General

  • Target

    9a3f2bfc65cda56de3d004232a634b49_JaffaCakes118

  • Size

    170KB

  • MD5

    9a3f2bfc65cda56de3d004232a634b49

  • SHA1

    05193e7be031a1b439884191ef325677540ff349

  • SHA256

    b4a4cc29a5299f5dd0a70d1f9cc19c6804d5048b7f049b04bdae97c368c89353

  • SHA512

    cf291b9ba44ddb4385970db009c86461de41da5bc9a7372876c4dbf643ee6444768347bcf8f95df633618e05c53a6db7c31407ab61db234ab81013092edd5f69

  • SSDEEP

    1536:P0dL581ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadE+aw2zoPomZ:MD8GhDS0o9zTGOZD6EbzCdSyom

Malware Config

Signatures

  • Office macro that triggers on suspicious action 2 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 9a3f2bfc65cda56de3d004232a634b49_JaffaCakes118
    .msg
    • http://bascom.pl

    • http://microsystem.com.pl

    • http://tresases.com.ar

  • Rechnung_ZU3953_datei.doc
    .doc windows office2003

    vhzBiAsI