General

  • Target

    1ec58d2070fb475758cdb0ce888ec6133700b989aa3ea2d285e04249e6910789

  • Size

    2.3MB

  • MD5

    0769beb0603a6b295575cc81f300d66a

  • SHA1

    63da39d2756708748b9dbff219764d1c9f1544b6

  • SHA256

    1ec58d2070fb475758cdb0ce888ec6133700b989aa3ea2d285e04249e6910789

  • SHA512

    3581ce43a044cdea0653866672f19a542e3081d9902f2604f8793f8457f3c3646f37927fddcc4afa8ebb8df832c62658e09bff5ab5fd4f04e63c48d45f76e128

  • SSDEEP

    49152:cIpox/0K3UdneeR+fPIRZc5cgR/iby7LV4VpZikB:cIpox/X3U4C+fPIffgliby7RmZ7B

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 1ec58d2070fb475758cdb0ce888ec6133700b989aa3ea2d285e04249e6910789
    .pdf
    • https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/whoami

    • https://attack.mitre.org/versions/v14/techniques/T1057

    • https://attack.mitre.org/versions/v14/techniques/T1007

    • https://attack.mitre.org/versions/v14/techniques/T1518

    • https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-process?view=powershell-7.3

    • https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/tasklist

    • https://attack.mitre.org/versions/v14/techniques/T1049/

    • https://learn.microsoft.com/en-us/powershell/module/nettcpip/get-nettcpconnection?view=windowsserver2022-ps

    • https://man7.org/linux/man-pages/man8/netstat.8.html

    • Show all