General

  • Target

    Incident Response Techniques for Ransomware Attacks Understand modern ransomware attacks ( etc.) (z-lib.org).pdf

  • Size

    12.1MB

  • MD5

    c51ade4cdac56d0c98f392e29c1a226f

  • SHA1

    d6265b5ec7130c0473f73b0ca14a5d21939d4420

  • SHA256

    a6c34199052ba042237905ae228de55fb6fc445a9c1a951fcdec0e4c98c44d03

  • SHA512

    da16868226c38304cff12c808a157fbc5bd5e816aeae01087faaa1d164487c111988d2373e6921e436eb19b3d9040c3aaea714499e57e4d629df23c7c3a68910

  • SSDEEP

    393216:vfuGGSZVob88r888888888888X88Z8LzGSgKdp+XJC0klB:vmGtZs88r888888888888X88Z8LSAj+U

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Incident Response Techniques for Ransomware Attacks Understand modern ransomware attacks ( etc.) (z-lib.org).pdf
    .pdf
    • https://www.unifiedkillchain.com/assets/The-Unified-Kill-Chain.pdf

    • https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf

    • https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf

    • https://github.com/keydet89/RegRipper3.0

    • https://f001.backblazeb2.com/file/EricZimmermanTools/RegistryExplorer.zip

    • https://www.nirsoft.net/utils/mozilla_cache_viewer.html

    • https://www.nirsoft.net/utils/chrome_cache_view.html

    • https://www.nirsoft.net/utils/browsing_history_view.html

    • https://sqlitebrowser.org/dl/

    • Show all