General

  • Target

    41c443d018716c20f237dff3660c20c4_JaffaCakes118

  • Size

    50KB

  • MD5

    41c443d018716c20f237dff3660c20c4

  • SHA1

    5bf4af3cb5e1e4c6513cab010b10c0a201a74e93

  • SHA256

    e67d69bc73ece431afa82413cf87ad33c9b00d42405f75c26601d4b5d72636e4

  • SHA512

    47fdfc337755c3d5833be91d8137dea831af060ada72df6eb1823ff30e76781a6a5d33c0976031480d3830f8cbeb09f33ff5d7c4979407f4f1f3bacefae2ca6e

  • SSDEEP

    768:5BHh9nzIa/DXZ/3pHN/Ha/XSZTwW/P/PJ/29W/U7IQAPozKSeQGTx:5tnzIabphHNfaPSZTFXXJ5QIQAPoWS

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

Files

  • 41c443d018716c20f237dff3660c20c4_JaffaCakes118
    .doc .vbs windows office2003 polyglot