Behavioral task
behavioral1
Sample
The_Hardware_Hacking_Handbook_Breaking_Embedded_Security_with_Hardware_Attacks.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
The_Hardware_Hacking_Handbook_Breaking_Embedded_Security_with_Hardware_Attacks.pdf
Resource
win10v2004-20220812-en
General
-
Target
The_Hardware_Hacking_Handbook_Breaking_Embedded_Security_with_Hardware_Attacks.pdf
-
Size
259KB
-
MD5
7d19dcac738bcd1a7adbcf545ba940a9
-
SHA1
9fe1ecb5bad395adf2f6798cd775e83b4f9cf9ee
-
SHA256
59c87c77b8a001ea1a86b6e7a604cd8e07a37190dd1055861b36abd417287c37
-
SHA512
76e5b21ac93e3b8160886af1d1b12201128d6665abb2d9bcf97d6366d64845aabeb0328d6c5ac6ce5336347fbfc6a48752e9aa072f1002acf6a89bc76a33b6b4
-
SSDEEP
6144:4zp71erUm+nrFxQirgkIEgwBg63rvqgftovxrOCbV/0NPDmLZMv:4z1YrUm+BalVwv9KxrHdxZMv
Malware Config
Signatures
Files
-
The_Hardware_Hacking_Handbook_Breaking_Embedded_Security_with_Hardware_Attacks.pdf.pdf
-
https://my.usefulreader.com/?isbn=1593278748
-