Behavioral task
behavioral1
Sample
5cde0e591a61eff778c108cd00cc1f956528ea89fdb4df760ee654ad372e871d.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cde0e591a61eff778c108cd00cc1f956528ea89fdb4df760ee654ad372e871d.xls
Resource
win10v2004-20240802-en
General
-
Target
5cde0e591a61eff778c108cd00cc1f956528ea89fdb4df760ee654ad372e871d
-
Size
43KB
-
MD5
75247bd39914103ac9059dcaedd34a4f
-
SHA1
ab26731dc849d3bac1bc12f8aa728867272465d0
-
SHA256
5cde0e591a61eff778c108cd00cc1f956528ea89fdb4df760ee654ad372e871d
-
SHA512
a5307433fff1de3631e65b8a5369e90977e28bace9b3ec89c7ebcbe077c46f8970e11fae12693c50d52176d6dc9b571056e203a8b40e2149b69a7478afd5a8bf
-
SSDEEP
768:qDyhnQPVxEtjPOtioVjDGUU1qfDlaGGx+cWYIxACJOpvrclp/za86sZ:ThnQtxEtjPOtioVjDGUU1qfDlaGGx+cR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5cde0e591a61eff778c108cd00cc1f956528ea89fdb4df760ee654ad372e871d.xls windows office2003
Kangatang
ThisWorkbook