Behavioral task
behavioral1
Sample
859e1fc534d0c6ee9a42d549840242546b10dc58b0b5b623e8efd0b6266d2ece.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
859e1fc534d0c6ee9a42d549840242546b10dc58b0b5b623e8efd0b6266d2ece.xls
Resource
win10v2004-20240802-en
General
-
Target
859e1fc534d0c6ee9a42d549840242546b10dc58b0b5b623e8efd0b6266d2ece
-
Size
209KB
-
MD5
64dafca6c5634850c94c7a5b35ab7fe0
-
SHA1
a021e8e04712730c76769f67ac90fa1e4ec38b59
-
SHA256
859e1fc534d0c6ee9a42d549840242546b10dc58b0b5b623e8efd0b6266d2ece
-
SHA512
37dfa1b3f159ac796f0f1f0b503bd657710b5e47a0ac71fb7d08f876d748eb2b1e75408b5a5f5e24e9fc1116c603729071cc3e815382264dd093e9a3f58b8201
-
SSDEEP
6144:jxEtjPOtioVjDGUU1qfDlavx+W/IEH0lMSlOzV6z/:NIzQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
859e1fc534d0c6ee9a42d549840242546b10dc58b0b5b623e8efd0b6266d2ece.xls windows office2003
Kangatang