Behavioral task
behavioral1
Sample
574934755caf0ed8c08aed4bc897e32e8b9f46a49f87540a63e07fda7902c1a2.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
574934755caf0ed8c08aed4bc897e32e8b9f46a49f87540a63e07fda7902c1a2.xls
Resource
win10v2004-20240802-en
General
-
Target
574934755caf0ed8c08aed4bc897e32e8b9f46a49f87540a63e07fda7902c1a2
-
Size
78KB
-
MD5
314c924b98499b4812514d3ab294287f
-
SHA1
413f67b7d1b8ab460cecd9246d5f57f66da11172
-
SHA256
574934755caf0ed8c08aed4bc897e32e8b9f46a49f87540a63e07fda7902c1a2
-
SHA512
2d97085b6953574c25e16a87f5c41e150f7df8651092faf165d249bfc6895d2db41d6e9efb12b2e65fc37ea3903b8ad7ee3b6fee98594b2ae5985b7d4b934a23
-
SSDEEP
1536:lb2lk3hbdlylKsgqopeJBWhZFGkE+cM4LxlnA1cA3vdlI5aFtPh:lbOk3hbdlylKsgqopeJBWhZFGkE+cM4G
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
574934755caf0ed8c08aed4bc897e32e8b9f46a49f87540a63e07fda7902c1a2.xls windows office2003
Kangatang