General

  • Target

    31c12f25442478c74b86f10df9e4c64c_JaffaCakes118

  • Size

    239KB

  • MD5

    31c12f25442478c74b86f10df9e4c64c

  • SHA1

    68584215b550be13cf92707b462ce26ba2a81cd9

  • SHA256

    0f4682daa2393db4949f088557addba446aa2f7e72f4cba6f467ec6ec2705813

  • SHA512

    6f0df456d0c01d27c7ae9f89a8b2c8eb29b97effcd971ee92fe05ebee1e4fc4f4f55c260a1e55c8716bb800278ac8a921874eac3664637faf6cf80511eb33101

  • SSDEEP

    1536:5terU1wDv/6MaETOgnHJcIKBC5bvzsyHrTP6yTK/dRYc3YkmDlOQbaJ9IKdSgdaN:5/wDvWETOgnHJcIKBs7tIdSrpAJ3dO

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 31c12f25442478c74b86f10df9e4c64c_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5