Behavioral task
behavioral1
Sample
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788.xls
Resource
win10v2004-20241007-en
General
-
Target
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788
-
Size
153KB
-
MD5
4f2ff2e071ef56762a31c2cb3de10e77
-
SHA1
61faf2f4879ca071f96e85f5e42fde820709d1e9
-
SHA256
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788
-
SHA512
47baba83eb0b3653096d8d550620a9799f1bd3d0862ed85e593439bfb77462012e949dc4c0606f01f9c1f1bd5a52ffeda517f8e9a3eb1d88ff874e7d65330248
-
SSDEEP
3072:3g8rmjPOtyoVjDGL61EfDlaGGx+cLYIEc/Y1x7E+yqW1xH1xI491x:Q8rmjPOtyoVjDGL61EfDlavx+WYIEc/n
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788.xls windows office2003
Kangatang
ThisWorkbook