Behavioral task
behavioral1
Sample
229bb723587ca99e5a65351d70a99d1afae1bc66fb883e361fa24f298439cb78.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
229bb723587ca99e5a65351d70a99d1afae1bc66fb883e361fa24f298439cb78.xls
Resource
win10v2004-20240802-en
General
-
Target
229bb723587ca99e5a65351d70a99d1afae1bc66fb883e361fa24f298439cb78
-
Size
35KB
-
MD5
ccd3d37fd12bdc1424b9fed03c285ac9
-
SHA1
1becc4b2a11a16014e47a5e33ea187d4ff2723b8
-
SHA256
229bb723587ca99e5a65351d70a99d1afae1bc66fb883e361fa24f298439cb78
-
SHA512
042682006cac76722b3edd3a2abf9d3ddff529b0b6d46c4b2e806c905910f03d3f4e5c336fc3b872ccce489de4b30dfe10b61832367362bfb2a07d75ac8b8d0b
-
SSDEEP
768:LnPFfvZ+RwPONXoRjDhIcp0fDlaGGx+cLWWEAWl3Aq+Vd24jX:zPFZ+RwPONXoRjDhIcp0fDlaGGx+cLWC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
229bb723587ca99e5a65351d70a99d1afae1bc66fb883e361fa24f298439cb78.xls windows office2003
Kangatang