General

  • Target

    be72d8c4f02daac820326610f513ae95_JaffaCakes118

  • Size

    234KB

  • MD5

    be72d8c4f02daac820326610f513ae95

  • SHA1

    8b8312ba663861f4d04cb7f56375350947416ad2

  • SHA256

    c318c2e798d9ca2f81ea9ec023393f5c975111f88a7f2e4177dc2bf53de1923f

  • SHA512

    5648cf3ba4641f6c5b1d8a969829f8cc999446e26fb4e44701c70e9dd0daaba252b12c6b109920fef2ed47614868d3db9193bdda46a6b6b577ee16de2e77ddf3

  • SSDEEP

    3072:0Uwxv5OsmqrmrAKHtAdSeLFeInwRCEqxL:0Ugv5O4rmEzUmFeInAuL

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • be72d8c4f02daac820326610f513ae95_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5