General

  • Target

    b864a080-7a35-506d-13aa-8de8cf973ba3.eml

  • Size

    254KB

  • MD5

    52ac8c10b4a70b94a233ee5b0654e970

  • SHA1

    91214a8ee073e1036a3f06fc983723722f3826f1

  • SHA256

    f3a03df06f01486524ce6b847373fe61a68e0b7d6be2305a4a22bae41fd8b1dc

  • SHA512

    bf347bb15a65858fdfe3d28d3f7c342c7d8cf1f9441d91704d65cbc51bf2b9ccff17dfd291b1e38a829f840114b739fb4aef70637a673d419c7c197077ae1506

  • SSDEEP

    6144:bRumEtxQm77K/Sjujq/g9LzTEMiXY1KoC/OisNw+Z:bRuPng9LMMiI1KoFZ

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • b864a080-7a35-506d-13aa-8de8cf973ba3.eml
    .eml
  • Contract_Feb_28_Scan#3.pdf
    .pdf
    • https://firebasestorage.googleapis.com/v0/b/emerald-abbey-377701.appspot.com/o/AxWWzi9LHF%2FContract_02_28_Scan%2346.zip?alt=media&token=0ccc4be3-971e-44dc-9646-7a137589fc56

  • email-html-1.txt
    .html
  • email-plain-2.txt