Behavioral task
behavioral1
Sample
f58960627cc4365c854f21658b9ac271ca899ccaf9e955251cc91ed5ba503cd8.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f58960627cc4365c854f21658b9ac271ca899ccaf9e955251cc91ed5ba503cd8.xls
Resource
win10v2004-20240709-en
General
-
Target
f58960627cc4365c854f21658b9ac271ca899ccaf9e955251cc91ed5ba503cd8
-
Size
3.7MB
-
MD5
268e2ba2f8470f71423eb524dd071f0d
-
SHA1
9c9d137c7f8107166207cef546a03746b3245f56
-
SHA256
f58960627cc4365c854f21658b9ac271ca899ccaf9e955251cc91ed5ba503cd8
-
SHA512
f511df85ea3c900afab812b19532d3d5553d001f9352ba8d3d6a705b805490ad7def09d7697e2d6dc50c10b85e58a3543f2f27cfa45c3d1bd9a817eb7f282a07
-
SSDEEP
98304:ujuG8NTCp6GOjEiwDjOc0PxoHpslWdAi75Z9z/7M9gp:ujuGuTCpBO5OjOc0SJb5FZ9zDMGp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f58960627cc4365c854f21658b9ac271ca899ccaf9e955251cc91ed5ba503cd8.xls windows office2003
Kangatang
ThisWorkbook