Behavioral task
behavioral1
Sample
d4eef725147e1d4bea54aa893df7b85a36868b2e6010df295ff6e31b74bd0e8b.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d4eef725147e1d4bea54aa893df7b85a36868b2e6010df295ff6e31b74bd0e8b.xls
Resource
win10v2004-20240802-en
General
-
Target
d4eef725147e1d4bea54aa893df7b85a36868b2e6010df295ff6e31b74bd0e8b
-
Size
1.5MB
-
MD5
b78132df65c9317c4a97bf150b1d629c
-
SHA1
31cc8e9e5a833619cbd71c493223e244b702a678
-
SHA256
d4eef725147e1d4bea54aa893df7b85a36868b2e6010df295ff6e31b74bd0e8b
-
SHA512
398c9d848888d75492ea4f6a83e8c563114aa160133a53022e48e954aabd245a049aba6283a01054e0b57ab8fac9ca098f415d768ad4bc076ee6e5f2303f6f1b
-
SSDEEP
24576:vDlhcd2IQnbFD//g3d5p5moNPXmpwAt9VN9tVjACpxusr5Ty7u53:5LD5z4GoJXmpB/JZrf
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d4eef725147e1d4bea54aa893df7b85a36868b2e6010df295ff6e31b74bd0e8b.xls windows office2003
Kangatang
ThisWorkbook