General

  • Target

    The_Hardware_Hacking_Handbook_Breaking_Embedded_Security_with_Hardware_Attacks.pdf

  • Size

    259KB

  • MD5

    7d19dcac738bcd1a7adbcf545ba940a9

  • SHA1

    9fe1ecb5bad395adf2f6798cd775e83b4f9cf9ee

  • SHA256

    59c87c77b8a001ea1a86b6e7a604cd8e07a37190dd1055861b36abd417287c37

  • SHA512

    76e5b21ac93e3b8160886af1d1b12201128d6665abb2d9bcf97d6366d64845aabeb0328d6c5ac6ce5336347fbfc6a48752e9aa072f1002acf6a89bc76a33b6b4

  • SSDEEP

    6144:4zp71erUm+nrFxQirgkIEgwBg63rvqgftovxrOCbV/0NPDmLZMv:4z1YrUm+BalVwv9KxrHdxZMv

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • The_Hardware_Hacking_Handbook_Breaking_Embedded_Security_with_Hardware_Attacks.pdf
    .pdf
    • https://my.usefulreader.com/?isbn=1593278748