Behavioral task
behavioral1
Sample
501a5a48a35f16472680902aabc0a3d2e10949422030e7c7726976bcf6160510.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
501a5a48a35f16472680902aabc0a3d2e10949422030e7c7726976bcf6160510.xls
Resource
win10v2004-20240611-en
General
-
Target
501a5a48a35f16472680902aabc0a3d2e10949422030e7c7726976bcf6160510
-
Size
42KB
-
MD5
5bdc4c12df4bb46b79a6bcc97da60e0c
-
SHA1
1e6fa77f5cb36c22ec14901ca587cb80f722f761
-
SHA256
501a5a48a35f16472680902aabc0a3d2e10949422030e7c7726976bcf6160510
-
SHA512
4c487f9cb34ea468b98598d6a620514e8ef7a95d1365de6ba50cdbb9ac30defb941340ffab8232e4ded1f882eafe63be3a70963afeb7cb2e4882d96aebd96e03
-
SSDEEP
768:tAn9xcrdxEtjPOtioVjDGUU1qfDlaGGx+cL/IEAWJ6F2zmm+i94y3za86:lpxEtjPOtioVjDGUU1qfDlaGGx+cL/Ix
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
501a5a48a35f16472680902aabc0a3d2e10949422030e7c7726976bcf6160510.xls windows office2003
Kangatang
ThisWorkbook