Behavioral task
behavioral1
Sample
cba22bcca80093bce385d25cca3b3f329f23c12e41d509d09990e78d1c3280a9.pdf
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cba22bcca80093bce385d25cca3b3f329f23c12e41d509d09990e78d1c3280a9.pdf
Resource
win10v2004-20230915-en
General
-
Target
11799622667.zip
-
Size
105KB
-
MD5
84358a40be46fe114fe8698aa8bed9ce
-
SHA1
0622004c45bf27aa530bac8040135bb4680d95a0
-
SHA256
66093acf5cf882ba7b7847b257be40861aa9d197ff9d3c494a152081cd57980d
-
SHA512
204a84c02caf9322be66f1bdedb9e3f5f12d6a4d2f8bc202acf1c6ed5c73cad672192e89dc3e12c5602c004896873bff21980cdf3c18b798d539fc3e5dc4c710
-
SSDEEP
3072:49PB4TT4pbX2FyfjQDzvCMKHG09b+/KJbfs5OT:4RKTIGFyLQDLk+/23T
Malware Config
Signatures
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule static1/unpack001/cba22bcca80093bce385d25cca3b3f329f23c12e41d509d09990e78d1c3280a9 pdf_with_link_action
Files
-
11799622667.zip.zip
Password: infected
-
cba22bcca80093bce385d25cca3b3f329f23c12e41d509d09990e78d1c3280a9.pdf
-
https://rsr-nox.com/OFFICE/core/microsoft/index.html
-