Behavioral task
behavioral1
Sample
410c22ff82feebb73687c45d8fcb41fa9ab1092e123208f9de6dc6ba52a8464b.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
410c22ff82feebb73687c45d8fcb41fa9ab1092e123208f9de6dc6ba52a8464b.xls
Resource
win10v2004-20240709-en
General
-
Target
410c22ff82feebb73687c45d8fcb41fa9ab1092e123208f9de6dc6ba52a8464b
-
Size
1.8MB
-
MD5
542b6bd2dbaf8da8cc69315cb9145c9b
-
SHA1
672b4d78e635bcd068439db90611ccf2fae85748
-
SHA256
410c22ff82feebb73687c45d8fcb41fa9ab1092e123208f9de6dc6ba52a8464b
-
SHA512
42ed5c9f0286f6123be24f7d823df99463ef473777ac0b73c74682f6d07d76c4ee1bbeef26993cd65957113285368f0d9e44aaf0801c8f7772440087e9b800d4
-
SSDEEP
49152:SGlfUIDCazP76Qwm00DT5GNx7r/kK2LSYKvsIbM:SElnFDF3Ix7r/kzLEvsC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
410c22ff82feebb73687c45d8fcb41fa9ab1092e123208f9de6dc6ba52a8464b.xls windows office2003
Kangatang
ThisWorkbook