Behavioral task
behavioral1
Sample
4d46cc69b5b449a6fc9b73d067e117d7f231626a76de61dd46772b5d5df1f9e5.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d46cc69b5b449a6fc9b73d067e117d7f231626a76de61dd46772b5d5df1f9e5.xls
Resource
win10v2004-20240704-en
General
-
Target
4d46cc69b5b449a6fc9b73d067e117d7f231626a76de61dd46772b5d5df1f9e5
-
Size
3.7MB
-
MD5
70942019011a5362ad1bdb87fdda5dc3
-
SHA1
f4276054c838f58fd1f11700372751a2b732d54b
-
SHA256
4d46cc69b5b449a6fc9b73d067e117d7f231626a76de61dd46772b5d5df1f9e5
-
SHA512
a2d49ef7bddcd5425751015651cbd6ac6d52dc71d34a6f665e8d8bba3cf8de20c9a243a2889d1c864151939c6d14bccbb2e1121ff37f0279ff31375c9a10b963
-
SSDEEP
98304:ijuG8NTCp6GOjEiwDjOc0PxoHpslWdAi75Z9z/7M9gp:ijuGuTCpBO5OjOc0SJb5FZ9zDMGp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4d46cc69b5b449a6fc9b73d067e117d7f231626a76de61dd46772b5d5df1f9e5.xls windows office2003
Kangatang
ThisWorkbook