General

  • Target

    146c64ebe2b539d939c1fe1861857e24_JaffaCakes118

  • Size

    49KB

  • MD5

    146c64ebe2b539d939c1fe1861857e24

  • SHA1

    f5e74e02f26d589b3f3553e81f39058b2e80cbcb

  • SHA256

    c02dba2f5b5b9f2403b4203e00f17991ada069da6f038d3d77a3a1cd121ae09c

  • SHA512

    54cb33046a8576c0165ea4b489ad62fe412f45f921df539898a822fc8a098d83a0254c886f6bdda3ae38837039dbf057184f6dd82d137f3129082717cc058ca0

  • SSDEEP

    384:R84Ybs9riSeav9LyGm8iyvhSBjoSnJ7ytcvjFX0c+tyjzQso91WnX0jHd:LoY9LTmMIkSnJzkcayK6E

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

Files

  • 146c64ebe2b539d939c1fe1861857e24_JaffaCakes118
    .doc .vbs windows office2003 polyglot