Behavioral task
behavioral1
Sample
e8817376568eabb9cf0ce9472d545b78488e261b8689b2cc9f4c8701e5e4d8cb.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e8817376568eabb9cf0ce9472d545b78488e261b8689b2cc9f4c8701e5e4d8cb.xls
Resource
win10v2004-20240802-en
General
-
Target
e8817376568eabb9cf0ce9472d545b78488e261b8689b2cc9f4c8701e5e4d8cb
-
Size
39KB
-
MD5
2cb44c48fb8d2220288fcd0aa29744b0
-
SHA1
d27d0dc8996cd4ea9cf72227efb4c5258a99bbd2
-
SHA256
e8817376568eabb9cf0ce9472d545b78488e261b8689b2cc9f4c8701e5e4d8cb
-
SHA512
386e3a8f007fbdbf145b1881c1cefa33b5e02850db9b980f7b39cbefc3e58520119aaeef16ed9ffbc24fdc71fdef763c519254e025cd39cef11b6df467b6571d
-
SSDEEP
768:1nuSbRxEtjPOtioVjDGUU1qfDlaGGx+cLWIEAWnZnUfQS5Ssza86:1u4xEtjPOtioVjDGUU1qfDlaGGx+cLWT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e8817376568eabb9cf0ce9472d545b78488e261b8689b2cc9f4c8701e5e4d8cb.xls windows office2003
Kangatang
ThisWorkbook