General

  • Target

    2c66e6e4b410fa92935fe2ab578de1c4_JaffaCakes118

  • Size

    205KB

  • MD5

    2c66e6e4b410fa92935fe2ab578de1c4

  • SHA1

    5b5e733189ce717c5c03b0c8346dfd6d919f75b8

  • SHA256

    1df3f2f68f6237ed98aa84c517a9a80157359eb3c5fea04c27fcc5f8d5835230

  • SHA512

    63a5a459691a3f864eb4384e0b59e02ad5ed3361d05f6969704ab8d15a76aeac7b20327fea38a1b1e3e239c51a595ecf8da751af00db5712aa23f2bacfa3b0a1

  • SSDEEP

    1536:btPrT8wrLT0NeXxz1DweCHrTPiyw5J8bsfnLqSq6cDpvoAFvhFr8WgIYHn/v:b2w3keXxz1Df6aLmStIhZvhFr8WgIQ

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 2c66e6e4b410fa92935fe2ab578de1c4_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6