Behavioral task
behavioral1
Sample
d7a34b9391c210655c1ee3860d82ae217abfd53a2e789b3500c566569aa131bf.pdf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d7a34b9391c210655c1ee3860d82ae217abfd53a2e789b3500c566569aa131bf.pdf
Resource
win10v2004-20220812-en
General
-
Target
d7a34b9391c210655c1ee3860d82ae217abfd53a2e789b3500c566569aa131bf
-
Size
437KB
-
MD5
af6a22c74948dff79aec28ebe6c15d1b
-
SHA1
46b52764f7d43bf07f856f2da39e3231a486fe86
-
SHA256
d7a34b9391c210655c1ee3860d82ae217abfd53a2e789b3500c566569aa131bf
-
SHA512
9c2ab16cca57a62de68bd3484e536cde4b010f895abc1030581d768b5516439eb8388438e3ffa04e459a0632d014546fbd0e6ba4250d95604505dca0fc70ff6d
-
SSDEEP
6144:An7/JEC8XKMxffE01EvhU1wdVuhOkZs0UMR633QOGSmZ6G48guTzYwubUm:87/JEC8XKMWhU1wdVwR6QOMm8gqUwJm
Malware Config
Signatures
Files
-
d7a34b9391c210655c1ee3860d82ae217abfd53a2e789b3500c566569aa131bf.pdf
-
http://www.unixtools.com/security.html
-
http://www.bastille-linux.org
-
http://www.dwheeler.com/secure-programs
-
http://www.linuxdoc.org
-
http://www.datametrics.com/tech/unix/uxhistry/brf-hist.htm
-
http://perso.wanadoo.fr/levenez/unix
-
http://www.unix-vs-nt.org
-
http://www.opensource.org/osd.html
-
http://www.fsf.org
-
http://www.opensource.org
-
http://www.securityfocus.com/commentary/19
-
http://dev-opensourceit.earthweb.com/news/000526_security.html
-
http://www.linuxworld.com/linuxworld/lw-1998-11/lw-11-ramparts.html
-
http://www-106.ibm.com/developerworks/linux/library/l-oss.html?open&I=252,t=gr,p=SeclmpOS
-
http://www.cert.org/advisories/CA-2001-01.html
-
http://www.linuxsecurity.com/feature_stories/feature_story-6.html
-
http://olympus.cs.ucdavis.edu/~bishop/secprog.html
-
http://www.oreilly.com/catalog/puis
-
http://www.sunworld.com/swol-04-1998/swol-04-security.html
-
http://www.sunworld.com/sunworldonline/swol-08-1998/swol-08-security.html
-
http://www.pobox.com/~kragen/security-holes.html
-
http://www.homeport.org/~adam/review.html
-
http://www.ncsa.uiuc.edu/General/Grid/ACES/security/programming
-
http://www.whitefang.com/sup/
-
http://lsap.org/faq.txt
-
http://www.clark.net/pub/mjr/pubs/pdf/
-
http://www.homeport.org/~adam/setuid.7.html
-
http://www.research.att.com/~smb/talks
-
http://www.freebsd.org/security/security.html
-
http://developer.gnome.org/doc/guides/programming-guidelines/book1.html
-
http://www.fish.com/security/murphy.html
-
http://www.fish.com/security/maldata.html
-
http://www.csclub.uwaterloo.ca/u/mlvanbie/cgisec
-
http://language.perl.com/CPAN/doc/FAQs/cgi/perl-cgi-faq.html
-
http://webreview.com/wr/pub/97/08/08/bookshelf
-
http://www.eekim.com/pubs/cgibook
-
http://www.go2net.com/people/paulp/cgi-security/safe-cgi.txt
-
http://www.w3.org/Security/Faq/www-security-faq.html
-
http://members.home.net/razvan.peteanu
-
http://advosys.ca/tips/web-security.html
-
http://www.perl.com/pub/doc/manual/html/pod/perlsec.html
-
http://www.cs.princeton.edu/sip
-
http://java.sun.com/security/seccodeguide.html
-
http://www.shmoo.com/securecode
-
http://SecurityFocus.com/forums/bugtraq/faq.html
-
http://www.cert.org
-
http://ciac.llnl.gov/ciac
-
http://www.cve.mitre.org
-
http://csrc.nist.gov/icat
-
http://www.securityfocus.com
-
http://www.ibm.com/developer/security
-
http://www.linuxsecurity.com
-
http://www.linuxhelp.org/lsap.shtml
-
http://www.lkap.org
-
http://www.radium.ncsc.mil/tpep/library/fers/index.html
-
http://pweb.netcom.com/~spoon/lcap/
-
http://www.pathname.com/fhs
-
http://www.linuxbase.org
-
http://www.dwheeler.com/program-library
-
http://docs.freebsd.org/44doc/papers/jail/jail.html
-
http://www.nsa.gov/selinux
-
http://medusa.fornax.sk
-
http://www.lids.org
-
http://www.rsbac.de
-
http://subterfugue.org
-
http://www.cs.berkeley.edu/~daw/janus
-
http://user-mode-linux.sourceforge.net
-
http://www.cl.cam.ac.uk/~mgk25/unicode.html
-
http://destroy.net/machines/security/
-
http://www.mibsoftware.com/libmib/astring
-
http://www.bell-labs.com/org/11356/libsafe.html
-
http://www.openwall.com/linux/
-
http://lwn.net/980806/a/linus-noexec.html
-
http://linux.kernel.org/pub/linux/libs/security/linux-privs
-
http://www.suse.de/~marc
-
http://www.suid.edu/source/breakchroot.c
-
http://lwn.net/2000/1221/a/sec-tmp.php3
-
http://www.infoseclabs.com/mschff/mschff.htm
-
http://lwn.net/2001/0322/a/SAK.php3
-
http://www.cert.org/advisories/CA-2000-02.html
-
http://www.w3.org
-
http://www.privacyfoundation.org
-
http://www.privacyfoundation.org/advisories/advWordBugs.html
-
http://www-syntim.inria.fr/fractales/Staff/Raynal/LinuxMag/SecProg/Art4/index.html
-
http://www.cert.org/tech_tips/malicious_code_mitigation.html
-
http://www.xray.mpe.mpg.de/mailing-lists/perl5-porters/2000-03/msg02596.html
-
http://www.dwheeler.com/javasec
-
http://www.sco.com/Technology/tcl/Tcl.html
-
http://www.cbl.ncsu.edu/software/WebWiseTclTk
-
http://www.tclfaq.wservice.com/tcl-faq
-
http://sdg.lcs.mit.edu/~jchapin/6853-FT97/Papers/stallman-tcl.html
-
http://consult.cern.ch/writeup/security/security_3.html
-
http://www.counterpane.com/yarrow.html
-
http://www.ietf.org/rfc/rfc1750.txt
-
http://www.landfield.com/faqs/cryptography-faq
-
http://marc.mutz.com/Encryption-HOWTO/
-
http://www.kernel.org/pub/linux/libs/pam/index.html
-
http://www.nessus.org
-
http://www.rstcorp.com/its4
-
http://lclint.cs.virginia.edu
-
http://my.ispchannel.com/~mheffner/bfbtester
-
http://fuzz.sourceforge.net
-
http://msdn.microsoft.com/library/techart/winsecurity.htm
-
http://www-tac.cisco.com/Support_Library/field_alerts/fn13070.html
-
http://www.whitefang.com/sup
-
http://www.phrack.com/search.phtml?view&article=p49-14
-
http://www.2600.net/phrack/p49-14.html
-
http://www.research.att.com/~smb/papers/ipext.pdf
-
http://csrc.nist.gov/cc/ccv20/ccv2list.htm
-
http://www.cert.org/advisories/CA-97.25.CGI_metachar.html
-
http://schafercorp-ballston.com/discex
-
http://www.sans.org/newlook/events/sans2000.htm
-
http://immunix.org/documentation.html
-
http://www.cs.princeton.edu/sip/pub/spoofing.pdf
-
http://www.linuxdoc.org/HOWTO/Security-HOWTO.html
-
http://www.blackhat.com/html/win-usa-01/win-usa-01-speakers.html
-
http://foldoc.doc.ic.ac.uk/foldoc/index.html
-
http://www.gnu.ai.mit.edu/gnu/gnu-history.html
-
http://www.netppl.fi/~pp/glibc21/libc_toc.html
-
http://www.ecst.csuchico.edu/~beej/guide/net
-
http://www.counterpane.com/pseudorandom_number.html
-
http://www.python.org/doc/howto/rexec/rexec.html
-
http://www.oreilly.com/catalog/opensources/book/kirkmck.html
-
http://www.securingjava.com
-
http://www-4.ibm.com/software/developer/library/overflows/index.html
-
http://www-106.ibm.com/developerworks/library/randomsoft/index.html?dwzone=security
-
http://www.usenix.org/events/usenix99/millert.html
-
http://www.usenix.org/events/usenix99/full_papers/millert/PACKING_LIST
-
http://www.l0pht.com/advisories/bufero.html
-
http://www.iatf.net
-
http://www.opengroup.org/online-pubs?DOC=007908799
-
http://www.tuxedo.org/~esr/writings/cathedral-bazaar
-
http://www.tuxedo.org/~esr/writings/homesteading/homesteading.html
-
http://www.ietf.org/rfc/rfc0822.txt
-
http://www.phrack.com/search.phtml?view&article=p55-7
-
http://www.insecure.org/news/P55-07.txt
-
http://www.linuxsecurity.com/feature_stories/interview-aes-3.html
-
http://www.xml.com/pub/2000/02/xtech/megginson.html
-
http://www.mediacity.com/~norm/CapTheory/ProtInf
-
http://www.counterpane.com/pptp.html
-
http://www.counterpane.com/crypto-gram-9909.html
-
http://www.securityportal.com/lasg
-
http://news.cnet.com/news/0-1003-200-1549312.html
-
http://www.dnaco.net/~kragen/security-holes.html
-
http://www.sse-cmm.org
-
http://www.linuxsecurity.com/docs/colsfaq.html
-
http://csrc.nist.gov/publications/nistpubs/index.html
-
http://www.oreilly.com/catalog/opensources/book/linus.html
-
http://www.nic.com/~dave/SecurityAdminGuide/index.html
-
http://st-www.cs.uiuc.edu/~hanmer/PLoP-97/Proceedings/yoder.pdf
-
http://www.leb.net/hzo/ioscount
-
http://www.gnu.org/fsf/fsf.html
-
http://www.gnu.org/copyleft
-
http://www.gnu.org/copyleft/gpl.html
-
http://www.dwheeler.com
-
http://www.unixtools.com/security.html.
-
http://www.dwheeler.com/secure-programs.
-
http://perso.wanadoo.fr/levenez/unix.
-
http://ftp.freebsd.org/pub/FreeBSD/FreeBSD-current/src/share/misc/bsd-family-tree.Those
-
http://www.linuxsecurity.com/feature_stories/feature_story-6.html.A
-
http://olympus.cs.ucdavis.edu/~bishop/secprog.html.AUSCERT
-
http://java.sun.com/security/seccodeguide.html.Yoder
-
http://www.shmoo.com/securecode.There
-
http://csrc.nist.gov/icat.This
-
http://Securityfocus.com
-
http://www.ibm.com/developer/security.
-
http://LinuxSecurity.com
-
http://pweb.netcom.com/~spoon/lcap/.More
-
http://linux.kernel.org/pub/linux/libs/security/linux-privs.3.1.3.
-
http://ld-linux.so
-
http://cr.pid
-
http://U.S.systems
-
http://www.cl.cam.ac.uk/~mgk25/unicode.html.4.8.4.
-
http://destroy.net/machines/security/.Most
-
http://ftp.openbsd.org/pub/OpenBSD/src/lib/libc/string/strlcpy.3.First,
-
http://www.mibsoftware.com/libmib/astring.
-
http://www.bell-labs.com/org/11356/libsafe.html.
-
http://lwn.net/980806/a/linus-noexec.html.In
-
http://linux.kernel.org/pub/linux/libs/security/linux-privs.One
-
http://www.suse.de/~marc.FreeBSD
-
http://sendmail.net/?feed=000607linuxbug.
-
http://www.suid.edu/source/breakchroot.c.
-
http://NAME.pid
-
http://www.infoseclabs.com/mschff/mschff.htm.
-
http://www.ibm.com/[email protected]''
-
http://mysite.com
-
http://example.com/comment.cgi?mycomment=
-
http://pythonrc.py
-
http://java.sun.com/security/seccodeguide.html.
-
http://www.dwheeler.com/javasec.Obviously,
-
http://java.io
-
http://www.cbl.ncsu.edu/software/WebWiseTclTk.
-
http://www.tclfaq.wservice.com/tcl-faq.
-
http://www.counterpane.com/yarrow.html.
-
http://www.landfield.com/faqs/cryptography-faq.
-
http://marc.mutz.com/Encryption-HOWTO/.
-
http://www.kernel.org/pub/linux/libs/pam/index.html.10.6.
-
http://www.sourceforge.net
-
http://www.rstcorp.com/its4.
-
http://my.ispchannel.com/~mheffner/bfbtester.
-
http://msdn.microsoft.com/library/techart/winsecurity.htm.10.8.
-
http://advosys.ca/tips/web-security.html[Al-Herbish
-
http://www.whitefang.com/sup.[Aleph1
-
http://www.2600.net/phrack/p49-14.html.[Anonymous
-
http://ftp.auscert.org.au/pub/auscert/papers/secure_programming_checklist[Bach
-
http://www.research.att.com/~smb/papers/ipext.pdf[Bellovin
-
http://www.research.att.com/~smb/talks[Bishop
-
http://olympus.cs.ucdavis.edu/~bishop/secprog.html[Bishop
-
http://olympus.cs.ucdavis.edu/~bishop/secprog.html[CC
-
http://csrc.nist.gov/cc/ccv20/ccv2list.htm[CERT
-
http://www.cert.org/advisories/CA-97.25.CGI_metachar.html.[CMU
-
http://ftp.cert.org/pub/tech_tips/cgi_metacharacters.[Cowan
-
http://www.sans.org/newlook/events/sans2000.htm.
-
http://immunix.org/documentation.html.[Dobbertin
-
http://www.cs.princeton.edu/sip/pub/spoofing.pdf[Fenzi
-
http://www.linuxdoc.org/HOWTO/Security-HOWTO.html[FHS
-
http://www.pathname.com/fhs.[Filipski
-
http://www.blackhat.com/html/win-usa-01/win-usa-01-speakers.html.[FOLDOC]
-
http://foldoc.doc.ic.ac.uk/foldoc/index.html.[FreeBSD
-
http://www.freebsd.org/security/security.html[FSF
-
http://www.gnu.ai.mit.edu/gnu/gnu-history.html[FSF
-
http://www.netppl.fi/~pp/glibc21/libc_toc.html[Galvin
-
http://www.sunworld.com/swol-04-1998/swol-04-security.html.Secure
-
http://www.sunworld.com/sunworldonline/swol-08-1998/swol-08-security.html[Garfinkel
-
http://www.oreilly.com/catalog/puis[Garfinkle
-
http://webreview.com/wr/pub/97/08/08/bookshelf[Graham
-
http://lsap.org/faq.txt[Gong
-
http://language.perl.com/CPAN/doc/FAQs/cgi/perl-cgi-faq.html[Hall
-
http://www.ecst.csuchico.edu/~beej/guide/net[Jones
-
http://www.counterpane.com/pseudorandom_number.html.[Kernighan
-
http://SAMS.net
-
http://www.eekim.com/pubs/cgibookKuchling
-
http://www.python.org/doc/howto/rexec/rexec.html[McClure
-
http://www.oreilly.com/catalog/opensources/book/kirkmck.html.[McGraw
-
http://www-4.ibm.com/software/developer/library/overflows/index.html.[McGraw
-
http://www-106.ibm.com/developerworks/library/randomsoft/index.html?dwzone=security.[Miller
-
http://grilled.cs.wisc.edu/technical_papers/fuzz-revisited.pdf.[Miller
-
http://www.usenix.org/events/usenix99/full_papers/millert/PACKING_LIST[Mudge
-
http://www.l0pht.com/advisories/bufero.html.[NCSA]
-
http://www.ncsa.uiuc.edu/General/Grid/ACES/security/programming.Neumann,
-
http://www.opengroup.org/online-pubs?DOC=007908799.[OSI
-
http://www.opensource.org/osd.html.[Opplinger
-
http://members.home.net/razvan.peteanu[Pfleeger
-
http://www.go2net.com/people/paulp/cgi-security/safe-cgi.txt[Quintero
-
http://developer.gnome.org/doc/guides/programming-guidelines/book1.html[Raymond
-
http://www.tuxedo.org/~esr/writings/cathedral-bazaarSecure
-
http://www.tuxedo.org/~esr/writings/homesteading/homesteading.html[Ranum
-
http://www.clark.net/pub/mjr/pubs/pdf/.[RFC
-
http://www.ietf.org/rfc/rfc0822.txt.[rfp
-
http://www.insecure.org/news/P55-07.txt.[Rijmen
-
http://www.linuxsecurity.com/feature_stories/interview-aes-3.html.[Rochkind
-
http://www.xml.com/pub/2000/02/xtech/megginson.html.[Saltzer
-
http://www.mediacity.com/~norm/CapTheory/ProtInf.
-
http://www.counterpane.com/pptp.html.[Schneier
-
http://www.counterpane.com/crypto-gram-9909.html[Seifried
-
http://www.securityportal.com/lasg.[Shankland
-
http://news.cnet.com/news/0-1003-200-1549312.html[Shostack
-
http://www.homeport.org/~adam/review.html.Secure
-
http://www.fish.com/security/maldata.html[Sitaker
-
http://www.dnaco.net/~kragen/security-holes.html[SSE-CMM
-
http://www.w3.org/Security/Faq/www-security-faq.html[Swan
-
http://comp.os.linux.security
-
http://www.linuxsecurity.com/docs/colsfaq.html.[Swanson
-
http://csrc.nist.gov/publications/nistpubs/index.html.[Thompson
-
http://www.oreilly.com/catalog/opensources/book/linus.html[Unknown]
-
http://www.homeport.org/~adam/setuid.7.html.[Van
-
http://www.csclub.uwaterloo.ca/u/mlvanbie/cgisec.[van
-
http://www.fish.com/security/murphy.html[Watters
-
http://www.nic.com/~dave/SecurityAdminGuide/index.htmlSecure
-
http://st-www.cs.uiuc.edu/~hanmer/PLoP-97/Proceedings/yoder.pdf[Zoebelein
-
http://www.leb.net/hzo/ioscount.Appendix
-
http://cse.unsw.edu.au
-
http://students.zcu.cz
-
http://silver.jhuapl.edu
-
http://compsoc.man.ac.uk
-
http://numb.org
-
http://astro.gla.ac.uk
-
http://peakpeak.com
-
http://humbug.org.au
-
http://snark.thyrsus.com
-
http://alpha.zk3.dec.com
-
http://dwheeler.com
-
http://www.gnu.org/copyleft/.
- Show all
-