General
-
Target
docApples.zip
-
Size
692KB
-
MD5
02210387b6665345efc3b35522a0cc01
-
SHA1
10758568fcb00031d91bf7ca464e13a615d99360
-
SHA256
02768dc06f8344011d3e02d1c5618ce0edd4ccf90380069fec389cdffb1296b2
-
SHA512
8b60179943e69c3670c632ad76c35d40d233393f9c0c4962e2f53b858e4b3f48fed7d95d23de2481615f5f65ba64edc834384180cba8eba621733f4b1a2aaa23
-
SSDEEP
3072:PiAfPs0tO6SniAhaT2fKCEpPMPGzcaefJxRVNlumDpTpx6m7rrInkvkfCGAa+NT0:KAf7Iv5424pUP8cLvprInzCjNjI
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/INVOICE 09-03-2023_0710.doc office_macro_on_action -
resource static1/unpack001/INVOICE 09-03-2023_0710.doc
Files
-
docApples.zip.zip
-
INVOICE 09-03-2023_0710.doc.doc windows office2003
ThisDocument
Module1