General

  • Target

    Introduction to Threat Hunting.pdf

  • Size

    3.2MB

  • MD5

    b9359cab24c1a909f617503c74e00a9a

  • SHA1

    5189b537e71f701a9033abe352d61cf5cdfcc6ee

  • SHA256

    612f65b084a3e340a70935f9726ed1d908ce5a1c214e7490a27e11149921f88d

  • SHA512

    ff247a05d25e7f81b0f19037485adfaae00c10ac684b5360526de8d2712d32c75e3b0ffca3026948c12979c6e4f13d416be965cb14a1d61e8e9053cab83751b5

  • SSDEEP

    98304:GjaYJFfffffffAILzLoAMZ5/rDH+VXfWu:bYJFfffffffXUTj/rDeV/

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Introduction to Threat Hunting.pdf
    .pdf
    • https://apps.splunk.com/app/4617/

    • http://www.cnn.com/2014/04/04/tech/gaming-gadgets/5-year-old-xbox-hack/

    • http://arstechnica.com/security/2012/10/google-chrome-exploit-fetches-pinkie-pie-60000-hacking-prize/

    • http://www.zdnet.com/article/teenager-hacks-google-chrome-with-three-0day-vulnerabilities/

    • https://github.com/EC-DIGIT-CSIRC/openai-cti-summarizer

    • http://blog.sqrrl.com/the-cyber-hunting-maturity-model

    • https://www.rsaconference.com/writable/presentations/file_upload/anf-w04_hunting-the-undefined-threat-advanced-analytics-_-visualization.pdf

    • https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-soska.pdf

    • http://www.arguslab.org/documents/spsi_csirts_preprint.pdf

    • Show all