General

  • Target

    task2.zip

  • Size

    326KB

  • MD5

    e297cdd9374f157cd6cd0c24f3430138

  • SHA1

    5a578e58c024586cf8ad7a6c7390e689f8a3ebcc

  • SHA256

    5426a3aab56b81956896a53e3496abdbb8f52cf7d20c83e9ced62dfb7805d2f8

  • SHA512

    14c6c4e86c43877f42fee470feff9358b69ab130536e100c80498dc85c3d6d208cc723c64df520ee5e896dc4ace10ec4dc9e0fd89cfaade5b6fac8fae50a0999

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • task2.zip
    .zip

    Password: infected

  • slides.pdf
    .pdf

    Password: infected

    • https://synthesis.to

    • https://ghidra-sre.org

    • https://medium.com/@jeanmichel.amblat/first-steps-with-ghidra-crackme01-319827a2e80b

    • https://blogs.blackberry.com/en/2019/07/an-introduction-to-code-analysis-with-ghidra

    • https://github.com/HackOvert/GhidraSnippets

    • https://ghidra.re/ghidra_docs/api/

    • https://hex-rays.com/ida-free

    • https://www.hackers-arise.com/post/2017/06/22/reverse-engineering-malware-part-3-ida-pro-introduction

    • https://hex-rays.com/blog/new-feature-in-ida-6-2-the-proximity-browser

    • Show all
  • task2.bin
    .elf linux x86