Behavioral task
behavioral1
Sample
08bf52560b2f6250f7f8bad69336e649661214ed7620375de924153e3e2e5386.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08bf52560b2f6250f7f8bad69336e649661214ed7620375de924153e3e2e5386.xls
Resource
win10v2004-20240802-en
General
-
Target
08bf52560b2f6250f7f8bad69336e649661214ed7620375de924153e3e2e5386
-
Size
190KB
-
MD5
9e180ea62a2582aace6380033a57e55b
-
SHA1
e83f11ba89546b738d6b82b3113da508129243af
-
SHA256
08bf52560b2f6250f7f8bad69336e649661214ed7620375de924153e3e2e5386
-
SHA512
170bacf61b3c97079e308b5cacb8123d2f462aee3781205088eb36cbb2f0078b9b9111a79cd044a59301d75ce0c77179b25108294f56a9286721def02622df98
-
SSDEEP
3072:V9XdpYkmZR4Zlt8D3676QpsaCqRK7bs/2YxnLkKsEpyj6JJtm+WBE9qekWNL+9Ko:fdeLgmQ6QEsu6gREpQv+WK2
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
08bf52560b2f6250f7f8bad69336e649661214ed7620375de924153e3e2e5386.xls windows office2003
Kangatang
ThisWorkbook