Behavioral task
behavioral1
Sample
62433bafc48e5de3b59fb4ae1fd7dad1fdeb8550e15a1049e8a9cb9ba02dc532.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
62433bafc48e5de3b59fb4ae1fd7dad1fdeb8550e15a1049e8a9cb9ba02dc532.xls
Resource
win10v2004-20240508-en
General
-
Target
62433bafc48e5de3b59fb4ae1fd7dad1fdeb8550e15a1049e8a9cb9ba02dc532
-
Size
36KB
-
MD5
3f7f5c48189e8be13f86b49a9acd4b54
-
SHA1
7da84c98a5661b5d3a21debb9de65b442dc11433
-
SHA256
62433bafc48e5de3b59fb4ae1fd7dad1fdeb8550e15a1049e8a9cb9ba02dc532
-
SHA512
e962b6a6620033045910effded90a43befeebc52341392b9f6c70a9d1bc273694bbc107216c21a1dc2c54de63175ded7f62f03cb688b1c8d91b001531e2ee954
-
SSDEEP
768:ZzVqxEtjPOtioVjDGUU1qfDlaGGx+cL/IEAWD/okxuYOza86:ZoxEtjPOtioVjDGUU1qfDlaGGx+cL/IO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
62433bafc48e5de3b59fb4ae1fd7dad1fdeb8550e15a1049e8a9cb9ba02dc532.xls windows office2003
Kangatang
ThisWorkbook