Behavioral task
behavioral1
Sample
0a5e8956588a91e54c013cc9f2045d80e7e36158478a8cf5b8542831fb85065c.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a5e8956588a91e54c013cc9f2045d80e7e36158478a8cf5b8542831fb85065c.xls
Resource
win10v2004-20241007-en
General
-
Target
0a5e8956588a91e54c013cc9f2045d80e7e36158478a8cf5b8542831fb85065c
-
Size
76KB
-
MD5
00dfb8ecf8197bd3bace570376675420
-
SHA1
f8caec23203445cc8cc04cb56b366822136fe652
-
SHA256
0a5e8956588a91e54c013cc9f2045d80e7e36158478a8cf5b8542831fb85065c
-
SHA512
91962e07b0f733827b574147f72204f52ac9e20a6d0f526593b9385f8c4f2875e6d44622a174fd4bf7e40e6b259de949d4f94589be1bcdc6ef97d5001085104c
-
SSDEEP
1536:Z9DYJP5HNfeQuP8mo0ioq0C3tL9n9t3j/TxEtjPOtioVjDGUU1qfDlaGGx+cL/Iz:Z9DkP5HNfeQu8mo0ioq0C3tL9n9t3j/Q
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0a5e8956588a91e54c013cc9f2045d80e7e36158478a8cf5b8542831fb85065c.xls windows office2003
Kangatang
ThisWorkbook