General

  • Target

    1641_OptoTutorial_SNAP_PAC_PID.zip

  • Size

    5.7MB

  • MD5

    e4f4dab66c81e7ae17a71788e18092b3

  • SHA1

    fdae17419f5436ab90fb38309121146326da2274

  • SHA256

    90d5859e5bce8d691f2be7913d0035789564264e7f05ff7538600b366bbae9d2

  • SHA512

    e59fadc780ea3be945724564049b8bca2146f4e6e48e52ef8b85261bac2e292b6cb7e9dd8b4456119dfc0e73f5ca50d842cae4f480c20e9229fbec05394e2973

  • SSDEEP

    98304:9ED4g4BVHKGxfRKGeuZW+Fwe7jkWwVGsYKKcBLWZv5bvxGR/BrkLaLX3/XRygI:9S3eNHfUlavueM/3BybYR/KLaz3/Y

Score
6/10

Malware Config

Signatures

  • PDF references a remote document

    Detects the usage of the GoToR instruction to open a remote document in PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 1641_OptoTutorial_SNAP_PAC_PID.zip
    .zip
  • 1641_OptoTutorial_SNAP_PAC_PID/1641_OptoTutorial_SNAP_PAC_PID.pdf
    .pdf
    • http://www.opto22.com/site/downloads/dl_drilldown.aspx?aid=2976

    • http://www.opto22.com/site/pr_details.aspx?cid=4&item=SNAP-PACLC

    • http://Nvio.net

    • http://www.opto22.com/site/downloads/dl_drilldown.aspx?aid=2976.The

  • 1641_OptoTutorial_SNAP_PAC_PID/1641_PIDPoints.otg