Behavioral task
behavioral1
Sample
2019_76_FT_BONIFICO_109153.xls
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2019_76_FT_BONIFICO_109153.xls
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
2019_76_FT_BONIFICO_109153.xls
-
Size
100KB
-
MD5
ea2d520c88c06ac451ee6d590bd9a28f
-
SHA1
4761f92d299f6fae7df432bbe1084fbf55d49882
-
SHA256
9eb865b36885bfadd1e74f8ca7036080ac6b9c0395fb3d5d9b970ee4a5261387
-
SHA512
94909b9d2ddedb7d12407651094e306e681a36b6eefb36944d496c3d2a3ff4f9666d6a50ac80dd5397aba8a7da49d60d69dc6ce7737649824981604b9f2df176
-
SSDEEP
3072:Kn1DN3aM+UKccCEW8yjJTdrBZq8/Ok3hOdsylKlgryzc4bNhZFGzE+cL2knApn5Y:Kn1DN3aM+UKccCEW8yjJTdrBZq8/Ok3T
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2019_76_FT_BONIFICO_109153.xls.xls windows office2003
ThisWorkbook
Sheet1