Behavioral task
behavioral1
Sample
47d6d8f79e88d1123c371458206c1a264fabab19b1890d635f7735d1152e2510.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
47d6d8f79e88d1123c371458206c1a264fabab19b1890d635f7735d1152e2510.xls
Resource
win10v2004-20240802-en
General
-
Target
47d6d8f79e88d1123c371458206c1a264fabab19b1890d635f7735d1152e2510
-
Size
58KB
-
MD5
4f6a25274a3d232c5ab4a4ba54a4031c
-
SHA1
92a953a40f598271824d073a9e3b5155d7e314cf
-
SHA256
47d6d8f79e88d1123c371458206c1a264fabab19b1890d635f7735d1152e2510
-
SHA512
0b4b5e874af9f3cf990506fb710c9f853902f67dc0249f90d9e17ffc5a6941ae5106bf1663fbcd6fca7654657134994f6d06579b43f328b9a31d2967bef10d62
-
SSDEEP
768:g5SBY6EAxBwriXA85GIj32I94+Fz37eLi9i/JRqzmgnd:JwriXL9OMkOd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
47d6d8f79e88d1123c371458206c1a264fabab19b1890d635f7735d1152e2510.xls windows office2003
Kangatang
ThisWorkbook