General

  • Target

    Contract - Mar 09, 2023.zip

  • Size

    739KB

  • MD5

    9b367c6496d6ccc73c832c89f4d8ef80

  • SHA1

    4de3e5d88bb24ad7c156cbbc7cb11632b4f19298

  • SHA256

    edfd8e518a46b0fde90bf7c2276dd64107a2e09b360cf02f4ffd03a6e6e42d0b

  • SHA512

    42d4a9be27d97c968a7c777b3dfae53a322bced3ce5e26ab4c55edc019702cb58b117e2cdc099ab5d11cf1f08247198379a10439086b8090f585f6b76789a60f

  • SSDEEP

    6144:O2OPYgKAapWp7q0CYcB906oP6FnpamsXp+YIDK/vj9xHsQUsXbN:sggCwZq0CvfS0np0om/vBxMBsB

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • Contract - Mar 09, 2023.zip
    .zip
  • Contract - Mar-09-2023.doc
    .doc windows office2003

    ThisDocument

    Module1