General

  • Target

    3ae30f82ae8c25f26f94e3ef93d1ab3d_JaffaCakes118

  • Size

    205KB

  • MD5

    3ae30f82ae8c25f26f94e3ef93d1ab3d

  • SHA1

    2e8de115d9655b329bac3cea708ec7b0130e78fd

  • SHA256

    bd8c4ac429fb14a804d378a5996fde36205b309fa79f10484f35fea8c2a99731

  • SHA512

    8bd15f561fab1c249459c3075c91d27f79f36b57713c8172c0f846b71dab375ed09278066792df898c4a1a8901ff9158d50f3b3061e5aa2f547469c1e58bd9d7

  • SSDEEP

    1536:LtPrT8wrLT0NeXxz1DweMHrTPey05J8bGTo2/5jvXesyaKn+1I6tH2vAWm:L2w3keXxz1DfoW5To2/ga+PWcm

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 3ae30f82ae8c25f26f94e3ef93d1ab3d_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6