Behavioral task
behavioral1
Sample
9716d44339cf7acad2d316dd37a2924660d5da1040a75577cf45015e8b1e6504.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9716d44339cf7acad2d316dd37a2924660d5da1040a75577cf45015e8b1e6504.xls
Resource
win10v2004-20240709-en
General
-
Target
9716d44339cf7acad2d316dd37a2924660d5da1040a75577cf45015e8b1e6504
-
Size
63KB
-
MD5
9ec4b473de207e5f8f5827eb70aee6c7
-
SHA1
1ddd52f15c5a424f08ad3684aafec57d349df7e0
-
SHA256
9716d44339cf7acad2d316dd37a2924660d5da1040a75577cf45015e8b1e6504
-
SHA512
0ad10e4d74d4b671091776de2b869fddc8cc034f42da29adbcaa408450ab5798993d9130272bea6acdad4397a794ca90f35149ff64f4580d301c4e9c50942246
-
SSDEEP
1536:EMSxEtjPOtioVjDGUU1qfDlaGGx+cowI5tNRRlnV8:NSxEtjPOtioVjDGUU1qfDlaGGx+cowId
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9716d44339cf7acad2d316dd37a2924660d5da1040a75577cf45015e8b1e6504.xls windows office2003
Kangatang
ThisWorkbook