General

  • Target

    89821a20ff6d340be44ab4981339eafa_JaffaCakes118

  • Size

    204KB

  • MD5

    89821a20ff6d340be44ab4981339eafa

  • SHA1

    37fcdac0190df0406f6d4038a2dac7b27b2dc5ab

  • SHA256

    c440860b2ba0ac6495e3b2b3ce6e4ea52fe143966d0658895082b3a388223680

  • SHA512

    9b375c1a62a110d5ab3343e6296d0ce03536c0386a011bd60c74610e75b842416c8ddd28ba8beab7c03fe23f78ad54f369fda87ab2d34117e7b829681b5bcd6f

  • SSDEEP

    1536:gtPrT8wrLT0NeXxz1Dwe9HrTPxyf5J8bS5g8mvWtd0T3Y/bQIiGh:g2w3keXxz1Dfdsy82MLiGh

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • 89821a20ff6d340be44ab4981339eafa_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6