General

  • Target

    sample3.eml

  • Size

    82KB

  • MD5

    19454588a47a88ac4850d96cbf654f2b

  • SHA1

    a9fab550376cd082533a130d6557d69a4ca9d36c

  • SHA256

    703b48d57965418e66c57e293b6b0aec30ea9697f0bbf1d6b253f58949d54d62

  • SHA512

    569f9a8bbb5278763b8266f796395651c0a119b2bcb2c648a180c835285b23900eb369645e5448e1cef76e72f9488976a9d6e21c36599a98159703006b9e24d7

  • SSDEEP

    1536:OTpIqDGDQPTpzvDfPdtDGDGDGDGDGDGDGDGDGDGDbOS/yusuYRIFz5K7wcjWyh1i:GL/yT6FAcivLhmxv

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in qr code identified

    Detects presence of HTTP links in QR codes.

Files

  • sample3.eml
    .eml
  • #Deposit20403282&%.jpg
    .jpg
    • https://www.bing.com/ck/a?!&&p=e68250146783912dJmltdHM9MTY5Mzc4NTYwMCZpZ3VpZD0yNDFmZjRjYi05ZjNkLTYxNTAtMWYxNS1lNzQ5OWVlMDYwMTgmaW5zaWQ9NTExNw&ptn=3&hsh=3&fclid=241ff4cb-9f3d-6150-1f15-e7499ee06018&psq=site%3areferal.biz&u=a1aHR0cHM6Ly93d3cucmVmZXJhbC5iaXovP3Jvb209MA#[email protected]

  • email-html-1.txt
    .html