General

  • Target

    tavistockrelationships.org_images_application_forms_rsq_for_intact_expecting_parents_jan_2020.xlsm.xls

  • Size

    272KB

  • MD5

    0f7954e54c7b325ac84301cc0aba0e06

  • SHA1

    2887019a5527fa466824afa0d7dc8aaea206177e

  • SHA256

    91e9323ceb087b07548bdbb14624c1c2fe20b920616c0ae9b7f27918ffddcc14

  • SHA512

    53666aefe2279a9150d04a3b4b4b35003943426463a09b679569c676632267f81f7471c3d145ee9bd095ca9272734bac6b2693e3134504cec1449040a1a20971

  • SSDEEP

    6144:R+XZaW4tLWJ3Y2qLNFVa8hcWJKushUAnlKGZ7Ls:MMW4AJ3Y28VZhlk9UAlFs

Score
8/10

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • tavistockrelationships.org_images_application_forms_rsq_for_intact_expecting_parents_jan_2020.xlsm.xls
    .xlsm .xls office2007

    ThisWorkbook

    Sheet1

    Sheet2

    Sheet3

    Sheet7

    Sheet5

    Sheet6

    Module1

    Module2

    Module4

    Module5

    Module6

    Sheet4

    Sheet8