General

  • Target

    Rotoplas_Contract Agreement#0772-.pdf

  • Size

    33KB

  • MD5

    2e77fcca168446793fc5d8e5573a9810

  • SHA1

    7114823615d196fe36629f542c05dd099fb60bb7

  • SHA256

    ef7ee12c98f4e30d714845b8461bd59b13a07297926dae3342d2c4ee4f5f149a

  • SHA512

    b7c53b3c8d0015f374854f45162d5e31301ec751ab58960403fd19f01e6104e6020987fb92211741b9f9e4bb65920e79f148bc0568b9348c40fb8341f5bc9544

  • SSDEEP

    768:6sqFQVn1aUZY+tTY7zj+KjnMsxQjI+7a6PCeuQ5:kgwU/T67nEIgVu6

Score
4/10

Malware Config

Signatures

  • PDF has QR code that contains a HTTP URL

    PDFs with URL QR codes are often used for phishing

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Rotoplas_Contract Agreement#0772-.pdf
    .pdf
    • https://bf99e6b1.b2a86462b93e78faab471e2e.workers.dev?qrc=jpena@rotoplas.com