Behavioral task
behavioral1
Sample
9b694416e67954c8ca3b8c7765b97c8e0fdffcdc1eb39945e998de3ae4ea7f2e.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9b694416e67954c8ca3b8c7765b97c8e0fdffcdc1eb39945e998de3ae4ea7f2e.xls
Resource
win10v2004-20240802-en
General
-
Target
9b694416e67954c8ca3b8c7765b97c8e0fdffcdc1eb39945e998de3ae4ea7f2e
-
Size
90KB
-
MD5
62273e817a77152810d4b8215a0f38a3
-
SHA1
80aef72ccea4581d26e89ab5fb6c5600bb085fe7
-
SHA256
9b694416e67954c8ca3b8c7765b97c8e0fdffcdc1eb39945e998de3ae4ea7f2e
-
SHA512
6c66ed6560288282fff5f4cfa5ce0249bbcc183a54ec0e5ba1f8dbb7250baa6f3930e5bd2083952cac4a1caa8d1b0a6b5f8e83ebff6a9aeac03110d1d6008f3b
-
SSDEEP
1536:xV1GXsE5E9RPKeGWdE6WZDNGLXkSaMZHF+YH1mrLwXSB:LgXt5E9RPKTWdE6WZDNGL0SaMZHF+YHC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9b694416e67954c8ca3b8c7765b97c8e0fdffcdc1eb39945e998de3ae4ea7f2e.xls windows office2003
Kangatang