General

  • Target

    Invoice# 5140312 23-03-2023_0714.zip

  • Size

    651KB

  • MD5

    f98cba3dfe391856a9b57c23542a4e70

  • SHA1

    11c35bfd004ce7c5e4dcbd6f2541da92b36fde39

  • SHA256

    f4fa53f4e973fc4d098cc5cca5ab550661d0b4018aadf1119a476c8597e5370f

  • SHA512

    f365cb2aaef37d2d9c4bc453acfb50e93e6644f9f07f79973ab9e1abaecb70f3a4d89287e6d6ac87a38584fe685d2f13387c322f351a2a6a96d1e8719b4349d6

  • SSDEEP

    3072:hcJ4Y7C2UYBbenRoTwWAvuN9nyEeTHuhluAQ/RrrLZNQxBlGT40FO:uSgC2U4QRfr4nyEsHu7u3rrglb0k

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • Invoice# 5140312 23-03-2023_0714.zip
    .zip
  • Invoice# 5140312 23-03-2023_0714.doc
    .doc windows office2003

    ThisDocument

    Module1