Behavioral task
behavioral1
Sample
MENSAJES SWIFT.doc
Resource
win7-20230712-en
2 signatures
150 seconds
General
-
Target
MENSAJES SWIFT.doc
-
Size
127KB
-
MD5
0f0d1ffc614418954823dc5a1ef2ed68
-
SHA1
4203e94a5beee4f94ad212be7ca9272e4c11c599
-
SHA256
ca16c541bbb3cc2b1db8fde1c3b066a201dfe8fa93c2135e837dd60393d828a7
-
SHA512
20403a01a718e28aae58ad700a414433b3dc1b33e719991f91dcca749eff34ad8a01719fb2de4d4a3412b66be6b2d36d6c4e06e85996f75cee685fdfba8a17d2
-
SSDEEP
3072:C9llhodmSFSm6W6o0MCa+55ROTgnN4Glq:Crlh07F/6ACB5LnN
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
MENSAJES SWIFT.doc.doc windows office2003
ThisDocument
NewMacros