General

  • Target

    g2a_refund_glitch_dutch_2.pdf

  • Size

    669KB

  • MD5

    7a8d6b1b420c50e13b6a7e0681c7c620

  • SHA1

    6cc74f24ac3db69dd93f4bb01ec670413a906ff6

  • SHA256

    3e45443ebf11c3f8dcaf7924bc4f5b6bb4c538bf301dc24cc1cc440322905714

  • SHA512

    1fc2b40d78f430fe1bfc650d351d51c7400d844013b74d5170b944b1634e9a9028dd259653350790a08a1b3f80bdcb8dc87daf542980ae9b965b79f26a096954

  • SSDEEP

    12288:AXD57OqKBLMiJN6huEr4nF/Me1GyIib1Tt2oXt6fjmxZ9VGNQzG1xj0kzGR:QFOBBNJwhu0wGyRbxt2jKxPVGKzQjvze

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • g2a_refund_glitch_dutch_2.pdf
    .pdf
    • https://www.g2a.com/

    • https://hastebin.com/boxogudela.js