General

  • Target

    48ae1ebd2bf13b595f16a144c53eb625_JaffaCakes118

  • Size

    242KB

  • MD5

    48ae1ebd2bf13b595f16a144c53eb625

  • SHA1

    3f989f9b16424972100f1836d64632c97763affb

  • SHA256

    25738ae0f45bf14d87b4af749f3750be2e60adb74ee450e6c54183e5ef508b8c

  • SHA512

    d4f327941fc221a2ed1adbf62c5dc416d4c6c2b1d3f88957d5066d2301cbc2a07953e736097ae0638639d14d50d98872aee0e1b825a799250131a8a1fb965d56

  • SSDEEP

    3072:FOw0pklIiuq73/IKBdsIIdSmVvW3rwWHDneXUwEF:FO5pklIo73wA8UmlWbweDYHEF

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 48ae1ebd2bf13b595f16a144c53eb625_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5