General

  • Target

    f663c3bff1ac1034269ea51d5f01f982773e6e40ae397d8fb6c0fa4ae627181b

  • Size

    43KB

  • MD5

    b793d76e9007e6e0cf92a6e7482c0311

  • SHA1

    0c6b4ddbb49c8d0b4b6ef5bc97ffbc379c629002

  • SHA256

    f663c3bff1ac1034269ea51d5f01f982773e6e40ae397d8fb6c0fa4ae627181b

  • SHA512

    f60ecf70b7519e4eeaf3ec963855ce378284fdb52f3899b3546a86279c2676e4617802c8549a7e90c1cdb578b564df7f5d2b9d007521dee4b768b4f748713ab0

  • SSDEEP

    768:cjkt9NNt50LUWnaLCIS8fEcTYn6SwsiN1xNOMG3s85sIv2Csqls5:c4pNt50LUWnaNHE9lZiNTEZ3XYz8Q

Score
8/10

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

Files

  • f663c3bff1ac1034269ea51d5f01f982773e6e40ae397d8fb6c0fa4ae627181b
    .zip

    Password: infected

  • County Payment Report - 2022-11-10_1226.xls
    .xls windows office2003