General

  • Target

    484719270dca5b2e2c14063435b59d0f_JaffaCakes118

  • Size

    110KB

  • MD5

    484719270dca5b2e2c14063435b59d0f

  • SHA1

    4ba82eed3efbdf1fa2674d625df593cd88d0b452

  • SHA256

    6a773a62f398ff48ddfb62bc662bcec5106b3c02f2aa742b80d12a0d37cb04e6

  • SHA512

    da2aeda10faf5e7964ea8f290fc005bc87e8a3618373ae711018f7150bc9488d43a8d4e130375ffe1b2b6aae111f0028b77c7e53224cf712b5d056417874df7f

  • SSDEEP

    1536:KzIkXkfsRNwX0A8K+agil7EB4m3TxX8V:dkhwX+0dEOMX8V

Malware Config

Signatures

  • Office macro that triggers on suspicious action 2 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 484719270dca5b2e2c14063435b59d0f_JaffaCakes118
    .msg .pdf polyglot
    • http://lge.com

    • http://red.jalisco.gob.mx

  • Payroll Report.doc
    .doc windows office2003

    PXoQzwzwoUU

    rAfOKTEGsIbEbr

  • Payroll Report.pdf
    .pdf