General
-
Target
2023-03-08_1840.zip
-
Size
688KB
-
MD5
eca31a6cb2b8dbaa0cb05df4a0dcdc02
-
SHA1
a829c84f97656f434453024342b635b2906a75ac
-
SHA256
edace0e483d7b3895fece61b41f316e826b8513e9ba65e4107bcf35ee6e27dca
-
SHA512
92bc173f20bc3a99f4b9a02c3e98e599a335bcb345e310cdcfd7d90ad4e5696769ec0d1c275f917613669b0998dcae880ff60fe4b4c2fc395f836b0865d3ff72
-
SSDEEP
6144:oNSIG3mSp/X+aupc0VviBPZRiGNNjBwbvrO:os32Sp/X+av4vitnJHjybvrO
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2023-03-08_1840.doc office_macro_on_action -
resource static1/unpack001/2023-03-08_1840.doc
Files
-
2023-03-08_1840.zip.zip
-
2023-03-08_1840.doc.doc windows office2003
ThisDocument
Module1