General

  • Target

    0c9da75ff287398538f62611cd5d0b98_JaffaCakes118

  • Size

    235KB

  • MD5

    0c9da75ff287398538f62611cd5d0b98

  • SHA1

    a6a43433e615ba656df9ad7a37d68c5e88505b91

  • SHA256

    776aca7a006412fbfecec2792ea26041c7b8e1083f0c2604beb7fe636c467f65

  • SHA512

    949fa4554f740a0cdb1792ad4e5cadb3cd31698dc24165d8a593317b933e42c7bb689994671507c58919bcde2de4adda3d5086c4bc4373dd07d2982ab2f13af5

  • SSDEEP

    1536:rterihwjEu5s1mermyzrKXhbRcHrTPIylK/dRYld+x8auwJxfnTQMwaXpt:r/wjd5s1mermyHKxywdSl0bXtQM5

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 0c9da75ff287398538f62611cd5d0b98_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5