General

  • Target

    6b3ba1a762d6a13f6853fb49adf7f14f_JaffaCakes118

  • Size

    242KB

  • MD5

    6b3ba1a762d6a13f6853fb49adf7f14f

  • SHA1

    e4e0f1400b542fe7f649825b742a5430c34f37dd

  • SHA256

    499e30e340b15034ae82b1fb243aca0400db9372f3fcd645a295ff93b1cd76c9

  • SHA512

    175e249401665d6d2e723fb2a04548cef69ee2b39e637d594a0c406a6a89dadb6ccd5332546322e7ca6c06621fd8eff4698e533c86a56501a4c45a42502b8947

  • SSDEEP

    3072:8Ow0pklIiuq73/IKBdsVYdSctF6kXiG/pd:8O5pklIo73wA/UMF6k7pd

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 6b3ba1a762d6a13f6853fb49adf7f14f_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5