General

  • Target

    40d13c5d392f1643680d53dc3e533d44_JaffaCakes118

  • Size

    334KB

  • MD5

    40d13c5d392f1643680d53dc3e533d44

  • SHA1

    1c7dd48c2c3ecf46251973dd127e4e2e73667c1b

  • SHA256

    6c26092706381c1ec4c5a095606ca79a5a9a3f519aae625bc80ff24d514459ff

  • SHA512

    11b6047da7ef389e19e596b3babdcd47fc097b566720d8df0b8e461c7b0177b5339117a2b9869c7799e71f8da8380c10962a320e8f0add04c74ef47a418a648f

  • SSDEEP

    6144:zLFpQBbhid/O0scgP3Ud0d5Ij150OkUFQFnTgYHa2twMr3FmASX:nFpahid/O0scw3U6ij150yATgY62twMG

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 40d13c5d392f1643680d53dc3e533d44_JaffaCakes118
    .doc windows office2003

    ThisDocument

    XPcGOlF