General

  • Target

    e15e20f7c7ed87f4e4a978864e35a0d7_JaffaCakes118

  • Size

    129KB

  • MD5

    e15e20f7c7ed87f4e4a978864e35a0d7

  • SHA1

    0a46e56e5784c12c1ed8ddad0b8979b90eda24de

  • SHA256

    22aaee32490d209e35bd403f5cbc4d08dd343228d67515e8ee1f67da9ff48d56

  • SHA512

    7c4c8ac700bb33c08d71af89e4158c3f3eec447e4b05d6dfc787718d1ab3fc1d5c312fc14c06e3dc199a8cc7f9db22630db9a9025ed9e5edf060cea168a65707

  • SSDEEP

    3072:IM40iOftAmQjxu/q2Jz2OVzJDX6j33M/vs0iTUCNhPraZs3:lTfem+xEJymdeb3MtiNZWK3

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

Files

  • e15e20f7c7ed87f4e4a978864e35a0d7_JaffaCakes118
    .eml
    • https://u1798656.ct.sendgrid.net/wf/click?upn=UAdFtisJb9VZhQWNUJRzmcgJBfAkyUknNJzO-2Bzszuov-2F4dZpmzzsStH6vb4IU7LH_SQlS3Z4mMyoSzMaNpt9Hqxaejp70w09nrQLc1jQBVGBREPhQySQV76GbQDU0jpSrkKRaEWQ0eBLF2SPweZrBi9mtlj0JRdWW3A1efDqwnqosc-2BpyRdjvECojEg0e8maEFx-2BlVKw155Skx6UyZWEHtEDNT-2BrQGBFhhY3f7HdFOdH6IBL9-2By2WXgsNFFo5XNFpo4LBCdE8vH-2B6ClUNV-2FGZYg-3D-3D

  • =?UTF-8?B?U2VydmljZS1JbnRlcnJ1cHQtMTc5OTM1ODUyNS56aXA=?=
    .zip
  • Service-Interrupt-1799358525.xls
    .xls windows office2003
  • email-html-1.txt
    .html