General

  • Target

    Invoice.eml

  • Size

    171KB

  • MD5

    a822c3d72014e0436697fcbc8b0d9584

  • SHA1

    32ca7fbfdb6e9c7718c599f7c7a33c5639e9951f

  • SHA256

    254669b7cb6566f9d87f5e04e0a7fddb23651237b1f48433b2cbd2f11313a932

  • SHA512

    aac809c1f6490f611d82594d0774080293bd06d82cb1c23c13b017ee4ec7921b41d9e0bf65a9b925853230d063c0e519cd81c1deac8764c87b68f490ee04d858

  • SSDEEP

    3072:JWDacZH55vej9Pqa/QkTawO/cd9ILBpINsOM/tNUEGy9b/NABmDTR6Xyz1P:4ZH55vA9CaoYawOUdOLBpNOMVNUEGyRR

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Invoice.eml
    .eml
  • CUsers7storeyDownloadsbooking d(1).pdf
    .pdf
    • http://Booking.com

  • email-plain-1.txt