Behavioral task
behavioral1
Sample
Odeme[swift].xls
Resource
win7-20230712-en
2 signatures
150 seconds
General
-
Target
Odeme[swift].xls
-
Size
73KB
-
MD5
d5dab11931ae8f943ebe4c5a09dde39b
-
SHA1
2f3d3e39571cf89d32ec3084b21fd3200c163766
-
SHA256
24f90781be4d00af6a4bce986c8a9c03bb7b961278fc37ba3932d69cf0b8f8db
-
SHA512
73ce0b325891690aecb0cbb1da3ba6bc08c5179cf7f5a0c72591b690c1387692fae470c766c0046832287269f29c85947f272341e117689daef5f092709ed951
-
SSDEEP
1536:hwxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAPGkNYngPz5ZHeT7DmvGm3q:hwxEtjPOtioVjDGUU1qfDlaGGx+cL2Qh
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
Odeme[swift].xls.xls windows office2003
Module1
ThisWorkbook
Sheet1
Sheet2
Sheet3