Behavioral task
behavioral1
Sample
ad42be9d293cde873be1670ebc5716e9846bbfc7f6aacee47e34087132050caa.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad42be9d293cde873be1670ebc5716e9846bbfc7f6aacee47e34087132050caa.xls
Resource
win10v2004-20240709-en
General
-
Target
ad42be9d293cde873be1670ebc5716e9846bbfc7f6aacee47e34087132050caa
-
Size
32KB
-
MD5
e7834df5c480b927a045865fd7f7f89e
-
SHA1
c73b266548451260cbf8c0890ef2cb8f3ff8fd24
-
SHA256
ad42be9d293cde873be1670ebc5716e9846bbfc7f6aacee47e34087132050caa
-
SHA512
b70ef0293ce17f5c74bd528f274e847764f0cbe79166de1d6f4cf61b061de6e04775fd01d70a53287706c567881b7d724ce80978c570da40673990f12f06575c
-
SSDEEP
384:y4et2TsFA+rixIVFWSqKw7yxSFSvHRlxHFv0MlfS1dn:y4LTs9rixIVAfKw7keKR98M5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ad42be9d293cde873be1670ebc5716e9846bbfc7f6aacee47e34087132050caa.xls windows office2003
Kangatang