General

  • Target

    07082024_0932_paypal_charges.doc

  • Size

    59KB

  • MD5

    8cb23196027d424917bc9cfe67575de2

  • SHA1

    3ec7888e17e08f0f4caf3c4e2d024968abd52d07

  • SHA256

    69b6bc4db69680118781e7a9f2580738088930fa04884755f23904fa19e638e3

  • SHA512

    e821ff35d6740685752ebfde4003190bf4591ebbbf5e52d026af63dc9e85b8a20ec4f43d7b5fce7fabb7742d1a3eb68a83327b553600beb97d0bd9686662299f

  • SSDEEP

    768:Do3yA+qaVFGhiegFVsSiF1NUWJRHlHcv/emFHLCCJ:DMyAFh/6sSufl8vGsLCCJ

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 07082024_0932_paypal_charges.doc
    .doc windows office2003

    ThisDocument

    NewModule