Behavioral task
behavioral1
Sample
7a3dd5f203eac61c482cf65407b2d304b92680c018ef2cec30e320dc7f4e074f.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7a3dd5f203eac61c482cf65407b2d304b92680c018ef2cec30e320dc7f4e074f.xls
Resource
win10v2004-20240802-en
General
-
Target
7a3dd5f203eac61c482cf65407b2d304b92680c018ef2cec30e320dc7f4e074f
-
Size
1.5MB
-
MD5
17edea556049b65889169c69bbe93d8d
-
SHA1
3de0f4c31a07634b3e6754bd5e265b000da15d2f
-
SHA256
7a3dd5f203eac61c482cf65407b2d304b92680c018ef2cec30e320dc7f4e074f
-
SHA512
39f454c971392563ef62b944b1b8f1938913a6495b7df6f53b1c5b8f44cf2ddb0a9e6bd24431686cc5d44cac5f57aa7d9c4c43a6dab07f022316b5eff823e8d6
-
SSDEEP
24576:YDxhcd2IQnbFD//g3d5p5moNPXmpwAt9VN9tVjACpxusr5vy7utZ:2LD5z4GoJXmpB/JZrX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7a3dd5f203eac61c482cf65407b2d304b92680c018ef2cec30e320dc7f4e074f.xls windows office2003
Kangatang
ThisWorkbook