Behavioral task
behavioral1
Sample
9c1eaa2badd391daaebd0f38798a58a00b8890443279b15a0e558bd884a51956.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9c1eaa2badd391daaebd0f38798a58a00b8890443279b15a0e558bd884a51956.xls
Resource
win10v2004-20240802-en
General
-
Target
9c1eaa2badd391daaebd0f38798a58a00b8890443279b15a0e558bd884a51956
-
Size
1.0MB
-
MD5
a3cdc3f49f8f731e50ac433a9830350a
-
SHA1
3c5a25d430becce6fa5a69de85d58750fb859c9c
-
SHA256
9c1eaa2badd391daaebd0f38798a58a00b8890443279b15a0e558bd884a51956
-
SHA512
939bd15b816597bc12c157801bb488b8fac19057216dd877e90021dbc84df197f5fa92ee13cd72a6739250329ffd5e88c7b2cf3b390e8e21ec56018a5fb238ab
-
SSDEEP
12288:3IFTjSV/SKkk8HDV5BQ3kcFdNs6G2sqF3g:3IljsURXQ3kUdK6PD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9c1eaa2badd391daaebd0f38798a58a00b8890443279b15a0e558bd884a51956.xls windows office2003
Kangatang
ThisWorkbook