Behavioral task
behavioral1
Sample
6836fdaa19c556a0fabb276cefa4a19f749e608a0460e5a20d5ba3fa732af839.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6836fdaa19c556a0fabb276cefa4a19f749e608a0460e5a20d5ba3fa732af839.xls
Resource
win10v2004-20240802-en
General
-
Target
6836fdaa19c556a0fabb276cefa4a19f749e608a0460e5a20d5ba3fa732af839
-
Size
200KB
-
MD5
182c27ada8fd07a29555f2edb23394ef
-
SHA1
b77ffaeeea27db426a6d233412d1b319be31254e
-
SHA256
6836fdaa19c556a0fabb276cefa4a19f749e608a0460e5a20d5ba3fa732af839
-
SHA512
2506c64db16ace02f31e94daa4e2e3c6c69dcd1d749e3e8112ec1cf5e567bf53c8c9b08780c3f62ea05d85a339bed82df04ac83d6986705d34c00c2db6d3b982
-
SSDEEP
1536:Lzi7n3atlsxPLeBQGaiY7yzdzVn/cTGZybza86:L+7nKtlsxNijzVn/cTGGzh6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6836fdaa19c556a0fabb276cefa4a19f749e608a0460e5a20d5ba3fa732af839.xls windows office2003
Kangatang
ThisWorkbook