Behavioral task
behavioral1
Sample
17472880a7ca8ed234904e3f5f6253de897680de54d2518dc4bb49ee87ea60a3.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17472880a7ca8ed234904e3f5f6253de897680de54d2518dc4bb49ee87ea60a3.xls
Resource
win10v2004-20241007-en
General
-
Target
17472880a7ca8ed234904e3f5f6253de897680de54d2518dc4bb49ee87ea60a3
-
Size
255KB
-
MD5
a6bf64c8a322261555c082de1636d1ce
-
SHA1
ab00a24f5a79d3aef12807b869c402bcbcaf95b8
-
SHA256
17472880a7ca8ed234904e3f5f6253de897680de54d2518dc4bb49ee87ea60a3
-
SHA512
9727b706389c646fa09c9f4e4a175a899e66ba249d647cf4842935047ebc302b206fd53e5f88c01b35afc188daa3d4c374bbd1b19cf5ec03f82e2df8a897a0fa
-
SSDEEP
6144:BWwxEtjPOtioVjDGUU1qfDlavx+W/IE8FekxAigvabV3Rrg:fLA1aZ3Rrg
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
17472880a7ca8ed234904e3f5f6253de897680de54d2518dc4bb49ee87ea60a3.xls windows office2003
Kangatang