Behavioral task
behavioral1
Sample
be5c725b359aa38e678b1ac10f74ec0c0866eafd05135392152f6e2445dbf319.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
be5c725b359aa38e678b1ac10f74ec0c0866eafd05135392152f6e2445dbf319.xls
Resource
win10v2004-20241007-en
General
-
Target
be5c725b359aa38e678b1ac10f74ec0c0866eafd05135392152f6e2445dbf319
-
Size
41KB
-
MD5
52896f29780750110ce71d722a31a5d2
-
SHA1
42953e27b5940ad9dad49ae1641df820baed2b18
-
SHA256
be5c725b359aa38e678b1ac10f74ec0c0866eafd05135392152f6e2445dbf319
-
SHA512
2f3968f5a2bf62ff90422ffd16fb25de9bc75f25fcdca09fc66975b0330d65c8d1e0c3b0f74c611c71c9c95bf295e047306dbd51a96fac1e67f0f64a03ef4546
-
SSDEEP
384:m2HHF71PFMC/9zi0TfV8jl2piS9yFPlElprPCY/R3oFhYUmAWd1K22:XnPF3zi0T98jl2iyQU3WZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
be5c725b359aa38e678b1ac10f74ec0c0866eafd05135392152f6e2445dbf319.xls windows office2003
Kangatang
ThisWorkbook