General

  • Target

    Payment inquiry 14-03-2023_0958.zip.zip

  • Size

    151KB

  • MD5

    a7e5e132d1e68630d1df25339434f6c6

  • SHA1

    ad86804eb75e433a94dd3d761201bd1b5e9acd43

  • SHA256

    5c5b6ac4dbef08cde7197465425c78577b56181fb1eb6f0109d42183452b0d6a

  • SHA512

    7a63e58ad2e6bf5ea220440e12972abb174453a7da18fd98b69b617af7365e0d78111f3075bd7183403b59ada603a054d96c80c6b5c3a01454fbddc07fcabf16

  • SSDEEP

    3072:h++4ErQKRvGlRhf5c+zmpCcxrGlr8BCz5h7HIOALQfNGn8GpX:h+mQKRvEf5XmpCcVUr80z/o3LxX

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • Payment inquiry 14-03-2023_0958.zip.zip
    .zip

    Password: infected

  • Payment inquiry 14-03-2023_0958.zip
    .zip
  • Payment inquiry 14-03-2023_0958.doc
    .doc windows office2003

    ThisDocument

    Module1