Behavioral task
behavioral1
Sample
ad277190e2f662c8b3479b9e2bf88e540a7f3e54cddb1f722057b54080c862bf.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad277190e2f662c8b3479b9e2bf88e540a7f3e54cddb1f722057b54080c862bf.xls
Resource
win10v2004-20240802-en
General
-
Target
ad277190e2f662c8b3479b9e2bf88e540a7f3e54cddb1f722057b54080c862bf
-
Size
6.4MB
-
MD5
977eb59bbd97a65b95a799ddd372dee7
-
SHA1
2cac91d2e16b9f8b17496176ecd3f734f9f9d3e3
-
SHA256
ad277190e2f662c8b3479b9e2bf88e540a7f3e54cddb1f722057b54080c862bf
-
SHA512
ef1e331b4c883affbd667ef0c5c66809ed60459cc081bde07df671be776f22c5273bfaea41f9cd9abf8fcb83201f49d4caa82486508d89db7974d6f3c0b1cf4a
-
SSDEEP
98304:pyfJMTqG+/sEg0l7a0Rcxt4UTwfcb1Sxqoki/:Ccb1S1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ad277190e2f662c8b3479b9e2bf88e540a7f3e54cddb1f722057b54080c862bf.xls windows office2003
Kangatang