Behavioral task
behavioral1
Sample
55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls
Resource
win10v2004-20240709-en
General
-
Target
55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f
-
Size
216KB
-
MD5
2d243529f761d17f318bb8f323353f2c
-
SHA1
6f2a9b6aedf2ca82029922ac8a228cd4a80f069c
-
SHA256
55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f
-
SHA512
4f9459b6cbd86903e22cc6d8cf0d048430374f2d0832f668993cb4e2c30926aa4123703408ae8a8a75cd4883b894540bb03da106675d8aa4724e5f93f6195a60
-
SSDEEP
6144:enFPRnKYqUaAMOwm8m/5DJfxZfHIxEtjPOtioVjDGUU1qfDlavx+W/IE3uqeFk:E
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls windows office2003
Kangatang
ThisWorkbook
Sheet1
Sheet2
Sheet3
Sheet4
Sheet5
Sheet6
Sheet7
Sheet8
Sheet9
Sheet10
Sheet11
Sheet12
Sheet13