Behavioral task
behavioral1
Sample
INVOICES pfi 705, pfi 704, pfi 706.xls
Resource
win7-20230220-en
18 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICES pfi 705, pfi 704, pfi 706.xls
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
INVOICES pfi 705, pfi 704, pfi 706.xls
-
Size
1.8MB
-
MD5
50c03b5ee516de3a7a5b0d880bf7c88e
-
SHA1
feff633832f31ce0d907b678ba4ae358d9d14f3b
-
SHA256
68375ad528fe558a3054eee84583bd17dae1f6afe3709eb8427499f192711318
-
SHA512
8c4c428b7865f8b3a12ba2e37c7583089e8f3fe756d598c0b7678b234e0925c0fed0a441657eeb2a0f589162ebca7167d366845855bf37ef1d59ab2d45e22b48
-
SSDEEP
49152:xLKp+MXJ+MXpLKI7s+MXy9TaA2XmEtscCWt:17EEEdZEy9XoWWt
Score
5/10
Malware Config
Signatures
-
Document created with cracked Office version 1 IoCs
Office document contains Grizli777 string known to be caused by using a cracked version of the software.
resource yara_rule sample grizli777_cracked_office
Files
-
INVOICES pfi 705, pfi 704, pfi 706.xls.xls windows office2003