General

  • Target

    tmp

  • Size

    57KB

  • MD5

    cefaad5705d4acf62be6974cb6fbebb1

  • SHA1

    6516d270892325e00575f498b1c98c16336d459c

  • SHA256

    5bc8cd8f4c8b8f31b74b49fb6115c332d9028947a4b2ca006f49bb20e9cf63d3

  • SHA512

    a97cd1a82a23d5d33a968652680fb7911e1c9d5ee7da3769e1b41426c335b216078cf2c7014ff294eac6cf4a04dfc22410b615bc2aa5988ff8dea49e59427e4c

  • SSDEEP

    1536:GYcD9cCcTvadxUndtnb6T5HDfnjEEv9obmNaLnDninOkz:4DeCciUdtb6hbjEQ98msLT1m

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • tmp
    .pdf
    • https://github.com/leeberg/CashCatRansomwareSimulator/releases

    • https://www.dropbox.com/dropbox

    • http://github.com