Behavioral task
behavioral1
Sample
b68b2174a8e1fd080fd930ce19b4f8f342f3a9cee68fa9440af6a0652e780790.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b68b2174a8e1fd080fd930ce19b4f8f342f3a9cee68fa9440af6a0652e780790.xls
Resource
win10v2004-20240802-en
General
-
Target
b68b2174a8e1fd080fd930ce19b4f8f342f3a9cee68fa9440af6a0652e780790
-
Size
96KB
-
MD5
1879414fdbeb8b6daa67eca78f10ce4a
-
SHA1
a596599d62aae93ac863276b7f5ab8fa07f3fe6c
-
SHA256
b68b2174a8e1fd080fd930ce19b4f8f342f3a9cee68fa9440af6a0652e780790
-
SHA512
695a9025968ff56fd1c75db6f63f5c28b1980eb70733eb5173e53113d5f93ae85f2be5d6eaa0a53af9f34346bce2f08e2341e8997cbf1d0c346ebc90ffb1cc66
-
SSDEEP
3072:aMxEtjPOtioVjDGUU1qfDlaGGx+cL+LIfd2MfSx99dICuhw5MTAuYYfIzaipQRJq:BxEtjPOtioVjDGUU1qfDlavx+W+LIfdt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b68b2174a8e1fd080fd930ce19b4f8f342f3a9cee68fa9440af6a0652e780790.xls windows office2003
Kangatang