Behavioral task
behavioral1
Sample
b56f01bff94608ee7dfe6ff0c14acd8a2a185df0355a284e240c482a149d40d9.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b56f01bff94608ee7dfe6ff0c14acd8a2a185df0355a284e240c482a149d40d9.xls
Resource
win10v2004-20240508-en
General
-
Target
b56f01bff94608ee7dfe6ff0c14acd8a2a185df0355a284e240c482a149d40d9
-
Size
84KB
-
MD5
f7653f7f2ba70bdaa970c32407bda6d1
-
SHA1
304ef63192a3772c33c69571fe86586b773a0e09
-
SHA256
b56f01bff94608ee7dfe6ff0c14acd8a2a185df0355a284e240c482a149d40d9
-
SHA512
854f91254a987f114e50281fac1cd6d5e55d8a863d31b965abe00ec6fa24b074ec4b5f9e49deb3afa1d96c92ab110d8b409b2799e9fe63ac81b967bd29340add
-
SSDEEP
1536:/njE5GKMsxEm9SyKXociraZ9GGV+ch//G0xSJodcNTHpYrZpQYFs57za86n:/njE5GKMsxEm9SyKXociraZ9GGV+ch/d
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b56f01bff94608ee7dfe6ff0c14acd8a2a185df0355a284e240c482a149d40d9.xls windows office2003
Kangatang
ThisWorkbook