Behavioral task
behavioral1
Sample
681ccd0cb009977c44c90f02808f35a8f5f81c6daadb1f5ad8d948988eefe2ce.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
681ccd0cb009977c44c90f02808f35a8f5f81c6daadb1f5ad8d948988eefe2ce.xls
Resource
win10v2004-20240709-en
General
-
Target
681ccd0cb009977c44c90f02808f35a8f5f81c6daadb1f5ad8d948988eefe2ce
-
Size
46KB
-
MD5
400cefb595914a7877868ba40701f3ed
-
SHA1
fc80e2beba1671b1409e6631ede20783a457d853
-
SHA256
681ccd0cb009977c44c90f02808f35a8f5f81c6daadb1f5ad8d948988eefe2ce
-
SHA512
7e1e7418d1913287720b3861554c0c586e4ae3c8ceaf8787d3dfbe13989196bd2825e5db5e7240ca4b10325dc400231f0f9336e38e46eadedd63cb5d2cfe4117
-
SSDEEP
768:uTYjlkqy41rk3hOdsylKlgryzc4bNhZFGzE+cLagHRtX1C89uawvb+ZHYdCsJD9q:yqyork3hOdsylKlgryzc4bNhZFGzE+cv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
681ccd0cb009977c44c90f02808f35a8f5f81c6daadb1f5ad8d948988eefe2ce.xls windows office2003
Kangatang