General
-
Target
I607556974763894155_202303091150.zip
-
Size
669KB
-
MD5
c0f38d314c1fd78cf2379dafab4f2681
-
SHA1
117db05a33f6a25e07c80cc3faccb948618e9aa3
-
SHA256
5a8b010e3f79dfe11479afc32c8fcea24763975d4a95eec36720d1f369e8255b
-
SHA512
12c4f9e2334069d10d0583ed369971021cd4b88602af21c00dc6f006b5d0ad2cde8402b067f1705d2ad04d6693c17a08d13a58167ca1dfb9aba0c87515ece67f
-
SSDEEP
3072:U9KxsZJTw9U8wkt3d9Oi0jKXnacTBy1uhzhh8Q8TiqfMA2+DVfZx2ePQCOJEH:U93zn23Oi0uXnTZj+Q8TbfMAJ1xPQjJg
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/I607556974763894155_202303091150.doc office_macro_on_action -
Processes:
resource static1/unpack001/I607556974763894155_202303091150.doc
Files
-
I607556974763894155_202303091150.zip.zip
-
I607556974763894155_202303091150.doc.doc windows office2003
ThisDocument
Module1