Behavioral task
behavioral1
Sample
d9ade9a87de196d78e3b0802f97d72a0cf5070c8b273a10ef5f0295615b87bee.pdf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d9ade9a87de196d78e3b0802f97d72a0cf5070c8b273a10ef5f0295615b87bee.pdf
Resource
win10v2004-20230703-en
General
-
Target
009ffd114695ef56b9ada42b9d476625.bin
-
Size
28KB
-
MD5
e90f0ebbda3ef39ee14d6126d1effad6
-
SHA1
9b1452c782eb9a9d0d94eba58b6d112eeffbec85
-
SHA256
b1e79b032ff78fe34a516c6a760e51daeb1699512b7d38d5361f0542838a1569
-
SHA512
e53d5154640828745c7dc82ea99f04dd91468b940082ace8c5d40aaa89d266040cecf5ae600accc3ebaecf89b36dbd6b4c5dd363256cf2796c9ee6c76bd0df7d
-
SSDEEP
768:66Ilj4DEUmY4+uIAKwVmPdYsOT1hazBqv:6XODEHJDHnXv
Malware Config
Signatures
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule static1/unpack001/d9ade9a87de196d78e3b0802f97d72a0cf5070c8b273a10ef5f0295615b87bee.pdf pdf_with_link_action
Files
-
009ffd114695ef56b9ada42b9d476625.bin.zip
Password: infected
-
d9ade9a87de196d78e3b0802f97d72a0cf5070c8b273a10ef5f0295615b87bee.pdf.pdf
Password: infected
-
https://dkly.me/GpkU
-