General

  • Target

    f0c74daf731e37fe9297be64907bdea3_JaffaCakes118

  • Size

    242KB

  • MD5

    f0c74daf731e37fe9297be64907bdea3

  • SHA1

    831a27e69b9523c452fad09e1c0e7fc59d55d04f

  • SHA256

    bab69bb6bf45ff890f0bd0a614e310c971e196da1c0b3251471613c39d84a61a

  • SHA512

    0411820abe42109245923fefa3cc6939a6b42c415907ac7d9439741aa6730fb6ad52dbb3b6be39f28322be863e7b1234b051449d64e5d29fa797d6c16f21b2db

  • SSDEEP

    3072:O9svwvw9HXPJguq73/IKBWyld6dSXljAX1W8:ovKHXPJi73wAsUVjkW8

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • f0c74daf731e37fe9297be64907bdea3_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5