Behavioral task
behavioral1
Sample
18f224636123b7590951f300455645ddeafc9ea3c9464879119a281cd4c6fb95.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
18f224636123b7590951f300455645ddeafc9ea3c9464879119a281cd4c6fb95.xls
Resource
win10v2004-20240709-en
General
-
Target
18f224636123b7590951f300455645ddeafc9ea3c9464879119a281cd4c6fb95
-
Size
488KB
-
MD5
8faca1fe1a2bf46bdcb81872600ee6a3
-
SHA1
ce8d28789593bd8754a48c118ae594e6bca74b57
-
SHA256
18f224636123b7590951f300455645ddeafc9ea3c9464879119a281cd4c6fb95
-
SHA512
f0d8a520433943d3c32c04b3070d04ff999967f327f61c676b525616b961dc7496f1f81dadc2a3ae14e0c8b2fb0ce30988e69ecd4e4c51b6083788f10449f547
-
SSDEEP
6144:viY/O/NPMQagqVyT7mLSapnFIsONdhu8DOixYt7+ijC:98NEQnqIT7mLbsdjM7+ij
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
18f224636123b7590951f300455645ddeafc9ea3c9464879119a281cd4c6fb95.xls windows office2003
Kangatang