Behavioral task
behavioral1
Sample
b730b5b0c45883bc85b3dbe9d8b4630d8402dea71044a839036bed5e90fed557.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b730b5b0c45883bc85b3dbe9d8b4630d8402dea71044a839036bed5e90fed557.xls
Resource
win10v2004-20240802-en
General
-
Target
b730b5b0c45883bc85b3dbe9d8b4630d8402dea71044a839036bed5e90fed557
-
Size
148KB
-
MD5
43b509e7a3809cf7544d5aae32f4d214
-
SHA1
b0d726402c0a91f00f014ca3e6dfb2f29341da95
-
SHA256
b730b5b0c45883bc85b3dbe9d8b4630d8402dea71044a839036bed5e90fed557
-
SHA512
c15d36ee8d3f315b3b65e2346ffa42b9e7de3bb8d0825235482b4faef7c8b063b9d2e8371633613bbb078c64c511643f24b64f14238170b103d445bb2d5c27a3
-
SSDEEP
3072:kLjxEtjPOtioVjDGUU1qfDlaGGx+cKXI0AiUCNYmSS9oGEHY:+xEtjPOtioVjDGUU1qfDlavx+XXI0Ai9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b730b5b0c45883bc85b3dbe9d8b4630d8402dea71044a839036bed5e90fed557.xls windows office2003
Kangatang