Behavioral task
behavioral1
Sample
f373c1dc0a844c40a4014763d110737a2f95cf286fe73c3b163233f46e626cd8.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f373c1dc0a844c40a4014763d110737a2f95cf286fe73c3b163233f46e626cd8.xls
Resource
win10v2004-20240709-en
General
-
Target
f373c1dc0a844c40a4014763d110737a2f95cf286fe73c3b163233f46e626cd8
-
Size
94KB
-
MD5
80a143624f4fcbadc4527541104f0bfb
-
SHA1
2150cb4fa3dd600fdeea4a3b98b05895d0ee3692
-
SHA256
f373c1dc0a844c40a4014763d110737a2f95cf286fe73c3b163233f46e626cd8
-
SHA512
661646bc78709c7d7b5a81d0e51db5e84246608a710d3d6758bd20913738661a77c31d2da4efd63e42680a4e198df72f5d5253b0e88c7df2ad392709e4abf7b7
-
SSDEEP
1536:uk3hOdsylKlgryzc4bNhZFGzE+cLagHACjMyOWADNSY25KOYu8D2JvblckTxsWN0:uk3hOdsylKlgryzc4bNhZFGzE+cLagHE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f373c1dc0a844c40a4014763d110737a2f95cf286fe73c3b163233f46e626cd8.xls windows office2003
Kangatang
ThisWorkbook