Behavioral task
behavioral1
Sample
b3e42ffb1497133e1591961e4fa52af196e502668e5087270c26c43d9b2f3396.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3e42ffb1497133e1591961e4fa52af196e502668e5087270c26c43d9b2f3396.xls
Resource
win10v2004-20240802-en
General
-
Target
b3e42ffb1497133e1591961e4fa52af196e502668e5087270c26c43d9b2f3396
-
Size
93KB
-
MD5
c7d0f043402c5b9001c56c18648d3c02
-
SHA1
c88b9f5444269c9cf22daabad70b139fcd267f4e
-
SHA256
b3e42ffb1497133e1591961e4fa52af196e502668e5087270c26c43d9b2f3396
-
SHA512
186288dbb00a5a909596d5b4bbfdf9bcb89f6942b70c4ffe5dd7b1f09b51af7ef5c1592f7cb5804598cdb18d7c44420a9c6003a2d7ef6d311b331f91aa7012ea
-
SSDEEP
1536:ZUxEtjPOtioVjDGUU1qfDlaGGx+cWgLI0dAbYXseqlqn85pcJlLNza86d:ZUxEtjPOtioVjDGUU1qfDlaGGx+cWgLs
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b3e42ffb1497133e1591961e4fa52af196e502668e5087270c26c43d9b2f3396.xls windows office2003
Kangatang
ThisWorkbook