General

  • Target

    4cd62a71d2e8843a00565f2e170a07d9_JaffaCakes118

  • Size

    89KB

  • MD5

    4cd62a71d2e8843a00565f2e170a07d9

  • SHA1

    f46bfa326825e9a964e33db2bd7f0065007d7312

  • SHA256

    acb909d98eb7a643cbc863854e0bed43a1da6082859d4015621125cdf06b8c7e

  • SHA512

    85f8c1f2d9092eee3192ba54063d20a41e988394e645cf4deb540ad91bef52296997d4024ec00f61c90bc72022aede066904a94690d5b4f615d455d6005b9cb3

  • SSDEEP

    1536:61m9qEA+vudU6kyD83ArLCKYrywwymR8ABJsNK5EBzBOUsOAKQwtsiHDOXo7A:614qE5vu5QiLC9WwOKM+K5UBOtwtJDO/

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 4cd62a71d2e8843a00565f2e170a07d9_JaffaCakes118
    .zip

    Password: infected

  • emotet_119.doc
    .doc windows office2003

    ThisDocument

    IDsWYfdHPbMnD

    juMIzHlctqAO

    aaKtritGBEA