Behavioral task
behavioral1
Sample
b46e84778b33914f0f072f4902dc0a23635215df04f705703a4df4f8f5b04356.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b46e84778b33914f0f072f4902dc0a23635215df04f705703a4df4f8f5b04356.xls
Resource
win10v2004-20240611-en
General
-
Target
b46e84778b33914f0f072f4902dc0a23635215df04f705703a4df4f8f5b04356
-
Size
59KB
-
MD5
3f00c663202c1fcdd3e1e1104f4861f4
-
SHA1
01f61e5bf3226400325f81d0aec3596b0538b84b
-
SHA256
b46e84778b33914f0f072f4902dc0a23635215df04f705703a4df4f8f5b04356
-
SHA512
eb74050d2d32af6a274e860edca021941df01f343bb7cf5bd5519badabd7d7ae011c3a94ff0bc91aa22554b5894b55fe1ae171b3c6e2d94cbcb51ec256fd4524
-
SSDEEP
1536:Yk3hOdsylKlgxopeiBNhZFGzE++cRWxM3JAtSUYRFU6CyXHw:Yk3hOdsylKlgxopeiBNhZFGzE++cRWxz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
b46e84778b33914f0f072f4902dc0a23635215df04f705703a4df4f8f5b04356.xls windows office2003
Kangatang