General
-
Target
invio.zip
-
Size
768KB
-
MD5
81d280c8ccd988be947c13f8308fc9dd
-
SHA1
b733fc3217ed4d9cd15ea254d8755f334ab0e438
-
SHA256
9b48f81bfc4461566ca90250127007b1bfeae15b0e7bc8671eeac75f7c4bad80
-
SHA512
7b14d2a60f0a29291c04de5af7e7c73b82df59d0d7eadd39b5aa25849025a4dd46affb9fe2eb037d0ee059f42c817ee1aaf86ef48a553964a6b1037b117d3068
-
SSDEEP
3072:ncjh0tyfwRKDTLEc7Tx6VmRrp65WWs5k+iUqMPQR8NGp5sivL:OmQ1XL5Tv765Wz6+U0Q6NF8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/invio.doc office_macro_on_action -
Processes:
resource static1/unpack001/invio.doc
Files
-
invio.zip.zip
-
invio.doc.doc windows office2003
ThisDocument
Module1