General

  • Target

    ce0b492ead649ec0f969f7707dbbd095_JaffaCakes118

  • Size

    205KB

  • MD5

    ce0b492ead649ec0f969f7707dbbd095

  • SHA1

    512deddfbd6d2379b03b29377dd2f00db6169a89

  • SHA256

    3142fc23152d5280d5632adb1242f3561384c401c5f797e0ef00e3c4bd7d94ef

  • SHA512

    89bae7634c0b852a28994a30cd022a44b60241a8846b069768ba5c94e4b95f7a52b97c912610644f8f07df645166af34ce9b24f73dfb35fe0484fff6eb67c18e

  • SSDEEP

    1536:7tPrT8wrLT0NeXxz1DweEHrTP/yx5J8brjuQjfh+d+VwBhUJmQuNKuLD4ZWJ:72w3keXxz1DfgUrQjp+dsmPNH9J

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • ce0b492ead649ec0f969f7707dbbd095_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6