Behavioral task
behavioral1
Sample
2ef06e43e0db71ceb85b090172450a116b9627542ee5bba7cc6b4873f7dfede8.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2ef06e43e0db71ceb85b090172450a116b9627542ee5bba7cc6b4873f7dfede8.xls
Resource
win10v2004-20240802-en
General
-
Target
2ef06e43e0db71ceb85b090172450a116b9627542ee5bba7cc6b4873f7dfede8
-
Size
75KB
-
MD5
4a26a9ac9367c83b4fb4e20c6ac02d31
-
SHA1
e5fe0b845089099e2bc1634b5fcddbfee7f06099
-
SHA256
2ef06e43e0db71ceb85b090172450a116b9627542ee5bba7cc6b4873f7dfede8
-
SHA512
08658566208066dc0420a78aebd60c698aad3555261f465a20389d097a19d9a3348ccc99736b099ffc9fd06e6ea27a8a5b5f58599235188e1ce7c0157f19fb2c
-
SSDEEP
1536:b9uvk3hOdsylKlgryzc4bNhZFGzE+ch/gEA+OTu8sLF/lcaMSM:b9uvk3hOdsylKlgryzc4bNhZFGzE+chz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2ef06e43e0db71ceb85b090172450a116b9627542ee5bba7cc6b4873f7dfede8.xls windows office2003
Kangatang