General

  • Target

    718314e03bb2ab6d1c4445a147fb0ac9ffdd497623cf0586ee648bc8b876389e

  • Size

    36.8MB

  • MD5

    ba326a1c4c3cecffae3ad3535b7bc161

  • SHA1

    f339f7536bd0cadb7fb88a2d3ed31de9e7103273

  • SHA256

    718314e03bb2ab6d1c4445a147fb0ac9ffdd497623cf0586ee648bc8b876389e

  • SHA512

    cb516cda2da547ed2ff3d78691ce84b05db622c17b0012cbc209d501397e86a1f047a55b6187fdcd8e7ca4d7263f85ad2f677395019161fafa445df35caf7f4b

  • SSDEEP

    786432:7JXBpNqrEkRMCydBmwReH0j+YUHPc4G9pnPCEZ:FXBpNqrEkiCydIwRRKnHPo99CEZ

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 718314e03bb2ab6d1c4445a147fb0ac9ffdd497623cf0586ee648bc8b876389e
    .pdf
    • http://ohpe.it/juicy-potato/CLSID/Windows_Server_2016_Standard/

    • https://github.com/ohpe/juicy-potato/releases

    • https://raw.githubusercontent.com/samratashok/nishang/master/Shells/Invoke-PowerShellTcp.ps1

    • https://github.com/SecureAuthCorp/impacket/blob/master/examples/mssqlclient.py

    • http://shell-storm.org/shellcode/files/shellcode-806.php

    • https://github.com/longld/peda#key-features

    • https://github.com/DominicBreuker/pspy

    • https://blog.stealthbits.com/passing-the-hash-with-mimikatz

    • https://github.com/SecureAuthCorp/impacket/blob/master/examples/secretsdump.py

    • Show all