General

  • Target

    01- How-ToStart_In-Bug_Bounty-@Gcodex (2).pdf

  • Size

    560KB

  • MD5

    9d827cb9ff2e07e218c49f60fbccf473

  • SHA1

    d145d18c9a291e0b596685ade16aff80ca600fd4

  • SHA256

    54ed92731031c8415375e4b9530dc7ee72795ad90502596eac689de0ee940f89

  • SHA512

    02f76213cf7d3c7d0b33beca01d0216117058906fc48d9ab1bb98c2380f886e76c0260eaa0f0b5f5d841629f5a46c06e057ce4e452d4fb847320ec8ce1c6a61e

  • SSDEEP

    12288:JyV7k2kOsfxbc0EtExR6DZbXSpNLOFnDRj6C7dQFyYO/Hv:kV7klOsFc0EOwdiphKDR6ChQFncHv

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 01- How-ToStart_In-Bug_Bounty-@Gcodex (2).pdf
    .pdf
    • https://www.comptia.org/training/by-certification/a

    • https://www.youtube.com/watch?v=tIfRDPekybU

    • https://www.tutorialspoint.com/computer_fundamentals/index.htm

    • https://onlinecourses.swayam2.ac.in/cec19_cs06/preview

    • https://www.udemy.com/course/complete-computer-basics-course

    • https://www.coursera.org/courses?query=computer%20fundamentals

    • https://www.youtube.com/watch?v=0AcpUwnc12E&list=PLkW9FMxqUvyZaSQNQslneeODER3bJCb2K

    • https://www.youtube.com/watch?v=qiQR5rTSshw

    • https://www.udacity.com/course/computer-networking--ud436

    • Show all