Behavioral task
behavioral1
Sample
9c0785c0dd60975edb5c4a8de7020c81c5962ccc725a6839db3081311c863586.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9c0785c0dd60975edb5c4a8de7020c81c5962ccc725a6839db3081311c863586.xls
Resource
win10v2004-20240910-en
General
-
Target
9c0785c0dd60975edb5c4a8de7020c81c5962ccc725a6839db3081311c863586
-
Size
745KB
-
MD5
fc7f8791cac016207e7fe165a1b53989
-
SHA1
ca22c32ab7fa48155db5d7b71a401dd77bcb5dfc
-
SHA256
9c0785c0dd60975edb5c4a8de7020c81c5962ccc725a6839db3081311c863586
-
SHA512
127a64e0bd0eebd075a0bea6fe0b17173bb64ce30280f265401d0b53293b69cd923f1c3379fe2245c4fb3a2a839122c6f1a1245ac71d1e55f79b303362d15d61
-
SSDEEP
6144:fQzl3ZpWh+Q8uMdS9dSttRJwyyGZRQbpRC1OsfXes9VADdW+ghXDLvjT2kSTStc0:XC+eVAHghD70Swd+fLJ9N
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9c0785c0dd60975edb5c4a8de7020c81c5962ccc725a6839db3081311c863586.xls windows office2003
Kangatang
ThisWorkbook