Behavioral task
behavioral1
Sample
9bb1b0f2c8cf3ba518248932e3c8901fd07e16881ac68525c564153037cdb600.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9bb1b0f2c8cf3ba518248932e3c8901fd07e16881ac68525c564153037cdb600.xls
Resource
win10v2004-20240802-en
General
-
Target
9bb1b0f2c8cf3ba518248932e3c8901fd07e16881ac68525c564153037cdb600
-
Size
90KB
-
MD5
f502044b6f775e830de281ea8887dbd6
-
SHA1
942b2298630b3dd585574ffc6f0b959c4976336c
-
SHA256
9bb1b0f2c8cf3ba518248932e3c8901fd07e16881ac68525c564153037cdb600
-
SHA512
64c7dd529c20e98e6a4fd7cf5a1cccfef26d396de4a8ca95f87213427bac01012a366f9c3b292896cf5818c5b729b5973207649f9f76039788e4e92b3cb7e9d1
-
SSDEEP
1536:Mnk3hbdlylKsgwyzcTbWhZFGkE+cLaxldycGOMCCJkW/0wktrtNkNRQRy5+zvPex:Mnk3hbdlylKsgwyzcTbWhZFGkE+cLaxI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9bb1b0f2c8cf3ba518248932e3c8901fd07e16881ac68525c564153037cdb600.xls windows office2003
Kangatang