Behavioral task
behavioral1
Sample
c41a6e4b2ccf2cc44ae7fa924eb915eb9555e0a79c347eb940d7a7a9b000e0e3.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c41a6e4b2ccf2cc44ae7fa924eb915eb9555e0a79c347eb940d7a7a9b000e0e3.xls
Resource
win10v2004-20240802-en
General
-
Target
c41a6e4b2ccf2cc44ae7fa924eb915eb9555e0a79c347eb940d7a7a9b000e0e3
-
Size
256KB
-
MD5
314a82a71a80ec9b60026b2c295ab51a
-
SHA1
697da4c5a2a2c1c1589b8b48fd742bf78aae6911
-
SHA256
c41a6e4b2ccf2cc44ae7fa924eb915eb9555e0a79c347eb940d7a7a9b000e0e3
-
SHA512
49801253d460354e11ca76121e2b3114c8efe091183c59d45cfba1ab21eb08744db261d49ee014c9c68166e089f68efd30dd31220e3addbdbf1bd12891181178
-
SSDEEP
6144:5k3hOdsylKlgryzc4bNhZF+E+ZPUwKY1/nS7ku131L1EtyyQsp5X7:HnSp139C
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c41a6e4b2ccf2cc44ae7fa924eb915eb9555e0a79c347eb940d7a7a9b000e0e3.xls windows office2003
Kangatang
ThisWorkbook
Sheet1