General

  • Target

    04415aa9-e113-467f-95ee-b56a2a18c1f9_240426_pwrd_Bericht_Phishing-Attacke.pdf

  • Size

    44KB

  • MD5

    7fbc542837eff971d74c83b02eb994bc

  • SHA1

    617a3319f2c15edc4ab80df44348bdcb12ec1ad3

  • SHA256

    2dcc8bbf0f1e1f7c30ed947cfdaf59d106877fec6dd4db093b568ae16c27a954

  • SHA512

    d7a59effd1271bd97cc40c18ae28d7693585438979730c5e2503bef7033499fdf8b45940e9e812239d10151ad2eb30b067fdb57acdc3ca7f96b4b7da03037364

  • SSDEEP

    768:ezEFBr6xyOXBnHH4KRxACalgFmS/8V2DNmftt+zVym33bIQNToFMI:Nr6xyiBnHYTlWmS/8uGMVyesS0FV

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 04415aa9-e113-467f-95ee-b56a2a18c1f9_240426_pwrd_Bericht_Phishing-Attacke.pdf
    .pdf
    • https://www.microsoft.com/en-us/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/

    • https://www.mitiga.io/blog/persistent-mfa-circumvention-in-an-advanced-bec-campaign-on-micro-soft-365-targets

    • https://www.mitiga.io/blog/persistent-mfa-circumvention-in-an-advanced-bec-campaign-on-microsoft-365-targets