Behavioral task
behavioral1
Sample
e433ee07bf1f5d84d14bb76de2e337c8b6d45d8668c123a3a3081370e8701e6b.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e433ee07bf1f5d84d14bb76de2e337c8b6d45d8668c123a3a3081370e8701e6b.xls
Resource
win10v2004-20240802-en
General
-
Target
e433ee07bf1f5d84d14bb76de2e337c8b6d45d8668c123a3a3081370e8701e6b
-
Size
6.7MB
-
MD5
8bea09906d23a7baca6657b4977ff528
-
SHA1
12a89476f0b2e867e522b0ad6498d89eaea3dba9
-
SHA256
e433ee07bf1f5d84d14bb76de2e337c8b6d45d8668c123a3a3081370e8701e6b
-
SHA512
00efcbb07edbce2855ac05fc078db75ff0ce2c5273d545a3bd14ae672b2c4b53f4a71339ab718909a92c884504c0be3a8f8afd3fd3901d1133bcbdc769770043
-
SSDEEP
196608:s+JAN99UgGNrnPviJs63qJQh3TTiPcDX8y/3YNH:FJANAbPviJs+aQhDOPcfIN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e433ee07bf1f5d84d14bb76de2e337c8b6d45d8668c123a3a3081370e8701e6b.xls windows office2003
Kangatang