General

  • Target

    7c237ddb779bfff554d0413fb56c4152_JaffaCakes118

  • Size

    406KB

  • MD5

    7c237ddb779bfff554d0413fb56c4152

  • SHA1

    489cd613d3bc930a68b06fac9997587ceb368000

  • SHA256

    f7e7f6f6f70b3303f36882b0c609d5315978ddfd7f7c7633650ba7727f67991e

  • SHA512

    2f70c50135d626d816bcc322904ef36b2d8488282f503eaa545f723caf8b55ef6f562dcc4a27945a4190c2eaeb6a784accae0c4e8a399923fe31c5b96c4b1fe0

  • SSDEEP

    6144:REb2UrRuNijo+o/Q6zep2zQYtIRiq5QCXnIbc48uFEHe1qtLl6MzHLv7:Cb2UtuQkfQ662UFz5QC4bc4O0qZLv7

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

Files

  • 7c237ddb779bfff554d0413fb56c4152_JaffaCakes118
    .xls windows office2003