General

  • Target

    5f11de514f3d3509503e6b8efb07f74f_JaffaCakes118

  • Size

    241KB

  • MD5

    5f11de514f3d3509503e6b8efb07f74f

  • SHA1

    707a13ec3e6cd3e806256e0dc6fadfededb26b14

  • SHA256

    1d9e75a4a65f357562afa337b0d6c482ed2ba707d55ec618fc16fe9610445d50

  • SHA512

    055f6b0895daa14f21ed160a845a5e56daf9318237e30d2d2d39eee2e5d36adb86846ff3242831a857672de88bf0dc47c8de77d84ef9688999253e06e43784a5

  • SSDEEP

    1536:zterTkw9HnXPJguq73/IKB5Kby0gmJHrTP7yiK/dRYm4whVi9zCEAw0Ffu:zvw9HXPJguq73/IKBWy8qdSLImAhu

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 5f11de514f3d3509503e6b8efb07f74f_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5