Resubmissions
16/03/2023, 02:21
230316-ctfmhsge33 10General
-
Target
2023-03-08_1025.zip
-
Size
687KB
-
MD5
f6d50249f01143995c778ae549643704
-
SHA1
fcb9f4d23a083e69c0b6ac8c22a9009d2542a448
-
SHA256
61e39d6315924cf6e7bd41cdc6b81cc815ad0ef9f6d86f515c43b8f6b35211a4
-
SHA512
05016131d06649c9d0e99c262112592136bcd7d749efa65c345dae0727dcdd40dc5d7e6eb3cb33b25abb5d8b60b5775bf3b4984f4c759eaa6746a00358350f3e
-
SSDEEP
6144:GJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqB:ibPHom8TYyCT8x5I5wm
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2023-03-08_1025.doc office_macro_on_action -
resource static1/unpack001/2023-03-08_1025.doc
Files
-
2023-03-08_1025.zip.zip
-
2023-03-08_1025.doc.doc windows office2003
ThisDocument
Module1