Behavioral task
behavioral1
Sample
73c198ae40dd77b8bac4bbc87f44b2c92bd18481c191e7fe4ba7e7b32be67a0c.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73c198ae40dd77b8bac4bbc87f44b2c92bd18481c191e7fe4ba7e7b32be67a0c.xls
Resource
win10v2004-20240802-en
General
-
Target
73c198ae40dd77b8bac4bbc87f44b2c92bd18481c191e7fe4ba7e7b32be67a0c
-
Size
2.6MB
-
MD5
8c6c6e8b58f29ed896fcdf41639047eb
-
SHA1
64abf7cb4fc732330033f553d49ea607efa40fe8
-
SHA256
73c198ae40dd77b8bac4bbc87f44b2c92bd18481c191e7fe4ba7e7b32be67a0c
-
SHA512
6daeefd15652fd6435dec32e9384ccb9dd670db5caa525d6ba15328d9259d563f1b631d49055a040e6ec492c4f63d256530616510a88d1438cea1d66946a64f8
-
SSDEEP
49152:5tSbRQsOSW7CuKkuQ5mx5v/W+IYxxpj07TE7zU3xXy7:5tStdOShkuQsxN++xj8thC7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
73c198ae40dd77b8bac4bbc87f44b2c92bd18481c191e7fe4ba7e7b32be67a0c.xls windows office2003
Kangatang
ThisWorkbook