Behavioral task
behavioral1
Sample
Odeme[swift].xls
Resource
win7-20230712-en
2 signatures
150 seconds
General
-
Target
Odeme[swift].xls
-
Size
77KB
-
MD5
081d0f7ac1c7cd48552556d430227666
-
SHA1
61212801d6fc07885b0f209c93debbdffee5afc0
-
SHA256
4f0fb899485f6d9c4fc0362a0523b062458086dec746a4a20936feeda6cbc8d1
-
SHA512
c7aafe4c75bcfd950fbe5ea11ca785455c443bbbb6a5481171e653e74fe2c0dab2bd8d76050c0f6894bf4d2c823cf040eeffb5c0ce31ba0d94968a9642236245
-
SSDEEP
1536:9fxEtjPOtioVjDGUU1qfDlaGGx+cL2QnARGkNYngPz5ZHeT7DmvG6+L:9fxEtjPOtioVjDGUU1qfDlaGGx+cL2Qf
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
Odeme[swift].xls.xls windows office2003
Module1
ThisWorkbook
Sheet1
Sheet2
Sheet3