General

  • Target

    Form - 09 Mar, 2023.zip

  • Size

    763KB

  • MD5

    05ed383efd2770213aadd1a376375b6b

  • SHA1

    ed26545831bb845cef1df0c94d7c6f23411d1a27

  • SHA256

    e4a7cc13d9e6b8d3b1b27de70d321799fdeb3075fd950cc9675723e9d909d4ea

  • SHA512

    62c162e8bfaba70adc76cc323cda3eddcb3f0cbc1be6127af112a4813eb589e279580c8a992d1b03c621c80a35588d2f7b281d50de2ab5a7c6b9dde867ba448c

  • SSDEEP

    6144:IkjM/ZrZPtRQhpuTec+hFF1NGJsCCmIivTF2f8bKm6zBA7FjAvxtR9NJ:nMZr1YpblFHpCCmRBbKm6l02bbNJ

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • Form - 09 Mar, 2023.zip
    .zip
  • Form - 09 Mar, 2023.doc
    .doc .js windows office2003

    ThisDocument

    Module1