General

  • Target

    2d27a1f3eeec5fdca3ec80489a324150_JaffaCakes118

  • Size

    244KB

  • MD5

    2d27a1f3eeec5fdca3ec80489a324150

  • SHA1

    329238308b3d8bcc0f8b750e8f688c88f650fcee

  • SHA256

    1d92ed98ab64c028fb00bdb1edb06bd48d9df3a1d6ed665a12bc85fffafc6841

  • SHA512

    a4df8e22c54abd610b3b466011aad460f05968a99a6bddc2e119337179f67e3dcce625fb44691d438cabcbcb0d50b235773507f0121625ecb330968160d4820b

  • SSDEEP

    3072:VUAA3WuH/S6AQn9cfhjcgBYfk1VOGCYGgktDkQktDSOJpDa:ePAsUlcKp1UGCYONnktbZa

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 2d27a1f3eeec5fdca3ec80489a324150_JaffaCakes118
    .eml
    • https://aka.ms/ghei36

    • https://www.ipipeline.com/

  • Inquiry.doc
    .doc windows office2003

    JVJMimjjFz

    ANMfhMdVHtUajl

    wKMQEpzwq

  • email-html-2.txt
    .html
  • email-plain-1.txt