General

  • Target

    dd11e52efd4ab410eef97b3cb61bbd75_JaffaCakes118

  • Size

    204KB

  • MD5

    dd11e52efd4ab410eef97b3cb61bbd75

  • SHA1

    410839827045c90cb077f28b82c2ccd4fc256497

  • SHA256

    5441e96af6c065975ddd5b61055ea686482dcbb77276304f84fde1e87661a184

  • SHA512

    1329bbfd38286607dcf5555900bdf3c22bb2134067a207e8d64bd61d3b96bb3b9905988793e849b3d7a18af54409d63844884bc1e79ba3019b16c92d7c4ee699

  • SSDEEP

    1536:mtPrT8wrLT0NeXxz1DwefHrTP9yj5J8bdPDFYmO7HvaVudikEYbrp8HX:m2w3keXxz1DfDQYDF/OHvapkEYbm

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • dd11e52efd4ab410eef97b3cb61bbd75_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6