Behavioral task
behavioral1
Sample
5515e4c6eb17c8c49dd830b68ff993965ba50df5a4bad0b70471a25f1c6cd257.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5515e4c6eb17c8c49dd830b68ff993965ba50df5a4bad0b70471a25f1c6cd257.xls
Resource
win10v2004-20240802-en
General
-
Target
5515e4c6eb17c8c49dd830b68ff993965ba50df5a4bad0b70471a25f1c6cd257
-
Size
2.6MB
-
MD5
7101af96a1499a02c5748ac87f8df958
-
SHA1
335c0ded47df6e836a5324bf4f0f3f9aa37632d2
-
SHA256
5515e4c6eb17c8c49dd830b68ff993965ba50df5a4bad0b70471a25f1c6cd257
-
SHA512
abc3bd8b95b68568a972d4a7d9d815953e87262983ff12e66a2dd4c7a76064a415ed15b961cbf79e97701f70f02697964df3c4bd4fb906758d902bc9a3d2bb73
-
SSDEEP
49152:5teH9QsO+yzCqK0iwlmx5vfi+IYRllj0TzETPY3xXyL:5teddO+VAiwwxNK+RjklhCL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5515e4c6eb17c8c49dd830b68ff993965ba50df5a4bad0b70471a25f1c6cd257.xls windows office2003
Kangatang