Behavioral task
behavioral1
Sample
e6317ea308e26f7156f8c7a8a35afa1f69da5b8f90fb5257d1e6632f0380a6de.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6317ea308e26f7156f8c7a8a35afa1f69da5b8f90fb5257d1e6632f0380a6de.xls
Resource
win10v2004-20240802-en
General
-
Target
e6317ea308e26f7156f8c7a8a35afa1f69da5b8f90fb5257d1e6632f0380a6de
-
Size
148KB
-
MD5
02c6ca2d05c9f6ddc5d1a0b43907bd12
-
SHA1
cbf63e8737d435f900808680a5aff353e99f12b2
-
SHA256
e6317ea308e26f7156f8c7a8a35afa1f69da5b8f90fb5257d1e6632f0380a6de
-
SHA512
f1dcf55789cf25dfadfd6f8e71c79dee7d7bb333c26013cb35ec8144d6d5821cb0e6a41133cddcaf7016720e7ca7b5dba038f3834b9d706731be9e155d880a99
-
SSDEEP
3072:KLjxEtjPOtioVjDGUU1qfDlaGGx+cKXI0AiUCNYmSS9oGEHY:sxEtjPOtioVjDGUU1qfDlavx+XXI0Ai9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e6317ea308e26f7156f8c7a8a35afa1f69da5b8f90fb5257d1e6632f0380a6de.xls windows office2003
Kangatang