General

  • Target

    6a51e95ee504da80a3aee41ac5b72946_JaffaCakes118

  • Size

    241KB

  • MD5

    6a51e95ee504da80a3aee41ac5b72946

  • SHA1

    83c5d9346cc3ec0172cbcb4c6d565c2ac16e3ea0

  • SHA256

    523a015e5c32f58ffde514145402e3bd4487e72aba937cfcea78b50857e6075d

  • SHA512

    722bcc3e604724db4d1fe4ee1a154772127aff709fc09035adf43f33f23ca7bc2ce575b47829fa57f7fa51a1ed6bbf36fbdcd040c6327154d3f60759482e1ad2

  • SSDEEP

    3072:hvw9HXPJguq73/IKBWyhAdSc8hvTXZ/UWTPHZ:hvKHXPJi73wAkUBj5bPHZ

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 6a51e95ee504da80a3aee41ac5b72946_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5