Behavioral task
behavioral1
Sample
80074a0cc56f8caab04cff94ad66ceb9ccb0a381b0d719b961da113275b0d9c4.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
80074a0cc56f8caab04cff94ad66ceb9ccb0a381b0d719b961da113275b0d9c4.xls
Resource
win10v2004-20240709-en
General
-
Target
80074a0cc56f8caab04cff94ad66ceb9ccb0a381b0d719b961da113275b0d9c4
-
Size
63KB
-
MD5
6b20dcfb697f039bed2dff99dd64d4f3
-
SHA1
f1bd6a8d587258a1b454541c6bcffc7a57880c8d
-
SHA256
80074a0cc56f8caab04cff94ad66ceb9ccb0a381b0d719b961da113275b0d9c4
-
SHA512
bbebb14660446d5e7da54381cb0970c12a4a874d7185ebe8f6324615be2ebbc9e7829a9358563d72c52bc707745d1b60c1f39ca61047b22eda4327431dcbd546
-
SSDEEP
1536:tiok3hbdlylKsgwyzcTbWhZFGkE+cLaxHAv2Muk2rxY/kJVApNZdX6dSI:trk3hbdlylKsgwyzcTbWhZFGkE+cLaxd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
80074a0cc56f8caab04cff94ad66ceb9ccb0a381b0d719b961da113275b0d9c4.xls windows office2003
Kangatang
ThisWorkbook