General

  • Target

    45f4c1c5-856f-4d4d-8b37-9d0d50feefcd_email.eml

  • Size

    906KB

  • MD5

    f16a8d3b16d2e7ba2ab42497fe1838b9

  • SHA1

    9862490a10c979c4dbdb4765ae8ac8db303c5476

  • SHA256

    77ad88275774e4c72e2a15a6d90eb0a0d6a801ec6afd44658baa0da482b4641b

  • SHA512

    d13c7717b88a8fb2b30126a3a2368fd72a9d28e40d51d11c8f9efe42ff48cb495743a527f56b28c5df6829e26dd780c4d877a881577ffd7deb2e3554581cad74

  • SSDEEP

    6144:QatvObpFHZuiHMMoDF/mEpYeQij0pvRsfdQQHFQM:9vObXh4DPA64vZ+FQM

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 45f4c1c5-856f-4d4d-8b37-9d0d50feefcd_email.eml
    .eml
  • Rechnungskorrektur 2023.08.03_1115.zip
    .zip
  • Rechnungskorrektur 2023.08.03_1115.doc
    .doc windows office2003

    ThisDocument

    Module1

  • email-html-1.txt
    .html