General
-
Target
2023-03-09_1413.doc
-
Size
508.2MB
-
MD5
dc0a56bcae1ddb28fa849db9f98532a9
-
SHA1
677b0c43d57ac08ede084cdc6f7e0157811d0d30
-
SHA256
6226310d1bb32e44eaffd7650372c320787327fd8dd7fc1db1cf68aa9ce9256b
-
SHA512
cf7e3fc09da64e5c4bea7c1cdb873a4ed42dc555395dd2d732e037c7e512bf8e084e339974493f1dee3a10b1d7d78f80d72b8afa46454cdfebde0d7bece49201
-
SSDEEP
3072:vpt3LDPYvrTr3jvZNWGBStinoLVMcXyHtt5YC7EGIuGEMYDDK6:H3AvrTPRUGpmpXqWCoGIuGEMY
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2023-03-09_1413.doc.doc windows office2003
ThisDocument
Module1