Behavioral task
behavioral1
Sample
MENSAJE SWIFT SALIENTE - Copiar.doc
Resource
win7-20231023-en
17 signatures
150 seconds
Behavioral task
behavioral2
Sample
MENSAJE SWIFT SALIENTE - Copiar.doc
Resource
win10v2004-20231020-en
14 signatures
150 seconds
General
-
Target
3yPyvJM-67450-09C45729014467464566c655cd4.txt
-
Size
243KB
-
MD5
5beccfc50b2f2ad9be2d003e503d6c95
-
SHA1
e8e3f142cb9bc7cfd816e8be5174bfcd328c85a9
-
SHA256
e95ae19b133b385a01553f812aa9699cb2993b5b81934e920fdeb36a6a1b7df6
-
SHA512
d121c1868d6578188616dc610b322dc9af12a2df84b0e0bd70e681cf507151266e5ed57d81457715875e8244288acef3562e593ed68e29a1fe2b00d0fb65836f
-
SSDEEP
3072:gVWeaYcvHGgLuHmz+NRoXpBmMwuXckK1S9AIzz76ozzFqANaUp4iR8qo01:sP9yTuG0RoZEuXcvY9PzvsAQUp4mNoi
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/MENSAJE SWIFT SALIENTE - Copiar.doc office_macro_on_action -
resource static1/unpack001/MENSAJE SWIFT SALIENTE - Copiar.doc
Files
-
3yPyvJM-67450-09C45729014467464566c655cd4.txt.eml
-
MENSAJE SWIFT SALIENTE - Copiar.doc.doc windows office2003
ThisDocument
NewMacros
-
email-html-2.txt.html
-
email-plain-1.txt