Resubmissions
28-09-2022 16:26
220928-txja9ahfdr 10General
-
Target
EFT PAYMENT ADVICE-CTI09272022.doc
-
Size
272KB
-
MD5
e7015ec2d6320c2eb00a304a73c54d1d
-
SHA1
f7f5dd9cd6d0975d8bae9a5ba460f51f28617cbc
-
SHA256
a40007a2e46eee90ced835b786774681aabb6c8677ec86b8d999b8ba28439194
-
SHA512
0dbde3cb93cd0599897fe7490a1373369a8bc42fc3d78a12d2afe18c62e81444f7771ed66e6cd1da959d0510fffae947e01dc1e4469396cedc7f82b7cfa66044
-
SSDEEP
3072:9XQVvATx74hqpQUtFwGj/Ay0kVTjXLAZyNLPmWstbJU/QRRJKgdE/9Tx9zOswCET:9XAvg4hQfbbACTbyy03tbckRJK5/5Vw
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
EFT PAYMENT ADVICE-CTI09272022.doc.doc windows office2003
ThisDocument