Behavioral task
behavioral1
Sample
e8efeed1a4218bc932082748bb77798b747d51252169b977da7e77daf5c186c3.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e8efeed1a4218bc932082748bb77798b747d51252169b977da7e77daf5c186c3.xls
Resource
win10v2004-20240802-en
General
-
Target
e8efeed1a4218bc932082748bb77798b747d51252169b977da7e77daf5c186c3
-
Size
81KB
-
MD5
144795c0342ed3bbca3a7adacbc3d842
-
SHA1
e828e42360e85f784d94f939d6d60f5ec1be85be
-
SHA256
e8efeed1a4218bc932082748bb77798b747d51252169b977da7e77daf5c186c3
-
SHA512
b75129568b1640800f2f555c7b7d6ef28ab8814a5174bc7d5fe8cda358f4c8f6d0bbafac47431f7f62276c7b0208f43fee35137bedfbcab8eff1a92a9fa88118
-
SSDEEP
1536:XVwihSuvqYvhePUdSOTwcrVVsJkmza86:lJhSuvqYvhePUdSOxXEzh6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e8efeed1a4218bc932082748bb77798b747d51252169b977da7e77daf5c186c3.xls windows office2003
Kangatang
ThisWorkbook