Behavioral task
behavioral1
Sample
Cert-In Guidelines on Information Security Practices.pdf
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Cert-In Guidelines on Information Security Practices.pdf
Resource
win10v2004-20230621-en
General
-
Target
Cert-In Guidelines on Information Security Practices.pdf
-
Size
1.6MB
-
MD5
0ef387a9d12d2f108d6022c1e183c0e7
-
SHA1
88f71422deecba478f0a45533fa346d7716f06db
-
SHA256
5085a019c0569df9f240c13fd35a446f88b9b4b814c3178dca361e46a45b413b
-
SHA512
c6c72fbf4b50a9d66152ef7f77fecc458020d0ab512e156d9d964ce50659f4d6c462ad4b1d51e6463e21581d19af194aabfcd64f27f4695f96b56f3a47b43469
-
SSDEEP
24576:eYEuJA5aigXf57tw8ikopTa/2J66oIa/pJSSG/xISEdRGS:nPABgv5VtpuJ6hzBJjWIP7GS
Malware Config
Signatures
Files
-
Cert-In Guidelines on Information Security Practices.pdf.pdf
-
https://सर्ट-इन.भारत/
-
https://www.cert-in.org.in/
-
https://www.सीएसके.सरकार.भारत/
-
https://www.csk.gov.in/
-
https://www.cert-in.org.in/PDF/guideline_auditee.pdf
-
https://www.cert-in.org.in/PDF/Auditor_Guidelines.pdf
-
https://www.cert-in.org.in/PDF/CyberSecurityAuditbaseline.pdf
-
http://samay1.nic.in
-
http://samay2.nic.in
-
http://time.nplindia.org
-
http://nic.in
-
https://www.meity.gov.in/cyber-security-division
-
https://www.cert-in.org.in
-
https://nic-cert.nic.in
-
https://www.csk.gov.in
-
https://infosecawareness.in
-
http://cybercrime.gov.in
-
https://security.nic.in/docs/Security_Policies_for_GOI/Password%20Management%20Guidelines.pdf
-
https://guidelines.india.gov.in
-
http://en-INsamay2.nic.in
-
http://en-INS.no
-
http://parichay.nic.in
- Show all
-