General

  • Target

    b5274a3d519bea75510b079719bff2ae_JaffaCakes118

  • Size

    242KB

  • MD5

    b5274a3d519bea75510b079719bff2ae

  • SHA1

    10711dfe22631a52acef5def146db06f0dae1c45

  • SHA256

    47b8fc44b9a1f82e206bef028a0e53fefae94ece2f3b26629dc7cb3b6f1fa115

  • SHA512

    6c8e2caf1bb393c8f1582b060605e80824d720368c04af1683f7c5fe29ec5bd6dc33bfd90c89ebf141d9720ae16c8ee2da8a55eaf5cf09c2ffd1ca2c4ea8d848

  • SSDEEP

    1536:PterTkw9HnXPJguq73/IKB5Kby0gOxHrTPTyKK/dRY7z/znRbtr9bueQBs:Pvw9HXPJguq73/IKBWy8qdSbRbHueOs

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • b5274a3d519bea75510b079719bff2ae_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5