General

  • Target

    b8400161cad4e7cb1ffb891cc9f1e4f2_JaffaCakes118

  • Size

    242KB

  • MD5

    b8400161cad4e7cb1ffb891cc9f1e4f2

  • SHA1

    62bdfbfb42b50a4313e579815ef24412bc253805

  • SHA256

    be316128081adc314f12526b3242ff9c554375b8437d4abba0c263665b58a308

  • SHA512

    38518e8d4258cac5be8fab4cab47209306ef1240b0ab370989cca63cce997ddbacade6694e4aec1f578d83f1d288c1b61160f2615c9c2430baa7934cd5e80587

  • SSDEEP

    3072:evw9HXPJguq73/IKBWyiEdSQmmNWp/jLjj:evKHXPJi73wA1UsYp/jT

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • b8400161cad4e7cb1ffb891cc9f1e4f2_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5