General
-
Target
89c76e9fb7ca9553bfd2611e7bdac0c2_JaffaCakes118
-
Size
106KB
-
MD5
89c76e9fb7ca9553bfd2611e7bdac0c2
-
SHA1
b4bced8d31ebb6d7591797138f8cbd340cc89e36
-
SHA256
e8852bc0fa9491bfb7d273160a850f6bac7965d17bdd108277eed0e216f9939c
-
SHA512
4e94b276eb6c936413454986b1f1e28f12fe10fad981b37335ba1ef17cd71be909dde21a3d545104598ca706ca6df25924df51ea194c5d20807d02dcea0ef017
-
SSDEEP
1536:ITawKZ09cB7y9ghN8+mQ90MTg+a1mUIpWZFILkZ1GQ:UanB29gb8onlO+LkX
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
89c76e9fb7ca9553bfd2611e7bdac0c2_JaffaCakes118