Behavioral task
behavioral1
Sample
84916e56cd2cc5a39a2f91ef33eb4cba8c882f8ad5908d72f2fa2a502bbf7544.pdf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
84916e56cd2cc5a39a2f91ef33eb4cba8c882f8ad5908d72f2fa2a502bbf7544.pdf
Resource
win10v2004-20230220-en
General
-
Target
10676329630.zip
-
Size
224KB
-
MD5
44aa603747cce622f2de619f10f1b4e6
-
SHA1
8b6c1e79dbe42c9a8deae71b0e37c9aa409205a5
-
SHA256
2a0f71ab85a35a157a5750a9f4dde2bfb16f27a92d73792a16d06013ae80bef6
-
SHA512
dbc8df1fc96324eba3b1626789bb49cf55094005175f3c4003d4181fac6674da472bbb1df667aa85bfa09fbcc0b39970396297ed9e71a665052dec0eb2521cc2
-
SSDEEP
6144:fF7Bv2hXg4By17B/bYG5luXMtxIjc30aTLBQe+M4oPw:fbQy1lMGm8j/V/V7Pw
Malware Config
Signatures
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule static1/unpack001/84916e56cd2cc5a39a2f91ef33eb4cba8c882f8ad5908d72f2fa2a502bbf7544 pdf_with_link_action
Files
-
10676329630.zip.zip
Password: infected
-
84916e56cd2cc5a39a2f91ef33eb4cba8c882f8ad5908d72f2fa2a502bbf7544.pdf
Password: infected
-
https://amp.abc.net.au/article/101457318
-
https://amp.abc.net.au/article/101457318en-GB,
-