General
-
Target
invoce N 74957 09.03.23.zip
-
Size
741KB
-
MD5
e63da6fc44a74b719651d00376dd1924
-
SHA1
17396db3f9656fb55e920b2e9504e43c5bd4e4df
-
SHA256
46af8107f62b4b31aac64d57e7436128defa4e840d87fe1624c570bac742d7ec
-
SHA512
b9a52bbaa0af3e66e55b0ab798c73fcc86bfae5bce36f7924a8194ae97e0158dddbc0fa6304fb2aac2def87dc16c2f387cee24fffba64ae6bab0c4188cb4f223
-
SSDEEP
6144:G2OPYgKAapWp7q0CYcB906oP6FnpamsXp+YIDK/vj9xHsQUsXbP:kggCwZq0CvfS0np0om/vBxMBsD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/invoce No Q74 09.03.23.doc office_macro_on_action -
resource static1/unpack001/invoce No Q74 09.03.23.doc
Files
-
invoce N 74957 09.03.23.zip.zip
-
invoce No Q74 09.03.23.doc.doc windows office2003
ThisDocument
Module1