Behavioral task
behavioral1
Sample
8adddafc44e30d213942750682f1a42d38c610427e723f3135c8a120ce813365.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8adddafc44e30d213942750682f1a42d38c610427e723f3135c8a120ce813365.xls
Resource
win10v2004-20240709-en
General
-
Target
8adddafc44e30d213942750682f1a42d38c610427e723f3135c8a120ce813365
-
Size
41KB
-
MD5
246abd05bc60e727a814b1fbca19119b
-
SHA1
98103b345cc89963b52021d8a46381ca8236e5e7
-
SHA256
8adddafc44e30d213942750682f1a42d38c610427e723f3135c8a120ce813365
-
SHA512
d9df77a99ab1692f7501b18de7b1db2c58ea56321df12c4730c3ec9a0152d4405290bcfd8686bf69c9b8a37c82a15379b4b97ce13466b72b828cb8315ce1e60f
-
SSDEEP
768:8k0WxEtjPOtioVjDGUU1qfDlaGGx+cW/IEACwrPySoz0YQzza86:rrxEtjPOtioVjDGUU1qfDlaGGx+cW/IK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8adddafc44e30d213942750682f1a42d38c610427e723f3135c8a120ce813365.xls windows office2003
Kangatang
ThisWorkbook