Behavioral task
behavioral1
Sample
7b7d36e6be7b54bfb32be8ee39414ffd8e670a3a57afdd5e6676bab4801d2e9c.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7b7d36e6be7b54bfb32be8ee39414ffd8e670a3a57afdd5e6676bab4801d2e9c.xls
Resource
win10v2004-20240709-en
General
-
Target
7b7d36e6be7b54bfb32be8ee39414ffd8e670a3a57afdd5e6676bab4801d2e9c
-
Size
1.6MB
-
MD5
9369389d5cd76741de1c41cbfed7c264
-
SHA1
7324b2e3bd771d94b123a0477ac649144a749f19
-
SHA256
7b7d36e6be7b54bfb32be8ee39414ffd8e670a3a57afdd5e6676bab4801d2e9c
-
SHA512
48e7234c5bba8d1d2b2b5dcafaf0c94f1f536bd6fc74d737311b5397bfd2fdc400c78f3d7739af52a80ebd458d191bbe0c5e7ae5b59b54d2ea6d382fe6cd6db1
-
SSDEEP
24576:MA3eN5mMA3eN5msZVrlGhaZ4n31ixMuwVeeaPU4PQfc5BjSE:MGenGeA1n3sxMuwVYP6k
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7b7d36e6be7b54bfb32be8ee39414ffd8e670a3a57afdd5e6676bab4801d2e9c.xls windows office2003
Kangatang