General

  • Target

    4차추경 전체편집.pdf.eqza

  • Size

    425KB

  • MD5

    63dffa5655093df30effe96fc3cfec3f

  • SHA1

    23c1950e23525ace03533a8b86d3ebe61bbbfb6b

  • SHA256

    b27ae23b84c0697daff181b5f925156a89d6bf1750d0081867276d6ab1e4caf0

  • SHA512

    dbe0065e98e96ddd863dbaf3852cfe272fab07be38c121cf98f0089cfa87f5aa961f97d49f6dd1454ae8007c5a36c233677c442963d12822a92d40f8789ab658

  • SSDEEP

    12288:2TAEiyJjN5eV4ETqlKA1A5oLkJLfxtVY5:JIHhOmk5ogttVY5

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 4차추경 전체편집.pdf.eqza
    .pdf