Behavioral task
behavioral1
Sample
28e744db2c51c1e7e5480e65ebd09cc2d506a8c44a7742497fe1d2770874cc6b.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
28e744db2c51c1e7e5480e65ebd09cc2d506a8c44a7742497fe1d2770874cc6b.xls
Resource
win10v2004-20240802-en
General
-
Target
28e744db2c51c1e7e5480e65ebd09cc2d506a8c44a7742497fe1d2770874cc6b
-
Size
679KB
-
MD5
91ee701eda1eea644c50626b1b486a20
-
SHA1
d31195823d00ed5209f517c7c9bf3d23dd1ca73c
-
SHA256
28e744db2c51c1e7e5480e65ebd09cc2d506a8c44a7742497fe1d2770874cc6b
-
SHA512
f4fde9bf8031e5f8cd1a55816b676beb81527a0cc91d2af1ac7894d01b2230c027d226e736dbb2d91c2c4e27bd7c59cc953799f12e2056ca748c2a8206b9eda3
-
SSDEEP
6144:KpmjV22STDvEX1BZXUMh9FzrT/39IqEMtIlHiK6m57Xp:DpSTDshEmeqLyl33
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
28e744db2c51c1e7e5480e65ebd09cc2d506a8c44a7742497fe1d2770874cc6b.xls windows office2003
Kangatang
Kangatang_2
Kangatang_3
Kangatang_4
Kangatang_5
Kangatang_6
Kangatang_7
Kangatang_8
Kangatang_9
Kangatang_10
Kangatang_11
Kangatang_12
Kangatang_13
Kangatang_14
Kangatang_15
Kangatang_16
Kangatang_17
Kangatang_18
Kangatang_19
Kangatang_20
Kangatang_21
Kangatang_22
Kangatang_23
Kangatang_24
Kangatang_25
Kangatang_26
Kangatang_27
Kangatang_28
Kangatang_29
Kangatang_30
Kangatang_31
Kangatang_32
Kangatang_33
Kangatang_34
Kangatang_35
Kangatang_36
Kangatang_37
Kangatang_38
Kangatang_39
Kangatang_40
Kangatang_41
Kangatang_42
Kangatang_43
Kangatang_44
Kangatang_45
Kangatang_46
Kangatang_47
Kangatang_48
Kangatang_49
Kangatang_50
Kangatang_51
Kangatang_52
Kangatang_53
Kangatang_54
Kangatang_55
Kangatang_56
Kangatang_57
Kangatang_58
Kangatang_59
Kangatang_60
Kangatang_61
Kangatang_62
Kangatang_63
Kangatang_64
Kangatang_65
Kangatang_66
Kangatang_67
Kangatang_68
Kangatang_69
Kangatang_70
Kangatang_71
Kangatang_72
Kangatang_73