General

  • Target

    392cf532a59be6666f115ba88be6f0d8b06d693efa9df7c7a7a064a91036e728.zip

  • Size

    47KB

  • MD5

    bf7146e7658d3cc55ae5e83b3aa06f60

  • SHA1

    2f55350816f4946d7dff8e1cc84cfb2354bd6283

  • SHA256

    71bd333ec746fde9a59e2c6b08220f06eb2dbe386a47aedc183e84b0787ad5d2

  • SHA512

    688ef373ad8ee5d38d40505f8a8c8a10574f0aa102e0266bab669f81b6a517d0bf63aa58bdbd8dac66334e95c545a9ded1ca90f9cae84f6e8545f141b1840821

  • SSDEEP

    768:YbxviYjBYTLqpRsb11MJX7MqvTro8Kj+8L3MWR+pv30/zLE+c2rnNG7E:gx6wBYqc5ioq3XKj+GMWwB30/cUNGA

Score
8/10

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 392cf532a59be6666f115ba88be6f0d8b06d693efa9df7c7a7a064a91036e728.zip
    .zip

    Password: infected

  • 392cf532a59be6666f115ba88be6f0d8b06d693efa9df7c7a7a064a91036e728
    .doc windows office2003

    pixeli

    Nevadam

    invoiceS

    CrossplatformL

    mobileR

    empoweringu

    compressingv

    virtualN

    backendI

    Musici

    InvestorL

    objectorientedX

    bluetoothj

    paradigmm