General

  • Target

    The_Agile_Extension[1].pdf

  • Size

    1.3MB

  • MD5

    556b873bcf3114cbabc1c650b2ea227f

  • SHA1

    0f470fb7059676febb0a1eb9389d691a6b32c6f2

  • SHA256

    39c5166180c8ea3f4e70e11ce0f5d7afc4b5fc3ed6e227f7176fac0d67566eba

  • SHA512

    459019f831cf2fe27c4f7ea47dff826e1ecf4750b0c521124588192df6d8c1215e05381ad0c327203cf5f74e3f998f33d80b8255317b63d229e1b154f09b3bee

  • SSDEEP

    24576:rGkp1V5t1/mtPolJomOsRxKcDDOfTHFH5kWetDsCY/pJN/fPEv:n75L0PvNHletDelcv

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • The_Agile_Extension[1].pdf
    .pdf
    • http://iiba.info/AgileFeedback

    • http://www.agilemanifesto.org/

    • http://www.agilemodeling.com/artifacts/userStory.htm

    • http://www.agiledad.com/Documents/BAWhitepaperJune.pdf

    • http://www.extremeprogramming.org/index.html

    • http://blog.piecemealgrowth.net/working-with-user-story-mapping/

    • http://www.modernanalyst.com/Resources/Articles/tabid/115/articleType/ArticleView/articleId/811/The-Agile-Business-Analyst-Eyes-for-Waste.aspx

    • http://ebgconsulting.com/Pubs/Articles/SlicingRequirementsForAgileSuccess_Gottesdiener-Gorman_August2010.pdf

    • http://dannorth.net/introducing-bdd/

    • Show all