Behavioral task
behavioral1
Sample
074181773321a2f8a19869edbc9608dd19a5fcf2ab01407a1f131c616efaa883.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
074181773321a2f8a19869edbc9608dd19a5fcf2ab01407a1f131c616efaa883.xls
Resource
win10v2004-20240802-en
General
-
Target
074181773321a2f8a19869edbc9608dd19a5fcf2ab01407a1f131c616efaa883
-
Size
191KB
-
MD5
de1bbced37fb1c5608b9be5050c461ff
-
SHA1
6a38628c0881daf06657748c5f1cec38037a58a9
-
SHA256
074181773321a2f8a19869edbc9608dd19a5fcf2ab01407a1f131c616efaa883
-
SHA512
0ca2a449bb48502f3f5d988a49c3c6bb6ec20201f442faaa8107454bcf4cb7b8898d3b7376d7b9087102b65c672f604b8775e5d7272cde844274c8a62e1ac4f3
-
SSDEEP
3072:Cik3hbdlylKsgqopeJBWhZFGkE+cdPUZKaAV+hmI46/+uF9KCOs+hMvlfynb5afa:Pk3hbdlylKsgqopeJBWhZFVE+UPUZKaT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
074181773321a2f8a19869edbc9608dd19a5fcf2ab01407a1f131c616efaa883.xls windows office2003
Kangatang
ThisWorkbook