Behavioral task
behavioral1
Sample
0f51ecb315ae15a5880e188fd33decb41df7d5a96304cb0b9a1c71baa545f8cb.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0f51ecb315ae15a5880e188fd33decb41df7d5a96304cb0b9a1c71baa545f8cb.xls
Resource
win10v2004-20240709-en
General
-
Target
0f51ecb315ae15a5880e188fd33decb41df7d5a96304cb0b9a1c71baa545f8cb
-
Size
886KB
-
MD5
01754eb2397103ec7ca63b329cb987f1
-
SHA1
47bf843a5c68fdbd1f5c3f2798eb1ad4c86a8697
-
SHA256
0f51ecb315ae15a5880e188fd33decb41df7d5a96304cb0b9a1c71baa545f8cb
-
SHA512
f3332069c6a91ff2d5ca8de1452585bda0830c254b18ce143f6473d94c5e61afc04127f7b234cb14c7eca9fe9039c4256bf4996db88b8a1c1f4211aa67325738
-
SSDEEP
12288:I7LThF/78PmV+qiNV+kbrg+lS6yWlPwbUmafyw:I3PiT+kbVSiobUqw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0f51ecb315ae15a5880e188fd33decb41df7d5a96304cb0b9a1c71baa545f8cb.xls windows office2003
Kangatang
Sheet1
Sheet2