General

  • Target

    payment.zip

  • Size

    677KB

  • MD5

    ade4edb6cf3fa63c311afb196f995208

  • SHA1

    14b159c8223342386adf17b8f7e2ed4c3ae265b0

  • SHA256

    e2d76294e4c59a13b9cf80def7c91994d4b1ea6a610708d73684d71abff972a5

  • SHA512

    10f95dba778f0c6c8765791944786d43290f8a6108064f78ba3c04aa14a4f4b61be9f315ce48b60b607dd24018d89de370d9bcb7e0f14545e3457497c6228854

  • SSDEEP

    3072:5cJ4Y7C2UYBbenRoTwWAvuN9nyEeTHuhluAQ/RrrLZNQxBlGT40Fb:GSgC2U4QRfr4nyEsHu7u3rrglb09

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • payment.zip
    .zip
  • payment.doc
    .doc windows office2003

    ThisDocument

    Module1