Behavioral task
behavioral1
Sample
48c9147c5cdec18b201ea3af76e19e7c5da8da3c6aca493a93da24b3d35fb95f.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
48c9147c5cdec18b201ea3af76e19e7c5da8da3c6aca493a93da24b3d35fb95f.xls
Resource
win10v2004-20240611-en
General
-
Target
48c9147c5cdec18b201ea3af76e19e7c5da8da3c6aca493a93da24b3d35fb95f
-
Size
46KB
-
MD5
fe33f2f3aa44199a6d268870572726ad
-
SHA1
1ee6b8c583033048c59b47061e0033150d3ac1ee
-
SHA256
48c9147c5cdec18b201ea3af76e19e7c5da8da3c6aca493a93da24b3d35fb95f
-
SHA512
5ec088071ddc791d9a7461f3659d4bd4b206987e25559e8532a4d0a3ca9b6ec0ab6362eae39eec98030715cfbee55adf444cf152bcad7e2178bf2e41ee7a1772
-
SSDEEP
768:viIp6srixIywP1SaQ8LoZ+rtZc3yUt269MKLW:t/rixIADc3ciG9MKL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
48c9147c5cdec18b201ea3af76e19e7c5da8da3c6aca493a93da24b3d35fb95f.xls windows office2003
Kangatang