Behavioral task
behavioral1
Sample
720f89d148252067eda76db384cc771b27b8682c7decd117b6049dbd32cd9c75.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
720f89d148252067eda76db384cc771b27b8682c7decd117b6049dbd32cd9c75.xls
Resource
win10v2004-20240802-en
General
-
Target
720f89d148252067eda76db384cc771b27b8682c7decd117b6049dbd32cd9c75
-
Size
2.6MB
-
MD5
93459a464be3df2ab769e6e7c21c813a
-
SHA1
83e7a779025db96a4324003c41107eacd037722a
-
SHA256
720f89d148252067eda76db384cc771b27b8682c7decd117b6049dbd32cd9c75
-
SHA512
29ded7a9b874cd896d994b7105146505f3d3772edbd2b9efeee60957702da72e22217e9ab0f4db4e3b72f4d48f825905c52d4815f0309429b10f499860da60ce
-
SSDEEP
49152:ateH9QsO+yzCqK0iwlmx5vfi+IYRllj0TzETPY3xXyL:ateddO+VAiwwxNK+RjklhCL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
720f89d148252067eda76db384cc771b27b8682c7decd117b6049dbd32cd9c75.xls windows office2003
Kangatang