Behavioral task
behavioral1
Sample
eebd74e2b77a6118689899d5fe7fe445a40ed2422d37ba9ed638ee215176f96c.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eebd74e2b77a6118689899d5fe7fe445a40ed2422d37ba9ed638ee215176f96c.xls
Resource
win10v2004-20240709-en
General
-
Target
eebd74e2b77a6118689899d5fe7fe445a40ed2422d37ba9ed638ee215176f96c
-
Size
40KB
-
MD5
9050591223402c1999005f400fd6c6f0
-
SHA1
f188408bc0f40d81a84c5210d3fe50164fc3e4b0
-
SHA256
eebd74e2b77a6118689899d5fe7fe445a40ed2422d37ba9ed638ee215176f96c
-
SHA512
e051c3e830cc91783441f4d97201e2baf6150b62b27a51b008254d8d2367e5b92593d3f3bf76c67a4b397f20d73d5e53935302f99be039d57de15710bafe554c
-
SSDEEP
384:ChfDwC/9ziSCajGLiS9yFighZ4U16X4Utd6g3E/8tPL4VzQ1bWXwmlNa36J:SDDziSfjAY4Umd6g3uWKGKlNa36J
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
eebd74e2b77a6118689899d5fe7fe445a40ed2422d37ba9ed638ee215176f96c.xls windows office2003
Kangatang
ThisWorkbook