General

  • Target

    Quarantined Messages (3).zip

  • Size

    894KB

  • MD5

    684de1ad956e99e4ed98802661283a54

  • SHA1

    101c793c74bf71be53d0463887df9338bcde1708

  • SHA256

    652cb15247f9510c863a4c7736dcdb7b6f6cdd0451748d677a2d9f5483fd095d

  • SHA512

    7aedcf2d8d6e74afd6475cddfebd2eae3c63a1ab54bcf968f511075c8d20a0add5e21c1fc901984abc441a7acf3b99703c63ec412cbc7a2be7ede1ac038fc114

  • SSDEEP

    12288:p/+3gkJ0WmsB1vvNw78UYNv+jMG+UByJlTJaRL5PBP5FLJRc6W0RUguBWbuqI620:9u7m4bwIAaSyJCRxBPbLjWwUguII6zvp

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Quarantined Messages (3).zip
    .zip

    Password: infected

  • c817d219-7ce5-449b-c01f-08dbe55cc913/9a5977d4-b769-ce9c-0a9a-50e5be643068.eml
    .eml

    Password: infected

  • 403b_Application.pdf
    .pdf

    Password: infected

    • http://gmail.com

    • http://www.invesco.com/us/dolregs.

    • http://invesco.com/urs

  • awd.json
  • email-plain-1.txt