Behavioral task
behavioral1
Sample
Balance Payment - Swift Copy #513077.xls
Resource
win7-20230831-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Balance Payment - Swift Copy #513077.xls
Resource
win10v2004-20230915-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
Balance Payment - Swift Copy #513077.xls
-
Size
114KB
-
MD5
28dd636c4197dc6903882edec4dc2814
-
SHA1
a02d49671f0f945262f835eb3a7a8a9f784e7354
-
SHA256
5e5275a9e374979fd9e27a2ed919a3a56e96d0780adb614772443240233d3bfc
-
SHA512
3e96c4afe7c4d0577a94763f69a1ed8ba467a92343ef4e132a9e34b260af08d843d4b842a07a356cc1ebbff571899c7a3ca36c97ffcdfc1d88b2e3580a331d46
-
SSDEEP
3072:ofk3hbdlylKsgqopeJBWhZFGkE+cL2NdAs6M1eM3G0vMQgJENB2U/n9S3:kk3hbdlylKsgqopeJBWhZFVE+W2NdAvJ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
Balance Payment - Swift Copy #513077.xls.xls windows office2003