Behavioral task
behavioral1
Sample
87285beea66a0a5b04257231c5033fc573f2567b2056d7ea40bf8d46859a979a.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
87285beea66a0a5b04257231c5033fc573f2567b2056d7ea40bf8d46859a979a.xls
Resource
win10v2004-20250314-en
General
-
Target
87285beea66a0a5b04257231c5033fc573f2567b2056d7ea40bf8d46859a979a
-
Size
78KB
-
MD5
08cb39f4aa75003ebc24428099cb4859
-
SHA1
da8a81f6696469bb7052b1ce8e16e5338a5a7c2c
-
SHA256
87285beea66a0a5b04257231c5033fc573f2567b2056d7ea40bf8d46859a979a
-
SHA512
b7c890b8cd2cf3f0388ce239e1f4d8c9bfe13cb5d096a714ae5242c819e6131a088fe496c96e7e9147b9f757c6e0ef42a4f4db3d52e9fe23b92e72a53704fb71
-
SSDEEP
1536:4L9xEtjPOtioVjDGUU1qfDlaGGx+cLgLI0dwBR6bBgpFhfPX93S5KmDXE64K5:45xEtjPOtioVjDGUU1qfDlaGGx+cLgL5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
87285beea66a0a5b04257231c5033fc573f2567b2056d7ea40bf8d46859a979a.xls windows office2003
Kangatang
ThisWorkbook