Behavioral task
behavioral1
Sample
030647cf9cc3a3bbc5b277007c005f802ab6f7edb2385912c792f2fc85e77c30.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
030647cf9cc3a3bbc5b277007c005f802ab6f7edb2385912c792f2fc85e77c30.xls
Resource
win10v2004-20240802-en
General
-
Target
030647cf9cc3a3bbc5b277007c005f802ab6f7edb2385912c792f2fc85e77c30
-
Size
1.4MB
-
MD5
f99c43bcd98be6f6233fe4dee6ca5f44
-
SHA1
f11ed01f3845d6b6fc17b027105719ac4deb7914
-
SHA256
030647cf9cc3a3bbc5b277007c005f802ab6f7edb2385912c792f2fc85e77c30
-
SHA512
9b1b3768750cefc5c164243dacedd8b533ae9bb5908bc3158b534821b36fc689daa729e14e409a77c311b9b41cea7fa849a136feeb8dfd5ab58c4baeeee6cb22
-
SSDEEP
24576:rD5hkdyIQ3bND//E3d5p5qolP3mpwAttNN1tVjAmpxOsr5FM7un:pfDBz8KoB3mpBX5Frn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
030647cf9cc3a3bbc5b277007c005f802ab6f7edb2385912c792f2fc85e77c30.xls windows office2003
Kangatang