General

  • Target

    FW Malicious FW Re Payment Has been sent on 692023 via sharepoint.msg

  • Size

    580KB

  • MD5

    f6796d5981effe5469aaf74df7942e5a

  • SHA1

    119c3763640a4590a1b1fa1d417391830d4dd22f

  • SHA256

    343c2b0da93c4826bbd50f1cfa68e9a453a5c008ee038af749982c8fa3c7ce78

  • SHA512

    544dae3bf7c7b7b4209c209bc4a9bed1ea23c8cd36f24ab1c21f06607d87f9c995a89b976e5e577a5bf061ed29e0d769e870ee218147418e41e4da35eabddd45

  • SSDEEP

    6144:OEkXwARlI09YEJxgmhHtEVDf+eAprcrV11EwYxanpabIHrCPZI0+XTf+eAprcrV:5kXzIWmVj+wKXbIHr8Id+

Score
1/10

Malware Config

Signatures

Files

  • FW Malicious FW Re Payment Has been sent on 692023 via sharepoint.msg
    .msg
    • http://AUS01-SY4-obe.outbound.protection.outlook.com

    • http://SY4AUS01FT019.eop-AUS01.prod.protection.outlook.com

    • http://analyzer.securityeducation.com

    • http://communitiesqld.onmicrosoft.com

    • http://cyjma.qld.gov.au

    • http://dsdsatsip.qld.gov.au

    • https://www.covid19.qld.gov.au

    • http://mail.communities.qld.gov.au

    • http://smtp2.communities.qld.gov.au

    • Show all
  • Paid invoice #752 dsdsatsip.qld.gov.au .html
    .html .js
  • headers-29ec98ef-0d1f-4e10-ae08-4e02a9516866.txt
    .eml
  • image001.png
    .png
  • image002.png
    .png
  • vartaskresourcesattachments.png
    .png
  • vartaskresourcesproofpointlogo.png
    .png