General

  • Target

    f67fcd6cb910ca7837e4495149aba830_JaffaCakes118

  • Size

    204KB

  • MD5

    f67fcd6cb910ca7837e4495149aba830

  • SHA1

    b600a8c3cf83b4bac233e23df0112dec4bec4827

  • SHA256

    17c9b1115a6ce855663ed4f03bf8f52c9013a9ae09061bf4105ecc2b8a08a001

  • SHA512

    36a877bd1da4b1d4a210e28b83f2fde9c2d8edf05d44eeef74eb8c913515ee42969b320c9af107d8f23404456db6212982073dbe722870bf4b583713aa242db9

  • SSDEEP

    1536:otPrT8wrLT0NeXxz1DwePHrTPPyB5J8bcSgALPf/ma8fXMHFyYInDntVQ2YL:o2w3keXxz1Dfzg6Pf/C49InDntW9

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • f67fcd6cb910ca7837e4495149aba830_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6