General

  • Target

    5b50d72de3bbef53429ee319e3cc5769_JaffaCakes118

  • Size

    242KB

  • MD5

    5b50d72de3bbef53429ee319e3cc5769

  • SHA1

    982d1f2c285137d479590c65914424bee41a60ae

  • SHA256

    452e449ec4a159f0a6e7c714670371784f26121226a64f31241bb0d868766f6e

  • SHA512

    9429a72296b55f935f70bfb55ac73933617412e6bcf5942324f95e8d60cad2b0a2487fb54d5bdf69e656a73ee53411d7326cef8478c39274732502a86f4a8d17

  • SSDEEP

    3072:Wvw9HXPJguq73/IKBWyOGdS1k6LTID/PnLd:WvKHXPJi73wAzU1NLOXLd

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 5b50d72de3bbef53429ee319e3cc5769_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5