Behavioral task
behavioral1
Sample
5f0e661e2a69a9f532c288b117693446957fd65dd8795096e86e8e9334672906.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5f0e661e2a69a9f532c288b117693446957fd65dd8795096e86e8e9334672906.xls
Resource
win10v2004-20240802-en
General
-
Target
5f0e661e2a69a9f532c288b117693446957fd65dd8795096e86e8e9334672906
-
Size
4.0MB
-
MD5
4d137e0108d505304f22ffc6c30c5afd
-
SHA1
331b54bda734a4044759ddb65a20cf1f52fd2d7d
-
SHA256
5f0e661e2a69a9f532c288b117693446957fd65dd8795096e86e8e9334672906
-
SHA512
16fd16d92aab54b5e7e0aaf176c620c9be0451113f409c8b5997287da17916d9d670e68ed73de928f564d320b3beb63e08864d540b62738ad8592c0ffe56f10a
-
SSDEEP
12288:iOKh5YzFEw5bQ6un8WL68mfTPsH7uvxgbmriZ45lzcwzRTdZ5JUiHqfzte3ZRTzu:iOWI2eYuqfzWj6VNZrqiRwp3E/L
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5f0e661e2a69a9f532c288b117693446957fd65dd8795096e86e8e9334672906.xls windows office2003
Kangatang
ThisWorkbook