The subject is some variation of DOC / Document / document plus a number. There is a ZIP file attached with a name matching the subject, there is no body text.
Contained within the ZIP file is one of several different .js scripts. Trusted third-party analysis (you know who you are, thank you!) shows download locations at:
Detection rates for the dropped binary are 5/54. The malware phones home to the following IPs:
220.127.116.11 (Andrey Orlov aka Relink LLC, Russia / OVH, France)
18.104.22.168 (ITL, Ukraine)
22.214.171.124 (ITL, Latvia)
126.96.36.199 (ITL, Bulgaria)