Behavioral task
behavioral1
Sample
5769ab5a827da0914e78bacdd69c7953d748263d87cdf97d959a19778bb95756.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5769ab5a827da0914e78bacdd69c7953d748263d87cdf97d959a19778bb95756.xls
Resource
win10v2004-20240704-en
General
-
Target
5769ab5a827da0914e78bacdd69c7953d748263d87cdf97d959a19778bb95756
-
Size
886KB
-
MD5
9edbefc11f8787cb92d19daa64d26715
-
SHA1
ed6649c896b4b62ef123af33371eabcb165abd86
-
SHA256
5769ab5a827da0914e78bacdd69c7953d748263d87cdf97d959a19778bb95756
-
SHA512
70806f319114cb286835a48d297c4399e6eff7de36118aef8e60481ae28b25b55d8526025a75b54dc1a10e2ef762f65ef9c86b7df23b49cd358e903d0d65d4f9
-
SSDEEP
12288:U7LThF/78PmV+qiNV+kbrg+lS6yWlPwbUmafyw:U3PiT+kbVSiobUqw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5769ab5a827da0914e78bacdd69c7953d748263d87cdf97d959a19778bb95756.xls windows office2003
Kangatang
Sheet1
Sheet2