General

  • Target

    MDE_File_Sample_f0b800c9ffe739d1c04b9f3e1ae94c6c5446d72e19c77047511091254e87881f.zip

  • Size

    30KB

  • MD5

    cdc19c1ff490bb901a2e3d114d32cb71

  • SHA1

    996b227c159485a0a4b5f71270b34401fe534bdb

  • SHA256

    329b13b7d368cae32f19497fb94b54f9093a14b107912f35b7564f139b0eb965

  • SHA512

    397cfbfed3938a8869371f6243ea8a5b47928701a7d8c87d19a62d67e86d0fdb8209859edd0fa35c2cf148aab375b80daf2d3a9e36a593bf6e4c8607f80db46f

  • SSDEEP

    768:GcJ0dGdfwY/9PAD2uq1dNz9dsPQkaoQg7Trl2FzIGD:fJpADCxz9OqE7TrCUs

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • MDE_File_Sample_f0b800c9ffe739d1c04b9f3e1ae94c6c5446d72e19c77047511091254e87881f.zip
    .zip

    Password: 12345678

  • Recibo-de-pago-electronico214.pdf
    .pdf

    Password: 12345678

    • https://rebrand.ly/907273