Behavioral task
behavioral1
Sample
0165845778297fbf9a690f81fd728a0f2efcf1eaa25227a854347dd4eedef198.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0165845778297fbf9a690f81fd728a0f2efcf1eaa25227a854347dd4eedef198.xls
Resource
win10v2004-20240802-en
General
-
Target
0165845778297fbf9a690f81fd728a0f2efcf1eaa25227a854347dd4eedef198
-
Size
287KB
-
MD5
08944306a2c2202e0548285f7beb0880
-
SHA1
75c14beaebd3989fee918af3e8a18b1922dda4f5
-
SHA256
0165845778297fbf9a690f81fd728a0f2efcf1eaa25227a854347dd4eedef198
-
SHA512
9d1de4d208f29cd51ba78eb3d38cfa1ba6d13b7b764bedd1a8f07e679a59285c42e63c3041fc135f220d84359b80bd883ccc2957ca36a623772b7fc2c9fc6c76
-
SSDEEP
6144:QxEtjPOtioVjDGUU1qfDlavx+3vQ098PI5a7y/mTGTEEfwXmrijv2ZMBw/MH4Too:3PnYp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0165845778297fbf9a690f81fd728a0f2efcf1eaa25227a854347dd4eedef198.xls windows office2003
Kangatang
ThisWorkbook