Behavioral task
behavioral1
Sample
78db16af020ac3fe74ab35aecf68246d6dc2e779636755794b84b5d138f7d960.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
78db16af020ac3fe74ab35aecf68246d6dc2e779636755794b84b5d138f7d960.xls
Resource
win10v2004-20240709-en
General
-
Target
78db16af020ac3fe74ab35aecf68246d6dc2e779636755794b84b5d138f7d960
-
Size
61KB
-
MD5
df2a46acb5431f1c5bdcdd26248436a1
-
SHA1
c401bb722fc1784c4e388d453ae8fa37a00628c7
-
SHA256
78db16af020ac3fe74ab35aecf68246d6dc2e779636755794b84b5d138f7d960
-
SHA512
c71007813b642f6d0b0046b26304719104786b5fd1d5e89b039c05c20494ae7f209cab4cb67ed83cb7adbe0dee17fe414efe76c90d67fb1c1712a739d80c8627
-
SSDEEP
768:a+ceUrig7SMe4qEWwVBLtHyxZh/rTGeaza86:keUriB0VX+TTwza86
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
78db16af020ac3fe74ab35aecf68246d6dc2e779636755794b84b5d138f7d960.xls windows office2003
Kangatang
ThisWorkbook