General

  • Target

    Challenge+Mail.zip

  • Size

    7KB

  • MD5

    da0b9c8e5aab1b4d2ff953c049144ef5

  • SHA1

    b8f6c3149285b728d151a963ba69ab14c92ca57f

  • SHA256

    76d861adccff620cabe1a3772e563a589924dcd5d7d51cd8a8b47f63b6d87457

  • SHA512

    a7575a6480e18c1a8b33c95348ddd15b18b41f4b2bc51406d67d3c98392d0ee06d661e029944aa7c15f5d8f5ee4213fdfdb3ee90c4c1110e2d9498614140724b

  • SSDEEP

    192:tOlgxtQaLFOjyJCWtRTVMmLze80PhcoLY5v/Fqz0m:tOmxnFOj637MV8IykY5vg5

Score
1/10

Malware Config

Signatures

Files

  • Challenge+Mail.zip
    .zip

    Password: infected

  • Top 3 Blog posts for SOC teams 👀.eml
    .eml
    • https://letsdefend.io/blog/log-sources-for-digital-forensics-windows-and-linux/

    • https://letsdefend.io/blog/how-to-create-home-lab-for-log4j-exploit/

    • https://letsdefend.io/blog/how-to-analyze-rtf-template-injection-attacks/

    • https://letsdefend.io/blog/log-sources-for-digital-forensics-windows-and-linux/)

    • https://letsdefend.io/blog/how-to-create-home-lab-for-log4j-exploit/)

    • https://letsdefend.io/blog/how-to-analyze-rtf-template-injection-attacks/)

    • https://letsdefend.io/blog/)

    • https://letsdefend.us14.list-manage.com/track/click?u=74bda5edf824cea8aad36e707&id=513a2e7c09&e=675c34a61f

    • https://letsdefend.us14.list-manage.com/track/click?u=74bda5edf824cea8aad36e707&id=c78bd79381&e=675c34a61f

    • Show all
  • email-html-2.txt
    .html
  • email-plain-1.txt