General

  • Target

    e2c6d3200999efb14af90cd100e58cb64e081095510fd13b738eceb8a80424cf

  • Size

    3.5MB

  • MD5

    e53a21887aefcb6716cd58f0ef191aa0

  • SHA1

    34efa31964c24520835da3621a95beca13a14cca

  • SHA256

    e2c6d3200999efb14af90cd100e58cb64e081095510fd13b738eceb8a80424cf

  • SHA512

    bb8a4cc005dd5b77fba0533904089385d07e1899c0aa68a6d1a0c4da1ebaa651642aa562413c663c882399a5a2e0161993ed83bba66ed0bfacf18c9d97a80283

  • SSDEEP

    98304:dYgzDtJEb1/8oEkjAENPK2tFLDZah2uHDA8j4yd+MFLnXf:WKDnkXRvZmHDAdy0MFLnXf

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • e2c6d3200999efb14af90cd100e58cb64e081095510fd13b738eceb8a80424cf
    .pdf
    • https://thedfirreport.com/2022/04/04/stolen-images-campaign-ends-in-conti-ransomware/

    • https://malpedia.caad.fkie.fraunhofer.de/details/win.icedid

    • https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/

    • https://thedfirreport.com/2021/05/12/conti-ransomware/

    • https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/

    • https://twitter.com/infosecfu/status/1468955220059168785?s=20&t=_fCNcLM-nx1e8EHbyA6z3A

    • https://www.microsoft.com/security/blog/2021/04/09/investigating-a-unique-form-of-email-delivery-for-icedid-malware/

    • https://www.atera.com/remote-monitoring-and-management/

    • https://www.splashtop.com/

    • Show all