Static task
static1
General
-
Target
Payment-717642397-09222021.zip
-
Size
365KB
-
MD5
f28e80c5f2224aadf42e343a56ec3a47
-
SHA1
d483bae931bef3834547d9cf37173759fd4cb8a2
-
SHA256
2cfd061b305b2a84dc3cb0be6efc34bf745ac17b3eebec5d7261ccff5826a471
-
SHA512
fcac0906a3c5f0165191c3cf7092ed23cde1aeae8a94a3f11386ce8458c2df9a15629fab2680cda825b8d4babbc9c7436cc1fd3763f69779c1f810eda53c6a2d
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/Payment-717642397-09222021.xls office_macro_on_action
Files
-
Payment-717642397-09222021.zip.zip
-
Payment-717642397-09222021.xls.xls windows office2003