Behavioral task
behavioral1
Sample
9fa0d28b237df32ac7fd0b038074c6fcf2d407579c39afcf04c11eca0ed92829.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fa0d28b237df32ac7fd0b038074c6fcf2d407579c39afcf04c11eca0ed92829.xls
Resource
win10v2004-20240802-en
General
-
Target
9fa0d28b237df32ac7fd0b038074c6fcf2d407579c39afcf04c11eca0ed92829
-
Size
320KB
-
MD5
bcb417cdad15987bf1ff12dd968f3945
-
SHA1
278981bc5bbb152386a22fbb6865e12413167e6a
-
SHA256
9fa0d28b237df32ac7fd0b038074c6fcf2d407579c39afcf04c11eca0ed92829
-
SHA512
ead3b4bf4ff5b0b91f164e10ce44e69c7b112ddd130edab307838a84488e4700aff621f65e0876f84a69611a24e735429852ad492d578d59e9632f92810974c6
-
SSDEEP
6144:NxEtjPOtioVjDGUU1qfDlavx+rxImuhSmpQ/w+/Kzbi/uBIH6VMVULe1cv+bS3gH:I
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9fa0d28b237df32ac7fd0b038074c6fcf2d407579c39afcf04c11eca0ed92829.xls windows office2003
Kangatang
ThisWorkbook