Behavioral task
behavioral1
Sample
1490d540059077edbd2bb55e5b1ceb897300b202f169e9bce70f6a2c72cea830.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1490d540059077edbd2bb55e5b1ceb897300b202f169e9bce70f6a2c72cea830.xls
Resource
win10v2004-20240611-en
General
-
Target
1490d540059077edbd2bb55e5b1ceb897300b202f169e9bce70f6a2c72cea830
-
Size
64KB
-
MD5
4429d3762108cc94d158e1711adde97f
-
SHA1
95c63a4dc329902f4e83f7dd57d7425fe4d80f90
-
SHA256
1490d540059077edbd2bb55e5b1ceb897300b202f169e9bce70f6a2c72cea830
-
SHA512
74838096e4c3f6a5eeb350edec47670bdecff41045de491f917c974ac47d4bf694d4f40cf9a42445413bfdb2a2dfc4d41fc2744ddb268c92b784c56e325f0801
-
SSDEEP
768:kbX6rdnZTF+F0raJIv+NczixQ39hXhDJvKkWkyjGcOAYPMN3hftduqAMAnuYMdlr:lO+Sc/RXJKza86
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1490d540059077edbd2bb55e5b1ceb897300b202f169e9bce70f6a2c72cea830.xls windows office2003
Kangatang
ThisWorkbook