General

  • Target

    fd9c2e32e98619316fa5c8b58c07a564_JaffaCakes118

  • Size

    205KB

  • MD5

    fd9c2e32e98619316fa5c8b58c07a564

  • SHA1

    24d997c4c865e3dd32f30aaaed251d3303138118

  • SHA256

    bcfb8c110be97b9da6a543f2274cfec57dacee3996c24fd760dd58e65503ab8e

  • SHA512

    cf6272e1081f40abe9b0b96e4953322276be39654c45c726fd82933ba8db01401b443b2de8078d2ad5b60c0830d6e341ce552917c313cea7db2b9f005d8b1c08

  • SSDEEP

    1536:dtPrT8wrLT0NeXxz1DweuHrTPhyP5J8b6Rx1ap1cPHfeqX1DDnkn:d2w3keXxz1DfGAlRPWGP/HX1k

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

Files

  • fd9c2e32e98619316fa5c8b58c07a564_JaffaCakes118
    .doc .eml office polyglot

    ThisDocument

    UserForm1

    UserForm2

    UserForm3

    UserForm4

    UserForm5

    UserForm6