Behavioral task
behavioral1
Sample
4ba1a7042fb944cff858d2daa010dad6e20b0d1b0acf050da45c5131ecb80c3c.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ba1a7042fb944cff858d2daa010dad6e20b0d1b0acf050da45c5131ecb80c3c.xls
Resource
win10v2004-20240802-en
General
-
Target
4ba1a7042fb944cff858d2daa010dad6e20b0d1b0acf050da45c5131ecb80c3c
-
Size
87KB
-
MD5
c0871f848345c48b796d70f348bea920
-
SHA1
4fb1d25cfd13728f4d88ae207cd28a9f0b53e0e7
-
SHA256
4ba1a7042fb944cff858d2daa010dad6e20b0d1b0acf050da45c5131ecb80c3c
-
SHA512
2c233c6903c23d45b7da79080357c2274ae3394d9540ed02c095a2633edcf75ce3570ee56f2ff59a0e37b8881933f4e595a7c44c93d6d1b9adef43f0bb7305cf
-
SSDEEP
1536:UjxEtjPOtioVjDGUU1qfDlaGGx+cL/IEfZTgm0YTRyNUCZo4fEo2oGza86:UjxEtjPOtioVjDGUU1qfDlaGGx+cL/Iz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4ba1a7042fb944cff858d2daa010dad6e20b0d1b0acf050da45c5131ecb80c3c.xls windows office2003
Kangatang
ThisWorkbook