General
-
Target
PO 2023-03-08_1201, USA.doc
-
Size
514.3MB
-
MD5
2103ad02afba454f7e3bc79bd2d230c6
-
SHA1
c939759d733481f1912fa2bfed192b0b8551545f
-
SHA256
7fa43c67c2ae59cca2cc80f81469ebce48b8f6910e2c9d62f307bd5534c0e86e
-
SHA512
c487461dee8f02f32b2be83a06d0beea8366677750eb88a807e787e5a9744712215fbc7d592eb84c604ab56460472eb5f57ccc1d1fa99bceaef781dbb3d01d84
-
SSDEEP
3072:2JX29m8QBUoItA/leC6gSJ+2JiclnUOvrRxqmLcHeNJxPkdVdTRcDK6:2EmleC6gSJWclU0RxVLcHe5cdTR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
PO 2023-03-08_1201, USA.doc.doc windows office2003
ThisDocument
Module1