Behavioral task
behavioral1
Sample
0616128cde32ecd05d15c4dcf740bc3f77614546ab1208504b119d8cdb71e559.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0616128cde32ecd05d15c4dcf740bc3f77614546ab1208504b119d8cdb71e559.xls
Resource
win10v2004-20240802-en
General
-
Target
0616128cde32ecd05d15c4dcf740bc3f77614546ab1208504b119d8cdb71e559
-
Size
95KB
-
MD5
7bb95ac7212f5dc2bd3198c4f7779175
-
SHA1
6483955f9bb2ed282b7cbf65bb4d41d6efd6ff7d
-
SHA256
0616128cde32ecd05d15c4dcf740bc3f77614546ab1208504b119d8cdb71e559
-
SHA512
f7f665402c567d69f5357c8232c28d908c87fa35de35ec771e91592556ae96736a9b9ec5950830b7c99938aefcefefde2bf735445a17ac21d4639344072a9585
-
SSDEEP
768:Sb4aMikWoUB4mXg/s5zib0+yOiCgJoFfqbUqJfGGaovg/jeVBFB2bVhEeJ7MZ4N/:xWoUB4mXgEziI+RiChVrlXQAS39
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0616128cde32ecd05d15c4dcf740bc3f77614546ab1208504b119d8cdb71e559.xls windows office2003
Kangatang
ThisWorkbook