Behavioral task
behavioral1
Sample
687cb5953a988ad6564ccb79c863d214416a9692a2fa962f002074f3da2d0e62.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
687cb5953a988ad6564ccb79c863d214416a9692a2fa962f002074f3da2d0e62.xls
Resource
win10v2004-20240802-en
General
-
Target
687cb5953a988ad6564ccb79c863d214416a9692a2fa962f002074f3da2d0e62
-
Size
77KB
-
MD5
2a59b0604ce96b29359189e6e74bb44e
-
SHA1
191606408909a21a870610b3eb748f69c43daf76
-
SHA256
687cb5953a988ad6564ccb79c863d214416a9692a2fa962f002074f3da2d0e62
-
SHA512
7dac6343a685b729ac480ebf3cf9de109196a66e692742a367338410f7606e9b0691ac1d226e569e5aa93be94fe36abe15601c1040f5d9fd95bf982d9b667f67
-
SSDEEP
768:k7Gc8imBLzh39kr8k2843HS9BSVq7jZl/CwckA8usx:Rc8imlHpk7+1qGwN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
687cb5953a988ad6564ccb79c863d214416a9692a2fa962f002074f3da2d0e62.xls windows office2003
Kangatang
ThisWorkbook