Behavioral task
behavioral1
Sample
cbc7b4b7aea0c01f6cbd4a8a4b89b0bf82345a454c4abdcaa323193f0d336dd5.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbc7b4b7aea0c01f6cbd4a8a4b89b0bf82345a454c4abdcaa323193f0d336dd5.xls
Resource
win10v2004-20240802-en
General
-
Target
cbc7b4b7aea0c01f6cbd4a8a4b89b0bf82345a454c4abdcaa323193f0d336dd5
-
Size
6.5MB
-
MD5
a53061fea417978ec185c5022cfa8c04
-
SHA1
961865ed72018443cdfeff1099cd8d711f28637f
-
SHA256
cbc7b4b7aea0c01f6cbd4a8a4b89b0bf82345a454c4abdcaa323193f0d336dd5
-
SHA512
47d4f6f2d8d9c2335037fc57ecb41381fe3f151a4925a2bc34b8b1d281b98763dda994e93794ddbdaf0cdac92c260fd2a537b10a8a2ae0ece2efb7ff95a6aaa5
-
SSDEEP
49152:xb8oOyogmYleYBtiTO4pjtMJXkCUK3nomb7uaY0ga7KRye5hSO1D8qPR5CMVSuM:5aO4gPbC+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cbc7b4b7aea0c01f6cbd4a8a4b89b0bf82345a454c4abdcaa323193f0d336dd5.xls windows office2003
Kangatang
ThisWorkbook