Behavioral task
behavioral1
Sample
5028ea1061d0e5224e4302da961eecddc146a365ab35157d0eb86d1dfd3c0dc3.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5028ea1061d0e5224e4302da961eecddc146a365ab35157d0eb86d1dfd3c0dc3.xls
Resource
win10v2004-20240802-en
General
-
Target
5028ea1061d0e5224e4302da961eecddc146a365ab35157d0eb86d1dfd3c0dc3
-
Size
6.5MB
-
MD5
04d5aaa3949f6535ab817c470d369c1e
-
SHA1
c79fcd38816ef514bd6c85e65b8ba6ec4a00ba8e
-
SHA256
5028ea1061d0e5224e4302da961eecddc146a365ab35157d0eb86d1dfd3c0dc3
-
SHA512
a1bc2e50ca4e18bfc5d83089ea317e5d0638861a893770d5fd61a4be9408427e18df5484d4b74f801966e258ce4973493420d078369e1ce9e283acc45b27eedb
-
SSDEEP
49152:SJbqomkImiYvWOB1U1tIgtvJXdCUKTnEmbm3aM0IarK4E/5LSOlD8tPR62M5iu9:S7Wt74bG+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5028ea1061d0e5224e4302da961eecddc146a365ab35157d0eb86d1dfd3c0dc3.xls windows office2003
Kangatang
ThisWorkbook