Behavioral task
behavioral1
Sample
cc689c88cbf326e77a9ccb0e59411e0ce7aad31fc90f1394658faba489b8c169.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cc689c88cbf326e77a9ccb0e59411e0ce7aad31fc90f1394658faba489b8c169.xls
Resource
win10v2004-20240802-en
General
-
Target
cc689c88cbf326e77a9ccb0e59411e0ce7aad31fc90f1394658faba489b8c169
-
Size
8.1MB
-
MD5
49a6b12ae6cdbcbc8a7a5c3b61054f5d
-
SHA1
df5de94ceba50ec0f7b90962603c026894069b6a
-
SHA256
cc689c88cbf326e77a9ccb0e59411e0ce7aad31fc90f1394658faba489b8c169
-
SHA512
b80a81521231e98592f5a5ff37ff62382020252c51ff295caf490ef277dd3bc4b07f1f62013bd4819a2914e8fb8a29605a6fb0a2d1304123ae3efe6e43cc8bcb
-
SSDEEP
196608:GQCvdSJwgOqKglt11SVyBal99SQbQZw9Tyje1Sq8BQdHj/J:GQCkJOdgR1mQi9REO6JqG2
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cc689c88cbf326e77a9ccb0e59411e0ce7aad31fc90f1394658faba489b8c169.xls windows office2003
Kangatang