General
-
Target
45f4c1c5-856f-4d4d-8b37-9d0d50feefcd_email.eml
-
Size
906KB
-
MD5
f16a8d3b16d2e7ba2ab42497fe1838b9
-
SHA1
9862490a10c979c4dbdb4765ae8ac8db303c5476
-
SHA256
77ad88275774e4c72e2a15a6d90eb0a0d6a801ec6afd44658baa0da482b4641b
-
SHA512
d13c7717b88a8fb2b30126a3a2368fd72a9d28e40d51d11c8f9efe42ff48cb495743a527f56b28c5df6829e26dd780c4d877a881577ffd7deb2e3554581cad74
-
SSDEEP
6144:QatvObpFHZuiHMMoDF/mEpYeQij0pvRsfdQQHFQM:9vObXh4DPA64vZ+FQM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/Rechnungskorrektur 2023.08.03_1115.doc office_macro_on_action -
resource static1/unpack002/Rechnungskorrektur 2023.08.03_1115.doc
Files
-
45f4c1c5-856f-4d4d-8b37-9d0d50feefcd_email.eml.eml
-
Rechnungskorrektur 2023.08.03_1115.zip.zip
-
Rechnungskorrektur 2023.08.03_1115.doc.doc windows office2003
ThisDocument
Module1
-
email-html-1.txt.html