Behavioral task
behavioral1
Sample
86f3622b9379fe9ee9fd3d4641253e12d3aac7a796eefb4110f872e331fc3ad8.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86f3622b9379fe9ee9fd3d4641253e12d3aac7a796eefb4110f872e331fc3ad8.xls
Resource
win10v2004-20240709-en
General
-
Target
86f3622b9379fe9ee9fd3d4641253e12d3aac7a796eefb4110f872e331fc3ad8
-
Size
50KB
-
MD5
756296ff6a14ac399d7bd3a4b3d70d7b
-
SHA1
0396019e1c823f76c777e13301471b521bcb90f8
-
SHA256
86f3622b9379fe9ee9fd3d4641253e12d3aac7a796eefb4110f872e331fc3ad8
-
SHA512
8198b924fbcd3e0086b6146743ffba669a4a345756321f8486991b161aaea47dc54f3c05a17cc7984507f39dc5d6b6abd2dd14e6728909b07f4a66bad94e47ad
-
SSDEEP
1536:2DxEtjPOtioVjDGUU1qfDlaGGx+cL/IEAs4S1pjS8:2DxEtjPOtioVjDGUU1qfDlaGGx+cL/Iq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
86f3622b9379fe9ee9fd3d4641253e12d3aac7a796eefb4110f872e331fc3ad8.xls windows office2003
Kangatang