General

  • Target

    Quarantined Messages.zip

  • Size

    217KB

  • MD5

    c2d911bcc30ccf9f54cf18ca16c871f2

  • SHA1

    c73969f31b3707b40b62f6b23dce00c30e840927

  • SHA256

    f6f01d114f4fc0e9bab15fdab9e57c40ab972b66e03cae7b6dc8c5680e8a8da8

  • SHA512

    999ba5a91ed52237d740f36e96e02f8013000fbe88a482e2964086d22b80c4ea63644253696880e570dbe1ef37bcb86f3d9e5c370b2a556030afe0c250cbdced

  • SSDEEP

    6144:EMZUc21dUsIQ53iF0kb4NJOes+FI5E84AanpMyqTQZxR/:TZUcSdh500ZNUesek1ylD/

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Quarantined Messages.zip
    .zip

    Password: 123

  • 89d57a9e-97c0-4913-6f1d-08db9f04a738/8d7c80dc-323b-6a4e-4bbe-624e6784c408.eml
    .eml

    Password: 123

    • http://www.novotelgeelong.com.au/

    • https://www.facebook.com/Novotelgeelong

    • https://instagram.com/novotelgeelong/

    • http://www.twitter.com/novotelgeelong

    • http://www.mimecast.com/products/

  • David Tiller.pdf
    .pdf

    Password: 123

    • http://www.novotel.com

    • http://www.accorhotels.com

    • http://erdi.com.au

  • email-html-2.txt
    .html .js
  • email-plain-1.txt
  • image001.png
    .png
  • image002.png
    .png
  • image003.gif
    .gif
  • image004.gif
    .gif
  • image005.jpg
    .jpg
  • image006.jpg
    .jpg
  • image007.jpg
    .jpg
  • image008.gif
    .gif