General

  • Target

    6cf19d7eee4ff4da8a79fb8dab15f99e.bin

  • Size

    374KB

  • MD5

    6cf19d7eee4ff4da8a79fb8dab15f99e

  • SHA1

    3eb3ab9d77c3d7f090a53901f39763c5982e5873

  • SHA256

    13359f410a45b46e21b37640edb1fabe71d44f503425b019406cd4d8e1d15d5d

  • SHA512

    3a2cf7a10d85cf0c89ed2c721c7c7da2c88934ab35bf03e6848b9fc1d2177211e0bd42bc68a0d819999e974e4c22caac95ae51017deba24dd777573a64ef1ba6

  • SSDEEP

    6144:pujyZxTqLQsg6aR54kuBceXEr74grSV17hRQSlneWt2NFnBIyPj:Qe7T96dZXw4g45/QSlefNFnqyr

Score
6/10

Malware Config

Signatures

  • PDF contains JavaScript

    Detects presence of JavaScript in PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 6cf19d7eee4ff4da8a79fb8dab15f99e.bin
    .zip

    Password: infected

  • 1ad4e8a66682dfe74980ee99186517e25a81bd2bf00aafbbafbadc3a63cdd4bf.ps1
    .ps1
  • 40dd947539ce0ad32b96f9328c11fced3b4ba423103fb2fbd8cd0497f6be61bd.unknown
  • 8f8264c173e6d036e87b706dbb87e3036ae17df32e53a683c87bff94fce2c242.pdf
    .pdf

    Password: infected

    • https://bit.ly/newbookingupdates

  • a5c406f287b82099796d52cf8edbeec9b6188b3b23b12bf5e2b2b3556c94ec65.exe
  • b7b62436f18ee4fa5b210d099271976d9a7b02dcce605703358a8c68372de063.elf
    .elf linux arm
  • c897c784626cb3d7748dc94bf3401205aa785efcef10a1e5534def1ab68a2f6f.dll
    .dll windows:4 windows x86 arch:x86

    Password: infected

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • f1b2760487007b7db9e7545ee85deafba0e18859d7e43988f2c623cab2793439.exe
  • f28ca289207dfe7c79f3eca130f2a340bbc260c9818b5f5d7b94a3304a9fd4b1.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    5fb55a8cf9e366e92e6438ce6e27e358


    Headers

    Imports

    Sections