Behavioral task
behavioral1
Sample
78b92e417f1096931a8d922376c759ff431d54e22923b83cf55228a13e8f2fdd.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78b92e417f1096931a8d922376c759ff431d54e22923b83cf55228a13e8f2fdd.xls
Resource
win10v2004-20240802-en
General
-
Target
78b92e417f1096931a8d922376c759ff431d54e22923b83cf55228a13e8f2fdd
-
Size
745KB
-
MD5
d09ef37c787f40ecd173ab90da754d11
-
SHA1
31e1ebfe35ccd91f5896d93a946741de08db9391
-
SHA256
78b92e417f1096931a8d922376c759ff431d54e22923b83cf55228a13e8f2fdd
-
SHA512
a7d0da3181cc34d0d97fd7b818c5666c8e353e2ebde4cfb987b5dc3c42fc162eec8a0397b1c9a5e0b31b9ea1b442fe647a5f6d1af34b57f08844054a7362d59b
-
SSDEEP
6144:jQzl3ZpWh+Q8uMdS9dSttRJwyyGZRubpRC1O5fXeszVADdW+ghXDLvjT2kSTStcy:dCPkVAHghD70Swd+fLJzN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
78b92e417f1096931a8d922376c759ff431d54e22923b83cf55228a13e8f2fdd.xls windows office2003
Kangatang
ThisWorkbook