General
-
Target
RE_ Adoption Referral M.G..eml
-
Size
980KB
-
MD5
fb1a74cec6f3da78c8ea3bb27d1d2e2f
-
SHA1
cabbd837564d5b14656ac578537126253de9e945
-
SHA256
86e908c0c54cfe71c3780eaa3875815d01c15f1f86d5135c2ad76b5287d68b4c
-
SHA512
9067260937d97bcbca08c26f8fad7b3c2e33e2e87ce90cdf9546d92e53931d4728189bb56b80d3d8579d51311f87ad7fa2eadb479ea0e35f490ce1c5da0c43bf
-
SSDEEP
6144:pJRIc/fe90HR8fTHC6KCZozkdAEbs1icg:1e9cR87HzKQEkd0E
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/Contract - Mar-07-2023.doc office_macro_on_action -
resource static1/unpack002/Contract - Mar-07-2023.doc
Files
-
RE_ Adoption Referral M.G..eml.eml
-
http://www.michigan.gov/
-
-
Contract - Mar-07-2023.zip.zip
-
Contract - Mar-07-2023.doc.doc windows office2003
ThisDocument
Module1
-
email-html-1.txt.html
-
image001.png.png