Behavioral task
behavioral1
Sample
b1d35da758704011a3217afee772959fa2115884cef8f194c85fb52237275960.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b1d35da758704011a3217afee772959fa2115884cef8f194c85fb52237275960.xls
Resource
win10v2004-20240802-en
General
-
Target
b1d35da758704011a3217afee772959fa2115884cef8f194c85fb52237275960
-
Size
256KB
-
MD5
28f7f15ec3491bcbe9578feb17dc60e2
-
SHA1
515c2a8bd27db8d5f15c2751016b187f46454c9a
-
SHA256
b1d35da758704011a3217afee772959fa2115884cef8f194c85fb52237275960
-
SHA512
36d9bdda45639a7e20514dd114d19d942d69fcbcb1f057c6938134879db72030fe77e3f8175783b7b1af89d9328e41eaf92d302f9f688853839eebd6a78b0e98
-
SSDEEP
6144:vk3hOdsylKlgryzc4bNhZF+E+ZPUwKY+/n17ku1b1L1Etyyusp5:An1p1b9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b1d35da758704011a3217afee772959fa2115884cef8f194c85fb52237275960.xls windows office2003
Kangatang
ThisWorkbook
Sheet1