General

  • Target

    7347b8b482d4185b9e80b7013ced1019_JaffaCakes118

  • Size

    653KB

  • MD5

    7347b8b482d4185b9e80b7013ced1019

  • SHA1

    2a74cb315082a3729d80ebde02757b7e7ed5ab3f

  • SHA256

    f0477ac3d6076130fdb7feb394b84994421484e70674a303b063168d4fd59d10

  • SHA512

    09080b8756e6d3b8d121461e9a1b7d2347df09dab20fd8913aef76da39d457a8613edab7ae30c942d04455dc78eacbad6d0e2b838c748d192088817d9ef0d17d

  • SSDEEP

    12288:nuvKkfP+nEhsv5BcQsNeKvix7unLpdlo5CXmobj5Nnz7X:n+KkHq5BchNe0k7uLpb8Qmobj5lz

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

Files

  • 7347b8b482d4185b9e80b7013ced1019_JaffaCakes118
    .doc windows office2003