Behavioral task
behavioral1
Sample
34a66ab85a8f6432a7aa4cc16f6ef0818be34d4fc9ba604d14682707ac2557e3.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
34a66ab85a8f6432a7aa4cc16f6ef0818be34d4fc9ba604d14682707ac2557e3.xls
Resource
win10v2004-20240611-en
General
-
Target
34a66ab85a8f6432a7aa4cc16f6ef0818be34d4fc9ba604d14682707ac2557e3
-
Size
55KB
-
MD5
691c72df7512fdb0635560e433bc2ff8
-
SHA1
05355e463d8c4c41ac3013eb9660a5f540c928c9
-
SHA256
34a66ab85a8f6432a7aa4cc16f6ef0818be34d4fc9ba604d14682707ac2557e3
-
SHA512
5ae8c70e324c730cc80e33ca3eeb3d711a1e3184f655178bca76ee2693bc86640f1410257f6044c634f293f682a5c360dcabd00818c52a05fd5b601b34957cc0
-
SSDEEP
1536:ImxEtjPOtioVjDGUU1qfDlaGGx+ch/IEABujMDj1+13oza86:ImxEtjPOtioVjDGUU1qfDlaGGx+ch/IM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
34a66ab85a8f6432a7aa4cc16f6ef0818be34d4fc9ba604d14682707ac2557e3.xls windows office2003
Kangatang
ThisWorkbook