General

  • Target

    Customer Loyalty Member IV.msg

  • Size

    1.1MB

  • MD5

    19409c70a726a351556669c46d2e71bd

  • SHA1

    851ea82b98a8a56148e435fa88a618b05c857746

  • SHA256

    7ab50239bd59d5e584cb0f2982833454433fb01c9d05605cb514d4139d08b85a

  • SHA512

    21f08ab81a8a60a5a1f5995a5e17823a1a1a5c3888c2885bb3289c20789a429e483cec32dc939bce4435df7515adebc44725ab35af115d9b3aae124b64f6063d

  • SSDEEP

    24576:dYmb53cr8Y+Gn8VHVKeb6rsI1gCwl4xC9cZYbJl0NYxowNxbHdIbBJ:dfbxcr8c8VNOHC2wcZYb30N2bxbHde/

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Customer Loyalty Member IV.msg
    .msg
  • Resume July2023 (2).pdf
    .pdf
  • euro-cv-202304.pdf
    .pdf
    • http://www.bupt.edu.cn/

    • http://www.azhar.edu.eg/comm

    • http://www.azhar.eg/education/

    • http://www.tcpdf.org

    • http://gmail.com

    • http://www.bupt.edu.cn