Behavioral task
behavioral1
Sample
02113aba83264dccaa4d2be39b11de1b3caf90d9420babe29fc0e26d86c5c190.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
02113aba83264dccaa4d2be39b11de1b3caf90d9420babe29fc0e26d86c5c190.xls
Resource
win10v2004-20240802-en
General
-
Target
02113aba83264dccaa4d2be39b11de1b3caf90d9420babe29fc0e26d86c5c190
-
Size
49KB
-
MD5
ba3068172289f483e94506baceeefe6d
-
SHA1
c143bf4d0499bafcaa13db37be19276d9b420ab9
-
SHA256
02113aba83264dccaa4d2be39b11de1b3caf90d9420babe29fc0e26d86c5c190
-
SHA512
9c55f549e012a44a094948e35a3e323da41914dfc5620246c0e32a67d5d76307f062960e7ab6727644309de63c07e1d53d3f2e2274cfaa403bb8c29bff34fa86
-
SSDEEP
1536:FCk3hbdlylKsgwyzcTbWhZFGkE+cLaxHA5/f0Tvd:FCk3hbdlylKsgwyzcTbWhZFGkE+cLaxB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
02113aba83264dccaa4d2be39b11de1b3caf90d9420babe29fc0e26d86c5c190.xls windows office2003
Kangatang
ThisWorkbook