Resubmissions

09-03-2023 23:18

230309-3ase3scd7z 8

09-03-2023 20:03

230309-ys1rysbf8x 10

General

  • Target

    payment.zip

  • Size

    707KB

  • MD5

    e607f8754ebe696ff5037517dd6f7ee7

  • SHA1

    bbde3f3c1f57077801e336d57d70b9b0ac9d9d96

  • SHA256

    746aec8fa2532926c62ead1f37431538f14c12da17c8fe5f3467ea2f529a7ea8

  • SHA512

    504055b62a8da862eb418e8d380e56966da9572882869439523611accd5c65148953516cee13d7b2b7db1e5e230188ed5dc57c9a5645c368edc1e8d11475848c

  • SSDEEP

    3072:bjkdNNlBl3tTPyn/fIvTr+/LTSTHoXuS3Xw8uAnuA3rogT9/N:vkd/l3DvTKTsHkdtuAswN

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • payment.zip
    .zip
  • payment.doc
    .doc windows office2003

    ThisDocument

    Module1