Behavioral task
behavioral1
Sample
637eacb34026e6bfc69ca7c9d74f09c60a20eded1e96840a6106256d193150eb.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
637eacb34026e6bfc69ca7c9d74f09c60a20eded1e96840a6106256d193150eb.xls
Resource
win10v2004-20240709-en
General
-
Target
637eacb34026e6bfc69ca7c9d74f09c60a20eded1e96840a6106256d193150eb
-
Size
116KB
-
MD5
2fc35fc25329b0d498d6ebc9deb9f853
-
SHA1
6a3b8257112d6387310c76e5bce8536809765b55
-
SHA256
637eacb34026e6bfc69ca7c9d74f09c60a20eded1e96840a6106256d193150eb
-
SHA512
f3be3c2791db3630d922cefb694353af847af2c2d819312a7bcdd079c4ab10421f7883c7562fa09fb679ad31b5f65ee36adc92d99e95e8206b2dd3ab82d9242f
-
SSDEEP
3072:NkN/UjZ0n0QyOazERQHLwQp0tm8RShmNIG0tVKmjhyN:470U650t3RShmNIG0tVK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
637eacb34026e6bfc69ca7c9d74f09c60a20eded1e96840a6106256d193150eb.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Kangatang