Behavioral task
behavioral1
Sample
288651f2ddbc166429ff2e92a308f8a362c3bb7155c551f5c8162180151d5f74.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
288651f2ddbc166429ff2e92a308f8a362c3bb7155c551f5c8162180151d5f74.pdf
Resource
win10v2004-20231215-en
General
-
Target
288651f2ddbc166429ff2e92a308f8a362c3bb7155c551f5c8162180151d5f74
-
Size
364KB
-
MD5
f6f794859b17271f312a69627ac0553a
-
SHA1
f6b859acce128436d2b1a7d16c924f01b6dfc6fe
-
SHA256
288651f2ddbc166429ff2e92a308f8a362c3bb7155c551f5c8162180151d5f74
-
SHA512
c963b21af9c7812d1b762e7dd6ec0e9a7a27740a01ab51568fb0fd9878f0da418751bda2096a6e48983c074f6f67bb343f43b34dbca03cafbf704b2655601d4c
-
SSDEEP
6144:4esNUpwZhPPIEMKhrWAk29SfQm0Cp5ckpGsvzjsTeIy+rnrBiS:sa6DPPIEdBWAkA80Cp5ckptvzjsTTrnz
Malware Config
Signatures
Files
-
288651f2ddbc166429ff2e92a308f8a362c3bb7155c551f5c8162180151d5f74.pdf
-
https://www.cisa.gov/tlp
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
-
https://www.cisa.gov/resources-tools/resources/secure-by-design
-
https://cwe.mitre.org/
-
http://cisa.dhs.gov
-
http://cisa.gov
-
http://CISA.gov
-