Behavioral task
behavioral1
Sample
5d871b0277bb414b3f0c39fdb8f08b20925f78c9e25e28c94f48f119f3c632e0.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d871b0277bb414b3f0c39fdb8f08b20925f78c9e25e28c94f48f119f3c632e0.xls
Resource
win10v2004-20240709-en
General
-
Target
5d871b0277bb414b3f0c39fdb8f08b20925f78c9e25e28c94f48f119f3c632e0
-
Size
886KB
-
MD5
4cc5ea69c23790910cb677d69a558949
-
SHA1
9cf27c4ca654325dc579ca387db298e8a7238928
-
SHA256
5d871b0277bb414b3f0c39fdb8f08b20925f78c9e25e28c94f48f119f3c632e0
-
SHA512
f4f9bee4fb35ea9625f4dc8d819fc6782452963979cd856042e1a4a8f59f5305bd6badff64bd1474d8d5494942fb4f8a5a28a723e09fb6ac2e6364b0554c13d5
-
SSDEEP
12288:p7LThF/78PmV+qiNV+kbrg+lS6yWlPwbUmafyw:p3PiT+kbVSiobUqw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5d871b0277bb414b3f0c39fdb8f08b20925f78c9e25e28c94f48f119f3c632e0.xls windows office2003
Kangatang
Sheet1
Sheet2