Behavioral task
behavioral1
Sample
e2e97d6d95e188c8cc601b82a932300282fd13dc434e2fd5291f786dfe4abcac.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e2e97d6d95e188c8cc601b82a932300282fd13dc434e2fd5291f786dfe4abcac.xls
Resource
win10v2004-20240611-en
General
-
Target
e2e97d6d95e188c8cc601b82a932300282fd13dc434e2fd5291f786dfe4abcac
-
Size
67KB
-
MD5
983f2d88968cd63c40650eb11248c807
-
SHA1
0d07d18fc798d1c6898223f685e7b8da2e810769
-
SHA256
e2e97d6d95e188c8cc601b82a932300282fd13dc434e2fd5291f786dfe4abcac
-
SHA512
70409dbef628389f9df64ae6128fff30330aea6d14b26d5842661c91e96dae51f5e7d7cf56aa1cf03a81ab163d0541864e53d1116af46a9a146bd1642740854b
-
SSDEEP
1536:Dk3hOdsylKlgryzc4bNhZFGzE+cL4LgldAjJ4f7cl9XvfAjR5kfCuh0u8ar:Dk3hOdsylKlgryzc4bNhZFGzE+cL4Lgq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
e2e97d6d95e188c8cc601b82a932300282fd13dc434e2fd5291f786dfe4abcac.xls windows office2003
Kangatang