General

  • Target

    a921f35fa8b71b7edf06ce20208a913e_JaffaCakes118

  • Size

    205KB

  • MD5

    a921f35fa8b71b7edf06ce20208a913e

  • SHA1

    fb7b80c309c67d8f608acfad3af2979134df7393

  • SHA256

    b1212035c7afda74ac4c4b212e55bbf0ff203dd626541232e1f02d53d9f285b3

  • SHA512

    5cc3aff92ca35143441da7fbae45d247712a6bbc3a11ce73ce8ee770c4d25be9ec9cf1e16cd1087422bfe6a3e1837db812151085cd5a1835617ece4e1b613c3f

  • SSDEEP

    1536:0tPrT8wrLT0NeXxz1Dwe5HrTPLyF5J8bwXqxD7pS++4IBfPJLE:02w3keXxz1Df5oFXq17pS+gPJ4

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • a921f35fa8b71b7edf06ce20208a913e_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6