General

  • Target

    0ba9c5bf5c55d2497eafb1b43e1ff291_JaffaCakes118

  • Size

    204KB

  • MD5

    0ba9c5bf5c55d2497eafb1b43e1ff291

  • SHA1

    3b2f9921593236d23d13daab4aaec86015adf088

  • SHA256

    f705384344e1d6727eb4c9b22ac248889b06e613981d6c10e8359779d8c7d282

  • SHA512

    9c4b9cdee35978bbf62d7cbb8c23c4202851a047be0c157b62496a7a1101b255f6e7b07992c59a673654d24dc7a1034d057937eef12ba81e8740fae3404d762c

  • SSDEEP

    1536:atPrT8wrLT0NeXxz1DweuHrTPUym5J8bKeStAaFFj6SlqkdU/ZUmMWJqg0KpD:a2w3keXxz1DfGaZ1AaFKZUU3

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 0ba9c5bf5c55d2497eafb1b43e1ff291_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6