Behavioral task
behavioral1
Sample
d13584b049653652ba2aa6431419801c36a40cfaf7920351dc058cfa12c55612.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d13584b049653652ba2aa6431419801c36a40cfaf7920351dc058cfa12c55612.xls
Resource
win10v2004-20240802-en
General
-
Target
d13584b049653652ba2aa6431419801c36a40cfaf7920351dc058cfa12c55612
-
Size
90KB
-
MD5
c71e4cdddf5d9108da020e3a1be3aa52
-
SHA1
35adfe0b2188377706d022d99c7be7dcce66e7b2
-
SHA256
d13584b049653652ba2aa6431419801c36a40cfaf7920351dc058cfa12c55612
-
SHA512
ff3fcd64a4143362f9489b441f270121ba27362cfb453726c109d5eddc3b35bf9b4947bda13ce5d68d8decf2fbb8cd6e324a9035f30f86a1e171b54edbe4179b
-
SSDEEP
768:zjJVriWyjUnbJgkyLtBKrI+vGtQnGdSPYz2Z01dIyvSg0y5yt:XJVrijjUnbJHy9tQnNPHwJS9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d13584b049653652ba2aa6431419801c36a40cfaf7920351dc058cfa12c55612.xls windows office2003
Kangatang
ThisWorkbook