General
-
Target
List-5148856.zip
-
Size
687KB
-
MD5
dfdfb3280ccd219bb49d5a545c51dff9
-
SHA1
e85d8ebd0297726697027f7c7e6aeb1f3fb28a09
-
SHA256
78e3d4a2cc1afbc05fef5eb30c182895c4590751790d7b9b150a58d5bea3d5d7
-
SHA512
42fbf299d994a4382965035f984e25ab8de93f15ad5c8cbf64dd47708e518c4c748fa52b0c782fd2c36943eefcaa97bf8376b143fdcb0703b0179dc96829b9a7
-
SSDEEP
6144:nJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqU:bbPHom8TYyCT8x5I5wV
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/INVOICE 2023-03-07_1548, United States.doc office_macro_on_action -
resource static1/unpack001/INVOICE 2023-03-07_1548, United States.doc
Files
-
List-5148856.zip.zip
-
INVOICE 2023-03-07_1548, United States.doc.doc windows office2003
ThisDocument
Module1