Behavioral task
behavioral1
Sample
eeee98bede4bb11f9a67e195551016025e0b414423909e6668deaca372492190.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeee98bede4bb11f9a67e195551016025e0b414423909e6668deaca372492190.xls
Resource
win10v2004-20240802-en
General
-
Target
eeee98bede4bb11f9a67e195551016025e0b414423909e6668deaca372492190
-
Size
96KB
-
MD5
cc68e31e5fd5048d5c3f6330659c826a
-
SHA1
f9044640c32168fd02d73698891e443e30e705a9
-
SHA256
eeee98bede4bb11f9a67e195551016025e0b414423909e6668deaca372492190
-
SHA512
044c13732ce7b667006de7062a9ab6cec5a044d8cb44b8d2fc133fa566755b9b30dfe774cb6da9d3880592bb09e29f2cd6e3a8b63d81dc8c0f884a8f1dbed3bc
-
SSDEEP
3072:88xEtjPOtioVjDGUU1qfDlaGGx+cL+LIfd9MfSx99dICuhw5GMTAuYYfrzaipQRD:TxEtjPOtioVjDGUU1qfDlavx+W+LIfdO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
eeee98bede4bb11f9a67e195551016025e0b414423909e6668deaca372492190.xls windows office2003
Kangatang
ThisWorkbook