Behavioral task
behavioral1
Sample
b6c70914fcf638f9dae5fb4c1fd45da73cf5f8a70a598c6358f311cc57b71022N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6c70914fcf638f9dae5fb4c1fd45da73cf5f8a70a598c6358f311cc57b71022N.pdf
Resource
win10v2004-20241007-en
General
-
Target
b6c70914fcf638f9dae5fb4c1fd45da73cf5f8a70a598c6358f311cc57b71022N
-
Size
140KB
-
MD5
392f79bec990d06ecb88c7f7cc0ad300
-
SHA1
82a92f9e7d98b5591ddfa5bd14f0bf1ae815152c
-
SHA256
b6c70914fcf638f9dae5fb4c1fd45da73cf5f8a70a598c6358f311cc57b71022
-
SHA512
5a6ac8cccf9c3dd9ad8c60e8a6e16fd73115b8b5aab814a294eb82bf11669e6bad40a5db68061eb926ffbecc7aa3ab5228785ab9e3cc792212ee27043ae6e388
-
SSDEEP
3072:7a0wLK8XW7SyJg1yxvBFjFe1EMiDm+vzqe+h7keA:KKwWVJgsx5Fj2vYqnhZA
Malware Config
Signatures
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule sample pdf_with_link_action -
One or more email addresses in PDF identified
Detects presence of email addresses in PDF files.
Files
-
b6c70914fcf638f9dae5fb4c1fd45da73cf5f8a70a598c6358f311cc57b71022N.pdf
-
http://facebook.com/khrpstl
-
http://gmail.com
-
mailto:[email protected]
-