Behavioral task
behavioral1
Sample
17b5c90fd422d7d692c945d469989d6eb26839e814d5a97030d8e93371707c0b.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17b5c90fd422d7d692c945d469989d6eb26839e814d5a97030d8e93371707c0b.xls
Resource
win10v2004-20240802-en
General
-
Target
17b5c90fd422d7d692c945d469989d6eb26839e814d5a97030d8e93371707c0b
-
Size
1.7MB
-
MD5
da44f3dc7af0bf36b5557f3e003bb4db
-
SHA1
8b774eaab1a0421dae1cfe625ed7b9b0715360ab
-
SHA256
17b5c90fd422d7d692c945d469989d6eb26839e814d5a97030d8e93371707c0b
-
SHA512
95e171899f173d19dc7c30ae4759c5ff990eb0bfb19de200e8ee2772f5b23579a6901b7abbbfff3de61894a4c8c535a1a8d85c1856ebc593aa800a74c072f9e9
-
SSDEEP
12288:W2bmtHNrBW671DAnegpPaTRCiKO9ZViKpIbtisvnMTZT+KQ3v1i59N4ce:Otr9xBgJaTRCK9LRpuRMTZTHJe
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
17b5c90fd422d7d692c945d469989d6eb26839e814d5a97030d8e93371707c0b.xls windows office2003
Kangatang
ThisWorkbook