLag/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c2d702ea450259b915e4533432e04f723dfda28c4a8c2ec80bb6a18d29e7074d.xls windows office2003
Kangatang
ThisWorkbook