General

  • Target

    0e29330c548cd44327fd32db1c3e8d61_JaffaCakes118

  • Size

    241KB

  • MD5

    0e29330c548cd44327fd32db1c3e8d61

  • SHA1

    cc3172e16fb83ec80df3e7c3d47542191e850540

  • SHA256

    4ce8b6c4dda4840117ae7a086a723d8740b9874a5e53e8019a6d10692ce4c5d7

  • SHA512

    a200a1756e771407ffd9e56bf3c37da00aa64fcf2c3283a77e64464a5a321cbac9376dd69f4afd9c7abae8d6458d65a21b36926b03cb0a29b2b99a7b496c6208

  • SSDEEP

    3072:Tvw9HXPJguq73/IKBWyHWdS/HfqSAZHa5PGH4O:TvKHXPJi73wAQUaSAZHalCP

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 0e29330c548cd44327fd32db1c3e8d61_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5