Behavioral task
behavioral1
Sample
ed572efa1991c43c531904295295787dbe83f144d67cda06cb3c3398ea15d432.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ed572efa1991c43c531904295295787dbe83f144d67cda06cb3c3398ea15d432.xls
Resource
win10v2004-20240802-en
General
-
Target
ed572efa1991c43c531904295295787dbe83f144d67cda06cb3c3398ea15d432
-
Size
68KB
-
MD5
bc039c605ab2572653937744c8c19569
-
SHA1
b600588dfd79b5fe32e1c5ea626a120f847d86dd
-
SHA256
ed572efa1991c43c531904295295787dbe83f144d67cda06cb3c3398ea15d432
-
SHA512
cacc6f025525faa5588e98321c190e1be87d5b15f482ddef0a1022c1be7f26f7eb7168de2fa9575aaa73a9c981368cde94ab2192591e96bc77f46a99c40f3fe4
-
SSDEEP
1536:qWjkxEtjPOtioVjDGUU1qfDlaGGx+cL+LIfd9Y3/kmdV5mKQyISWZ:qWIxEtjPOtioVjDGUU1qfDlaGGx+cL+u
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ed572efa1991c43c531904295295787dbe83f144d67cda06cb3c3398ea15d432.xls windows office2003
Kangatang
ThisWorkbook