General

  • Target

    invoce N 762 08 03 2023.zip

  • Size

    695KB

  • MD5

    bd4f251cc3858cd08f5cd5d96776d12c

  • SHA1

    979784ea8411defeb3f7de27095d7ba7559a69e9

  • SHA256

    cb777b31d4993dd6c24dcf90c9fe51170f9146139b693221466336685944bcd2

  • SHA512

    068ddde3ee44516bc589485c68e02adfafe4faf8cc8a7c06380263cd6b667444187302f46d852e37d70228b548ac77d315cea9c70a1beb8fc9a486d2ffcac52a

  • SSDEEP

    6144:QJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqr:0bPHom8TYyCT8x5I5wq

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • invoce N 762 08 03 2023.zip
    .zip

    Password: infected

  • invoce WK63649 08 03 2023.doc
    .doc windows office2003

    ThisDocument

    Module1