General

  • Target

    4de624d7d64f86de953b29ec28e32ccfcfd9519805714ea3ee9d0002e6d74ebd

  • Size

    79KB

  • MD5

    112edbc065504101b7ee6ac69e07c4c4

  • SHA1

    aa0cede3ff0c1c45b7cdb9ca8776c2e1b95f3b32

  • SHA256

    4de624d7d64f86de953b29ec28e32ccfcfd9519805714ea3ee9d0002e6d74ebd

  • SHA512

    662757cc844cf0c13354e5e0212f96dbf730937d6f4009539378f019fbe37b9f9a921473ddfaf331916cfb1cf9b6208bdc91edd780a1abadb507c7356ef3218f

  • SSDEEP

    1536:pqu7SxJJ4f9xSY8k8rRQ8Dx5+amopMOOmqJLUz4DITacI/4lckC3p8Zyfj:pqfoSY8k+d5bpiOOLO0AVCV

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 4de624d7d64f86de953b29ec28e32ccfcfd9519805714ea3ee9d0002e6d74ebd
    .pdf
    • https://go.solupay.com/myportal/invoice?ver=2&invoiceId=22920&tranId=INV11014&companyId=8489390&total=$175.00&token=jwt012520004871955eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJjdXN0aWQiOiI5Mzg5IiwiYWNjb3VudGlkIjoiODQ4OTM5MCIsInNvbHVwYXlpZCI6IjUyMDAwNDg3MTk1NSIsImp0aSI6IjExNGJjNjk5LWZlNjEtNGQ5OS1hYTc0LTRkMjJkMjgyOWNmOSIsImNvbm5lY3RvclVybCI6Imh0dHBzOi8vODQ4OTM5MC5yZXN0bGV0cy5hcGkubmV0c3VpdGUuY29tL2FwcC9zaXRlL2hvc3RpbmcvcmVzdGxldC5ubD9zY3JpcHQ9MTExNyZkZXBsb3k9MSZjb21waWQ9ODQ4OTM5MCIsInZlcnNpb24iOiIyLjAwIiwicG9zdGJhY2tVcmwiOiJodHRwczovLzg0ODkzOTAucmVzdGxldHMuYXBpLm5ldHN1aXRlLmNvbS9hcHAvc2l0ZS9ob3N0aW5nL3Jlc3RsZXQubmw_c2NyaXB0PTExMTgmZGVwbG95PTEmY29tcGlkPTg0ODkzOTAiLCJzdWJzaWRpYXJ5IjoiMiIsInNvbHVwYXlfc2V0dGluZ3MiOiIxIn0.GypxUtntY3aqBQYoBjLtnqT4BAcPNyPCTCBP-26oU60