Behavioral task
behavioral1
Sample
054b6534e35cfd527ce8077bba8c60e15267fcc6d40742b3d2655e74ace1079f.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
054b6534e35cfd527ce8077bba8c60e15267fcc6d40742b3d2655e74ace1079f.xls
Resource
win10v2004-20250314-en
General
-
Target
054b6534e35cfd527ce8077bba8c60e15267fcc6d40742b3d2655e74ace1079f
-
Size
82KB
-
MD5
c660e0dfaf797d84e6d681332886c359
-
SHA1
ae3c7683dbf3fcb07425ea105087f61f91dc92e8
-
SHA256
054b6534e35cfd527ce8077bba8c60e15267fcc6d40742b3d2655e74ace1079f
-
SHA512
51c4346db1afc16bb250d8090b558f7cac257c392fad95f0d5ab06be85498884d0b5fb47ae626add09bcd74bb1ee4e3eda955a807ce29866634f12187813337d
-
SSDEEP
1536:yfxEtjPOtioVjDGUU1qfDlaGGx+cLgLI0dhBR61bHCFhfPX93S8L37o034NTtpJ7:yfxEtjPOtioVjDGUU1qfDlaGGx+cLgL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
054b6534e35cfd527ce8077bba8c60e15267fcc6d40742b3d2655e74ace1079f.xls windows office2003
Kangatang
ThisWorkbook