General

  • Target

    file_7651a1682b8f428cb8a4c13d252d265d_2024-07-08_15_28_16_509000.zip

  • Size

    605KB

  • MD5

    6d1562346e3c2fbf24870e5b85c0c141

  • SHA1

    5b3cb7f5b2be36540c7dc462af0180f86b0297b2

  • SHA256

    f106adcce8e187490f53cd82beecc8d7906e6c5dcec18651f08f565d20ae8d27

  • SHA512

    3ca7d9b209240ff12cbfb98003059fa8b263d4a82b05808e61c2c314d8758f1934b5a6ac9f37668f53b9bd225e5accc143c350e73fa36139dd5348de88a4693c

  • SSDEEP

    12288:a+bGOpRBqk9UkTs69Y/RhZAhXrHLhPqZZ2ly:aYGOTBqk9UkA6ARIh7r5qZQly

Score
8/10

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • file_7651a1682b8f428cb8a4c13d252d265d_2024-07-08_15_28_16_509000.zip
    .zip
  • entry_1_0/Budget_DnUp56i.xlsm
    .xlsm office2007

    BudgetSheet

    BudgetlWorkbook

    DetailReport

    HeaderReport

    SavedSettings

    DebugModule

    cls_JSONLib

    cls_CommandBarCatcher

    frm_ConfigUtility

    frm_DialogueDownload

    frm_DialogueUpload

    frm_Login

    mod_BGT_JSON

    mod_Common_ExportModules

    mod_Common_Functions

    mod_Common_JSON

    mod_Common_Keycloak

    mod_e5_BGT_Functions

    mod_e5_StandardFunctions

    mod_Kernel32_API

    mod_Ribbon

    mod_userdefined_TYPES

  • manifest.json