General
-
Target
PO 2023-03-08_1121.zip
-
Size
710KB
-
MD5
d133f171bfc3f449fce500aa9354aba9
-
SHA1
445a75cb0ae49dbce44db400fd6ba088095ce02d
-
SHA256
55fbb84cd66c50ae0f49abbc64b40e90bf7bccb9bf3cd402371640f07eba2040
-
SHA512
5be14288e4e57fb61399c2152f1ac9a1e611da6999911b5f234f7fdc7a4bbebdb84eb5d3700d0a61fb43972763c48033e1e6c57ff121c9cb030c972d2cd57388
-
SSDEEP
3072:qJPwOBqguhRok0EOsHYQLMTwyOy2w4OLWxKJ5SuNVWla3h:GjTuh1OVQTy/LWq7WlaR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/PO 2023-03-08_1121, US.doc office_macro_on_action -
resource static1/unpack001/PO 2023-03-08_1121, US.doc
Files
-
PO 2023-03-08_1121.zip.zip
-
PO 2023-03-08_1121, US.doc.doc windows office2003
ThisDocument
Module1