Behavioral task
behavioral1
Sample
48cc7f02d67c008cdb075b2e62aae4fc199d75e3d508e3ab3b1efc0d6e3cb429.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
48cc7f02d67c008cdb075b2e62aae4fc199d75e3d508e3ab3b1efc0d6e3cb429.xls
Resource
win10v2004-20240611-en
General
-
Target
48cc7f02d67c008cdb075b2e62aae4fc199d75e3d508e3ab3b1efc0d6e3cb429
-
Size
37KB
-
MD5
808902f7caeb651f270d48a6a4dbbcf1
-
SHA1
3318851f63ac941940a8149d64fc3aa2dac62970
-
SHA256
48cc7f02d67c008cdb075b2e62aae4fc199d75e3d508e3ab3b1efc0d6e3cb429
-
SHA512
ea3b6ac6da5c59e504332aade4da1d60c333b75aaa81e5dd87a76c6bbaee31bc660c3cda91e1cf379945b38b4611067c254c35021f91f7fad6290a73f52cd6bf
-
SSDEEP
384:U7jC/9ziy3oaoU0g3xiS9yFiDoTqP3mFOcxUmAz1Ka2:USziy3oaoU0g3TYqPYTl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
48cc7f02d67c008cdb075b2e62aae4fc199d75e3d508e3ab3b1efc0d6e3cb429.xls windows office2003
Kangatang
ThisWorkbook