Behavioral task
behavioral1
Sample
23ab62130663972aad0a3e3b0659398106e90bcee7e3f6b97201f6f6e1a40287.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23ab62130663972aad0a3e3b0659398106e90bcee7e3f6b97201f6f6e1a40287.xls
Resource
win10v2004-20240802-en
General
-
Target
23ab62130663972aad0a3e3b0659398106e90bcee7e3f6b97201f6f6e1a40287
-
Size
72KB
-
MD5
1c43e4611a476e7f2fc0481385ca68e6
-
SHA1
6d90b4349c8451be9ea4e06c338ff44371b92671
-
SHA256
23ab62130663972aad0a3e3b0659398106e90bcee7e3f6b97201f6f6e1a40287
-
SHA512
ed9d946f48387db3927f5cc938226fb2ce3100b8c86126e928dead59efbf9e9b47bced3ed2edace9fbc97ca38e6926c4f9ed72e00fdccf4cf1c5e04e3f1bcd46
-
SSDEEP
1536:mpOnk3hOdsylKlgryzc4bNhZFGzE+cL4LgldAQquqbcH9rcXPfZvBjIahSdyH+ys:3nk3hOdsylKlgryzc4bNhZFGzE+cL4Lx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
23ab62130663972aad0a3e3b0659398106e90bcee7e3f6b97201f6f6e1a40287.xls windows office2003
Kangatang