General

  • Target

    702c3bf65b55dbf6b2c8017e2d2a2a8e_JaffaCakes118

  • Size

    205KB

  • MD5

    702c3bf65b55dbf6b2c8017e2d2a2a8e

  • SHA1

    c7f848a851f4378c5ae706c2b45e08f7bd2489f5

  • SHA256

    2896eb9820aa5f58fb999c603716e74138ca89875fffd0176d4b13c6b00a807b

  • SHA512

    96f1553a958969339640810414107f64bb2ac8d57e43069cd10a3343364cc86daa6486e9496dd6c3543c4a53fa329460c01a0c92fb9f8065fd8ea0122fdcdaba

  • SSDEEP

    1536:AtPrT8wrLT0NeXxz1Dwe9HrTPLy15J8buMLMtVVfT/mxL/8W1oHJ+PvtTCmOtN:A2w3keXxz1DfdsrUWVexLlYgtC

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 702c3bf65b55dbf6b2c8017e2d2a2a8e_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6