Behavioral task
behavioral1
Sample
e24b942d3020db0b1f6c864d4375e1b6d3bd98b8030910797950390420358387.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e24b942d3020db0b1f6c864d4375e1b6d3bd98b8030910797950390420358387.xls
Resource
win10v2004-20240802-en
General
-
Target
e24b942d3020db0b1f6c864d4375e1b6d3bd98b8030910797950390420358387
-
Size
6.4MB
-
MD5
7eed9b5f9cb62cfd6b0085cf0ea64374
-
SHA1
2a0ccadcab5202076aca2ce1d07b80522e2737f0
-
SHA256
e24b942d3020db0b1f6c864d4375e1b6d3bd98b8030910797950390420358387
-
SHA512
4b845dc7229bf0595518787e161f28c4eff01ec4ea2b0f1f94df0a6f2c000b545d0089e86023e04a20e0409068a4f8e66ebefca0d207373ff99817e203167a27
-
SSDEEP
98304:jn/JszKm+fMkAUFb6Ux8RNM0HhxPxAnKoMxv:4PxAu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e24b942d3020db0b1f6c864d4375e1b6d3bd98b8030910797950390420358387.xls windows office2003
Kangatang
ThisWorkbook