Behavioral task
behavioral1
Sample
c38340d42873fdd8c136552eec333e58cd83bd63e01413c83d0e61fe1620a6fcN.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c38340d42873fdd8c136552eec333e58cd83bd63e01413c83d0e61fe1620a6fcN.pdf
Resource
win10v2004-20241007-en
General
-
Target
c38340d42873fdd8c136552eec333e58cd83bd63e01413c83d0e61fe1620a6fcN
-
Size
272KB
-
MD5
d0c34cb5b72a76f1eddf14e503d64f20
-
SHA1
22760b0cbafaa16955f28e73b031e509f817f925
-
SHA256
c38340d42873fdd8c136552eec333e58cd83bd63e01413c83d0e61fe1620a6fc
-
SHA512
e745ba10594c76f98454606c868996b725498303edb5a129eac547a6a4648b7f63ae4997f391be8bbc7bcf378e22a3f0396affa7433cb6e1a9f93eaa23e31c2b
-
SSDEEP
6144:tvF9/Rgw4pJGcZwHVidkDAahFJZviMk68QZFZ9DZg9OH:tvFpRveJGdEafDviyFHg0
Malware Config
Signatures
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule sample pdf_with_link_action -
One or more email addresses in PDF identified
Detects presence of email addresses in PDF files.
Files
-
c38340d42873fdd8c136552eec333e58cd83bd63e01413c83d0e61fe1620a6fcN.pdf
-
http://documents.un.org/
-
https://undocs.org/en/A/75/7/Add.14
-
https://undocs.org/en/A/75/982
-
https://undocs.org/en/A/76/386
-
https://undocs.org/en/A/76/7/Add.20
-
https://undocs.org/en/A/77/135
-
https://undocs.org/en/A/77/495
-
https://undocs.org/en/A/77/519
-
https://undocs.org/en/A/77/541
-
https://undocs.org/en/A/77/541/Corr.1
-
https://undocs.org/en/A/77/605
-
https://undocs.org/en/A/77/7/Add.21
-
https://undocs.org/en/A/77/7/Add.23
-
https://undocs.org/en/A/C.5/77/20
-
https://undocs.org/en/A/RES/76/246
-
https://undocs.org/en/A/RES/76/306
-
https://undocs.org/en/JIU/REP/2021/3
-
mailto:[email protected]
- Show all
-