Behavioral task
behavioral1
Sample
104f0cd36a05e795a532037b8488035672ca9b919f55a3e5a0892b37b6fc8216.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
104f0cd36a05e795a532037b8488035672ca9b919f55a3e5a0892b37b6fc8216.xls
Resource
win10v2004-20240802-en
General
-
Target
104f0cd36a05e795a532037b8488035672ca9b919f55a3e5a0892b37b6fc8216
-
Size
221KB
-
MD5
7a062825d48adb698c65f0a9880210af
-
SHA1
68fd9364246d57ccd22b41b3e9621997b5111ef6
-
SHA256
104f0cd36a05e795a532037b8488035672ca9b919f55a3e5a0892b37b6fc8216
-
SHA512
fe8b619a8ed19f63f21b9218f764fb5b8702111bf013d94c57ded393c25ac01b3803d7f41717e523fa825e0f148fca801330d09492fe7bb5c0092162121718ba
-
SSDEEP
6144:rk3hOdsylKlgryzc4bNhZF+E+W4LgldAK1yrHr5zmsc4177ue1bMY3e8gWQvRCs:t/5zmU0eJP3eD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
104f0cd36a05e795a532037b8488035672ca9b919f55a3e5a0892b37b6fc8216.xls windows office2003
Kangatang