Behavioral task
behavioral1
Sample
fe329000b5c1112e17ac0c687c35433712e657eab90431e3a46dbe57df532301.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe329000b5c1112e17ac0c687c35433712e657eab90431e3a46dbe57df532301.xls
Resource
win10v2004-20240704-en
General
-
Target
fe329000b5c1112e17ac0c687c35433712e657eab90431e3a46dbe57df532301
-
Size
36KB
-
MD5
6e3caeeb28e88ff83b04d472e91a8006
-
SHA1
d6602e42f3dba7ab5a0db75503729194bd0a998f
-
SHA256
fe329000b5c1112e17ac0c687c35433712e657eab90431e3a46dbe57df532301
-
SHA512
4c9c8905530637eef7dd0f443a237de58753fa272068482b96a43b14110c6fea9d7ee82c80d65af3440d73a4067bd8dcb5ee3d2b4fcf6bf9edd785cffd9fe278
-
SSDEEP
768:zCF6wkFPLxGgxEtjPOtioVjDGUU1qfDlaGGx+chYIxhxfFaPKNwJkDk+jchafYd7:jdxEtjPOtioVjDGUU1qfDlaGGx+chYIc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fe329000b5c1112e17ac0c687c35433712e657eab90431e3a46dbe57df532301.xls windows office2003
Kangatang