General

  • Target

    b7b860966a8b482b31b373b8a4ad6b94_JaffaCakes118

  • Size

    241KB

  • MD5

    b7b860966a8b482b31b373b8a4ad6b94

  • SHA1

    243183e2b96e54e3bcc505eef4f4f2ba62f19e87

  • SHA256

    5545e73b986109deb32cd95da0a778503f3581b4dbc4391b4c4548f53c510910

  • SHA512

    5c6b680be58cf63515b34ae45557879282d6d664f167da92ff3640a1c43673ceeb2451eb1c4588f5f3a18814f0a0808a65a23304b83a77f127d812d585380e4f

  • SSDEEP

    1536:HterTkw9HnXPJguq73/IKB5Kby0g5oHrTPQyNK/dRYEB17KhX1XnTN9mSxwRz8E:Hvw9HXPJguq73/IKBWyQgdS0KhlNW

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • b7b860966a8b482b31b373b8a4ad6b94_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5