Behavioral task
behavioral1
Sample
f4cf6811646984bd574c22467155a38e15878b4d6cb09e4be66534bc1e99061d.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4cf6811646984bd574c22467155a38e15878b4d6cb09e4be66534bc1e99061d.xls
Resource
win10v2004-20240802-en
General
-
Target
f4cf6811646984bd574c22467155a38e15878b4d6cb09e4be66534bc1e99061d
-
Size
16.0MB
-
MD5
8c83c3092e0cff28d356f4c209bc8c6b
-
SHA1
5e362d6e27fe1b324016875ccbdf8e5541651e0d
-
SHA256
f4cf6811646984bd574c22467155a38e15878b4d6cb09e4be66534bc1e99061d
-
SHA512
e180671e59cc1c66eb3c7ad9b7efe84ae1dd3ced67dbc88b6f800bf96ab0a0badc121bf89ffaa2407699f111c04fe70e990d5eded9a6d5803bdeac0ffc7abb78
-
SSDEEP
98304:MqAwDA0qm5D25AnHe9Zmov4d3rfYb+Z+3:MqAwDbGA+9hv4dbYb+0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f4cf6811646984bd574c22467155a38e15878b4d6cb09e4be66534bc1e99061d.xls windows office2003
Kangatang
ThisWorkbook