Behavioral task
behavioral1
Sample
bd40b9b548900d43b738d97e018442c58b2a52fdc4ee6b15af2ed302ae482b55.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd40b9b548900d43b738d97e018442c58b2a52fdc4ee6b15af2ed302ae482b55.xls
Resource
win10v2004-20240709-en
General
-
Target
bd40b9b548900d43b738d97e018442c58b2a52fdc4ee6b15af2ed302ae482b55
-
Size
49KB
-
MD5
927cca30d5d62b0a416b83581ce613e3
-
SHA1
0d84983bc1ba52ac285dc2961926d2c4f165859d
-
SHA256
bd40b9b548900d43b738d97e018442c58b2a52fdc4ee6b15af2ed302ae482b55
-
SHA512
15d65d30cec5c4732a749a18d5d890af6e7203dcf3ec227c5f10260a118913aeb5de63dce644780cf06a0e1ae40a626614eeaed3ac61ba1364cbb91b35de9cf4
-
SSDEEP
1536:w5FxEtjPOtioVjDGUU1qfDlaGGx+cL/IEyZW0ZsXDzza86:uFxEtjPOtioVjDGUU1qfDlaGGx+cL/Id
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bd40b9b548900d43b738d97e018442c58b2a52fdc4ee6b15af2ed302ae482b55.xls windows office2003
Kangatang
ThisWorkbook