General

  • Target

    ISF_Information Security Strategy_Transitioning from alignment to integration_Report.pdf

  • Size

    3.6MB

  • MD5

    ce965206da3caeaba48c507c794cfd66

  • SHA1

    da6f62ab68f1c149e196531a70dab1bdab483609

  • SHA256

    42f2763943869479444b2427858e4f8b803e7e80b8ef769ee35c803709b941e6

  • SHA512

    fcbd3425b2696c5b6753d17bc6a69446447023f904c6296688a95e9f21e50791aeb873131fe2545acb585073c3b639b5dc8ddf9fb3d58f74d65b2c9ed57b65c5

  • SSDEEP

    98304:hGinDdYwI+g4iRgIEC+2qjGEgBQxiVVTMza8:8iDdYMgXRgxggiV5Ka8

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • ISF_Information Security Strategy_Transitioning from alignment to integration_Report.pdf
    .pdf
    • http://lexicon.ft.com/Term?term=stakeholders

    • http://lexicon.ft.com/Term?term=mission-statement

    • https://dspace.lib.cranfield.ac.uk/bitstream/1826/5272/1/Supply_chain_strategy_in_the_board_room.pdf

    • http://www.computerweekly.com/blogs/stuart_king/2007/03/while-ive-spent-a-lot-1.html

    • http://www.ico.org.uk

    • http://www.strategy-business.com

    • http://www.bain.com/publications/articles/the-great-repeatable-business-model-hbr.aspx

    • http://securityforum.org

    • http://www.securityforum.org

    • Show all