General

  • Target

    b92dfc33e462eece52235659a42e7b43_JaffaCakes118

  • Size

    329KB

  • MD5

    b92dfc33e462eece52235659a42e7b43

  • SHA1

    0e783028fc1edcff19733e639e2f7372fa21911f

  • SHA256

    ff23db6bb877215183ee77e771c2cea02d8b7138b49121cf74c4af96bce84024

  • SHA512

    b778c7ef2607c168d6f9de74722a43784c835c10bf334b35793e78849e8653f42e212e0db210a6c699628dfe4eceb9446e89dba25923cecf0f0376bdf2303f52

  • SSDEEP

    6144:ZpgFW+U8sbtP4bJHEUJX6kO0OrKFpPMMfhI1R2TPWtAu3TX3hZai+RF/MwW:MHEm402AM2q8IAaTXiRF/MwW

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • b92dfc33e462eece52235659a42e7b43_JaffaCakes118
    .eml
  • R5180448.doc
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

  • email-html-2.txt
    .html
  • email-plain-1.txt