Behavioral task
behavioral1
Sample
7529f7690b9776e20673e23d55df0b2faeeb3a9a490ae6ad8426aae5ebaf1e64.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7529f7690b9776e20673e23d55df0b2faeeb3a9a490ae6ad8426aae5ebaf1e64.xls
Resource
win10v2004-20240802-en
General
-
Target
7529f7690b9776e20673e23d55df0b2faeeb3a9a490ae6ad8426aae5ebaf1e64
-
Size
403KB
-
MD5
9f637c6dd4b882af2ef8fd9291b7a9e6
-
SHA1
db2eb3998556207aacbd9f0c70fa826acc47c1be
-
SHA256
7529f7690b9776e20673e23d55df0b2faeeb3a9a490ae6ad8426aae5ebaf1e64
-
SHA512
38eab84ed8b380a37317ef3ad48d3240c3c027b1e5fa7330db5c3188a755c2cc34b46856f012780775e2e67d081eba62e1e4a23f7db77414821da8756780d010
-
SSDEEP
12288:EVT5TFDRBEbPnT/uGy9mvs6xHVMX3xpLZDNmmirjt+0hrwHO8E2e4CwTAEuiv6A1:EVT5TFDRtb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7529f7690b9776e20673e23d55df0b2faeeb3a9a490ae6ad8426aae5ebaf1e64.xls windows office2003
Kangatang