General

  • Target

    b6892fcec850a1dc9d20418c4e2d70f2dac2792f.zip

  • Size

    145KB

  • MD5

    b5748c56bf8e5cf7199d8487c2d1cabe

  • SHA1

    20376a52454e9250a3c806d7b8ccf375b7d828c6

  • SHA256

    4e877971c81ae6560d02e7158ac2215e30ce25ac089ea1f2fb6460a794cabbf3

  • SHA512

    b409aa3f6ccecfc40731e8c4a9e6f60d07b1289c98613389d102415515502f55d1cc75601998e3ef8b5173ddec5808de038af2e200a28b81b577a3bf286162c1

  • SSDEEP

    3072:4D1vLhPu8pn5P8VXkILNN4hXGNpEmaTslXjlInSHub30uYy/4rG3auirPYud:8ZVPuwIUSD44pEmnXja3B/4mirN

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • b6892fcec850a1dc9d20418c4e2d70f2dac2792f.zip
    .zip

    Password: infected

  • b6892fcec850a1dc9d20418c4e2d70f2dac2792f
    .pdf

    Password: infected

    • https://bitbucket.org/invoicepays/file/downloads/doc.7z