Behavioral task
behavioral1
Sample
7b44b362de371182ddde982859bdef7dab62fae6853959bb58bf0498274f6357.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7b44b362de371182ddde982859bdef7dab62fae6853959bb58bf0498274f6357.xls
Resource
win10v2004-20240709-en
General
-
Target
7b44b362de371182ddde982859bdef7dab62fae6853959bb58bf0498274f6357
-
Size
3.7MB
-
MD5
941f4cd8bbdd211ffdc348fb783273af
-
SHA1
05241cb2124ec716381896e99a9d24f47f836920
-
SHA256
7b44b362de371182ddde982859bdef7dab62fae6853959bb58bf0498274f6357
-
SHA512
c1b3fb4af3300bf56cce27fa058dc7cd3716a9b002180fc2d665c2cabfc34a6755c952856e5dc3ad6b898c85ad66e9fa0568cbe476755078b08ef1e2acb66271
-
SSDEEP
98304:YjaS8pTCdC2Ovwiw/jOYYZxwDdobe9wivVxdBR1mxIJ:YjaSKTCdJORijOYYoZpZtxdBrmCJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7b44b362de371182ddde982859bdef7dab62fae6853959bb58bf0498274f6357.xls windows office2003
Kangatang
ThisWorkbook