Behavioral task
behavioral1
Sample
fb73449fbd55160f3c3cca5b6be7a1880fb64fe20891be249dd852fc2052760d.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fb73449fbd55160f3c3cca5b6be7a1880fb64fe20891be249dd852fc2052760d.xls
Resource
win10v2004-20240802-en
General
-
Target
fb73449fbd55160f3c3cca5b6be7a1880fb64fe20891be249dd852fc2052760d
-
Size
693KB
-
MD5
e55942f0797a1dbc0d8013901ddcf518
-
SHA1
373cc8b613e6cf3ad5d9bc0ac64dbaea47e1fbf9
-
SHA256
fb73449fbd55160f3c3cca5b6be7a1880fb64fe20891be249dd852fc2052760d
-
SHA512
898f0f4c8131995194fcf22c12022a941126caf6b082d0600069d676e4f1186f9ea4c204eee2b801e8ae9e7f680a27f4fdfd2089b3779c2453b89afc5b06551d
-
SSDEEP
6144:HXGSLClloZMLG9ezF44uc+HHLeBUGApDl9glmHgRTt/dVFo3V0zNSgXh:d3V0zNSQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fb73449fbd55160f3c3cca5b6be7a1880fb64fe20891be249dd852fc2052760d.xls windows office2003
Kangatang
ThisWorkbook