General
-
Target
t.zip
-
Size
284KB
-
MD5
0b3b4ec1632259975bd607dbdc0f3823
-
SHA1
010a745f05c63ee95900a201745d7cbc9d46b745
-
SHA256
749460ee3ca9c8f776b1a81e66fc88923f7193b7275dd2e0320f1d5ab4dbcf58
-
SHA512
68eccc4d314c723ec33078195e3a7829cef0889a7bc47e97846eaba2088bf51cb71bda148db6c2e0de8f5029fa0fa575cf8fb866d6ca29337821895e09d7b88f
-
SSDEEP
6144:BPngVZXbatu70DogMDkHS50LdfcGcbz1f5M9KTFrMpSlMq3Ru+Q2E:BPgPbN0kgQ3Ru+x
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
t.zip