Behavioral task
behavioral1
Sample
977c10eef8aed0f54db89ea503700d7c650fa062d3e20d1514ac01312745f96f.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
977c10eef8aed0f54db89ea503700d7c650fa062d3e20d1514ac01312745f96f.xls
Resource
win10v2004-20241007-en
General
-
Target
977c10eef8aed0f54db89ea503700d7c650fa062d3e20d1514ac01312745f96f
-
Size
154KB
-
MD5
f0a21938a2ba6465d7f0ac0323ac6186
-
SHA1
9dc31be71e852d0e8ff319ac2cbd7458be2aa5fe
-
SHA256
977c10eef8aed0f54db89ea503700d7c650fa062d3e20d1514ac01312745f96f
-
SHA512
e8db9a9389296256253edba149c994543e97c191e83ae4b7508c9ccc77edff56a269b53e579c068512ec902b316ecd3cfe0d156d36689898a4c49167d61c2cbe
-
SSDEEP
3072:mGxEtjPOtioVjDGUU1qfDlaGGx+ckR0Ox+IfqozW4WZ0sB83hl+Qs:ZxEtjPOtioVjDGUU1qfDlavx+xRnx+0V
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
977c10eef8aed0f54db89ea503700d7c650fa062d3e20d1514ac01312745f96f.xls windows office2003
Kangatang