Behavioral task
behavioral1
Sample
4c489dd255f3c22780e407586291ee682f2196df3ea1512372eb49570f62f4ca.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c489dd255f3c22780e407586291ee682f2196df3ea1512372eb49570f62f4ca.xls
Resource
win10v2004-20240802-en
General
-
Target
4c489dd255f3c22780e407586291ee682f2196df3ea1512372eb49570f62f4ca
-
Size
566KB
-
MD5
e5adfbb01a45157b58dc3ba10bd461c8
-
SHA1
1c955c9f2056ecbcf5c50afa6f371f2b3b62918a
-
SHA256
4c489dd255f3c22780e407586291ee682f2196df3ea1512372eb49570f62f4ca
-
SHA512
b7c136b3689f25df8a93aa44ef8f0844f1258a1ab42c24ecf8e76eaef09dfc9c389f0e512b7b347340978d9444d57f780f81df98f82304370c4317347de9d7c2
-
SSDEEP
12288:mzok5B3UmwRIOyCAnFAm4Ayu/xB5OTKsqNurXqqPLbK:mr5B3Um1CAUVYv5OG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4c489dd255f3c22780e407586291ee682f2196df3ea1512372eb49570f62f4ca.xls windows office2003
Kangatang
ThisWorkbook