Behavioral task
behavioral1
Sample
f0535f45cc651cb13b4ff05610b300f56460756baae24c99ab030315de010d65.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f0535f45cc651cb13b4ff05610b300f56460756baae24c99ab030315de010d65.xls
Resource
win10v2004-20240709-en
General
-
Target
f0535f45cc651cb13b4ff05610b300f56460756baae24c99ab030315de010d65
-
Size
55KB
-
MD5
ef28dfe0530e3a9d1394992eda5fcaa2
-
SHA1
a022273e9a1d5d53f3a6e3391cb13fa1ba4bd3a6
-
SHA256
f0535f45cc651cb13b4ff05610b300f56460756baae24c99ab030315de010d65
-
SHA512
51abf0a3b80a7fde77592bbfb6bc8155e248f1cc8cf615ffa62749acb2ce240b9b2517e748303a90fbc9d499a24827ac622a01029488d59548a29f43a3dbc606
-
SSDEEP
1536:fLk3hOdsylKlgryzc4bNhZFGzE+c4gwtpc27ZE/Qjza86:zk3hOdsylKlgryzc4bNhZFGzE+c4gwtw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f0535f45cc651cb13b4ff05610b300f56460756baae24c99ab030315de010d65.xls windows office2003
Kangatang
ThisWorkbook