General

  • Target

    bcaa3be9-998c-1804-d50c-a213fe6a7553.eml

  • Size

    921KB

  • MD5

    5f47f600165ec0498a245787bb4efa29

  • SHA1

    7837c9e901f8a9f1b739f950823869725ef2f41c

  • SHA256

    e87810227505a9d7bdde7ba7d2015d48ef43c847dec950a1144f3b342686c048

  • SHA512

    28612a1cb7ee65345e880b52115130a56d96ada88b0ffae27815cad01ed6a1ff39e4fd5d16b702105edc313e211f5af5d543173b6f8969fdf8eceacbd768b9e4

  • SSDEEP

    6144:bTYWmQNyNnavU5wal+3SIZ5aWrfITY3TzHxgGb:bTBzytF5wQ+3KsfIT8T7vb

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • bcaa3be9-998c-1804-d50c-a213fe6a7553.eml
    .eml
    • https://trpconf.zoom.us/j/99565829129?pwd=SnpIZkhWbmZzRHhNM3FqRmdqcWhBZz09&from=addon

    • https://trpconf.zoom.us/u/asG5iG3Fv

  • Gmail_20230308_676926_009.zip
    .zip
  • 20230308_67941_0027.doc
    .doc windows office2003

    ThisDocument

    Module1

  • email-html-1.txt
    .html
  • image001.png
    .png