General

  • Target

    f_005cec.zip

  • Size

    13.2MB

  • MD5

    5cbb90d5fa674df59c737cd11928669f

  • SHA1

    19d4a349282125e8597206ed04f4da1e53f61446

  • SHA256

    441abb8cb878b67447fba5bc4e79c4fe85be2634ed38396770eafe4e513f4e52

  • SHA512

    bc4eb547964f2a440203666f397c33a99c457e0b148c98b10c8a95102edda95061cc2fb348678014e501e6ef2be223eae8045dd96cd24be4f90236d1769e5f55

  • SSDEEP

    393216:UdRg0I+d+hLzQcq3J2NKX7ALbYL6fbA9RK3WL:5hL2oKUvYL6zADL

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • f_005cec.zip
    .zip

    Password: infected

  • f_005cec
    .pdf
    • http://192.168.2.xxx

    • http://1952.912.3444orvisitusatwww.digi.com/support.FeedbackToprovidefeedbackonthisdocument,emailyourcommentstotechcomm@digi.comIncludethedocumenttitleandpartnumber

    • http://AddupstreamNTPserversthatthedevicewillusetosynchronizeitstime.Thedefaultsettingistime.devicecloud.com

    • http://CommandlineinterfaceUsethescpcommandAnywhereUSBPlusUserGuide932CommandDescriptiondeviceandaremotehost.SeeUsethescpcommandforinformationaboutusingthescpcommand.show

    • http://DigiRemoteManagerpassword.group

    • http://Donotasktooverwritethedestinationfileifitexists.ping

    • http://Enteranameforthegroup.Replacestringwiththegroupname.Youmusthavedoublequotesaroundthename.group

    • http://Listfilesanddirectoriesunderthispath.show

    • http://Messagetosend.name

    • Show all