General

  • Target

    f55e90b6fa22af99afca344b5fbb764872c9cf302b518bbb7ad3d792f4ff4b9f

  • Size

    121KB

  • MD5

    b5f75f68772aa56d44a6b0f8acb6bb93

  • SHA1

    e5ab164052f47cd9b3e0ea543e4ea1b92c01a3fe

  • SHA256

    f55e90b6fa22af99afca344b5fbb764872c9cf302b518bbb7ad3d792f4ff4b9f

  • SHA512

    df32ec88d570178fbacc5185f33b8eaf0388670ff8a2bdd32d0c6ce21c1726da30e58f9486650f73f9f1f864ecaa5162b7a81314704239006daa20b3e1fdf3b7

  • SSDEEP

    1536:+oYQSU2oml64WkOF9gjZHTkmBigAC6wu7n3QNLaqMDetBBBNcT30nONYQQlvXIIj:kQ394SPgjZHTkiiPnGJtBBBNa3V4fVH

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • f55e90b6fa22af99afca344b5fbb764872c9cf302b518bbb7ad3d792f4ff4b9f
    .pdf
    • https://www.dropbox.com/s/q2pxyat76300fhz/BANK%20DRAFT%20COPY1.zip?dl=1

    • https://www.dropbox.com/s/mu522ez45ll725z/DUE%20OUTSTANDING%20INVOICES.bat?dl=1