General

  • Target

    4aba6f036bf1a57f926449d62e9bd232_JaffaCakes118

  • Size

    120KB

  • MD5

    4aba6f036bf1a57f926449d62e9bd232

  • SHA1

    e5bb1251a140517dc08a885bda5ca55fc5aeb589

  • SHA256

    9f90a25300306fbe733ce1dd2e2747563dcdc77be6ed784cdbc2f5e22eca6fb5

  • SHA512

    7f6dba12e0fab0e4a0cb71c3dc6257a8d350831ed42cf956340e28c87d4cf4f0136e53005933dfaa5f7c8e05fbd2916ba02a46f478f832b0ccbeffc894e1077c

  • SSDEEP

    768:YOi08pB26naP6K9+HoFx5IhYlEbIAC2scXuapFy8VnZ84dPFmKKYYC:Yf08pB2KaP3vD++lEb1yCZlF/KHC

Score
8/10

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 4aba6f036bf1a57f926449d62e9bd232_JaffaCakes118
    .eml
  • Fedex Document.ppt
    .pps .ppt windows office2003

    deditacted

    google

    aksdoaksodkaksdoaksodk

    aksdoaksodkasdasdasdad

    comnnn

  • attachment-2
    .jpg
  • email-html-1.txt
    .html