Behavioral task
behavioral1
Sample
8c64d722666d0a5eb8d4f379d8af6f05412eec17c700a843c64f8f5e1f8416ba.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c64d722666d0a5eb8d4f379d8af6f05412eec17c700a843c64f8f5e1f8416ba.pdf
Resource
win10v2004-20231215-en
General
-
Target
8c64d722666d0a5eb8d4f379d8af6f05412eec17c700a843c64f8f5e1f8416ba
-
Size
18.6MB
-
MD5
e745019be865c996c696356ef640a331
-
SHA1
fd45df40fc42b2118599f65689eea2f717c32f98
-
SHA256
8c64d722666d0a5eb8d4f379d8af6f05412eec17c700a843c64f8f5e1f8416ba
-
SHA512
709c06dbce06cadcab3840fd8d956ed5dfa5a37e2623e2e1a189c1564e97943923dfe0a31876539fdf92bf1ec88c9962bdab2f6cf7545451af2ad4d5564182ca
-
SSDEEP
393216:V97yayYJ365Bmg0XMG+DbWJ3fe52e9wAsJSBfWrntBZEiebq4q7aS:/ZX365BbgfatGA5aqin7J
Malware Config
Signatures
Files
-
8c64d722666d0a5eb8d4f379d8af6f05412eec17c700a843c64f8f5e1f8416ba.pdf
-
https://doi.org/10.1007/978-3-031-34969-0
-
https://doi.org/10.1007/978-3-031-34969-0_1
-
https://doi.org/10.1109/ACIT47987.2019.8991114
-
https://doi.org/10.3390/s22062268
-
https://doi.org/10.1016/j.procs.2021.03.105
-
https://doi.org/10.3390/app112210976
-
https://doi.org/10.1109/CAIDA51941.2021.9425059
-
https://doi.org/10.1109/ACCESS.2021.3071450
-
https://doi.org/10.1109/ACCESS.2022.3140341
-
https://doi.org/10.3390/electronics10192444
-
https://doi.org/10.1007/s00521-020-05195-w
-
https://doi.org/10.1007/978-3-030-87954-9_14
-
https://doi.org/10.2174/1872212114999200710143847
-
https://doi.org/10.3390/app11146446
-
https://doi.org/10.1016/j.procs.2021.03.106
-
https://doi.org/10.1016/j.cosrev.2021.100372
-
https://doi.org/10.1109/ICWR51868.2021.9443025
-
https://doi.org/10.1007/978-3-030-76653-5_8
-
https://doi.org/10.3390/info12050185
-
https://doi.org/10.1016/j.eswa.2022.118073
-
https://doi.org/10.1007/s10922-021-09634-4
-
https://doi.org/10.1155/2022/6760920
-
https://doi.org/10.1109/ICCKE50421.2020.9303689
-
https://doi.org/10.1109/ISCISC48546.2019.8985139
-
https://doi.org/10.1016/j.cosrev.2020.100358
-
https://doi.org/10.1109/ICCWAMTIP51612.2020.9317429
-
https://doi.org/10.1007/978-3-031-34969-0_2
-
https://doi.org/10.1109/COMST.2015.2444095
-
http://www.ams.org/mathscinet-getitem?mr=4271705
-
https://doi.org/10.1016/j.ins.2021.05.016
-
https://doi.org/10.1109/NGMAST.2014.57
-
https://doi.org/10.1109/ACCESS.2019.2963724
-
https://doi.org/10.1007/s10207-016-0343-z
-
https://doi.org/10.1016/j.pmcj.2022.101738
-
https://doi.org/10.1016/j.cose.2021.102198
-
https://doi.org/10.1016/j.diin.2018.01.007
-
https://doi.org/10.1109/TIFS.2018.2866319
-
https://doi.org/10.1038/nature14539
-
https://doi.org/10.1016/j.future.2019.03.007
-
https://doi.org/10.1016/j.comnet.2021.108693
-
https://doi.org/10.1186/s13673-018-0125-x
-
https://doi.org/10.1145/3017427
-
https://doi.org/10.23915/distill.00002
-
https://doi.org/10.1109/TST.2016.7399288
-
https://doi.org/10.1007/978-3-031-34969-0_3
-
https://doi.org/10.1109/SMART-TECH49988.2020.00053
-
https://doi.org/10.1371/journal.pone.0270647
-
https://doi.org/10.3390/electronics8080868
-
https://doi.org/10.1109/ACCESS.2020.3029735
-
https://doi.org/10.1109/ACCESS.2019.2934012
-
https://doi.org/10.1007/s12652-020-01957-5
-
https://doi.org/10.1016/j.simpa.2022.100365
-
https://doi.org/10.1007/978-81-322-2268-2_59
-
https://doi.org/10.1007/s10664-021-09996-y
-
https://doi.org/10.1016/j.icte.2020.04.005
-
https://doi.org/10.9734/ajrcos/2021/v7i430189
-
https://doi.org/10.1109/EuroSPW51379.2020.00090
-
https://doi.org/10.3390/app10113978
-
https://doi.org/10.1145/3291061
-
https://doi.org/10.1109/ACCESS.2019.2906934
-
https://doi.org/10.1145/3073559
-
http://www.ams.org/mathscinet-getitem?mr=4391997
-
https://doi.org/10.1109/TSE.2022.3146831
-
https://ibotpeaches.github.io/Apktool/
-
https://apkcombo.com/
-
https://www.virustotal.com/gui/home/upload
-
https://doi.org/10.1007/978-3-031-34969-0_4
-
https://doi.org/10.1016/j.cose.2021.102431
-
https://www.alexa.com/topsites
-
https://doi.org/10.1007/s00521-016-2531-1
-
https://doi.org/10.4018/IJCAC.2020070102
-
https://doi.org/10.1016/j.cose.2013.10.001
-
https://doi.org/10.1016/j.comcom.2005.01.012
-
http://www.ams.org/mathscinet-getitem?mr=1756801
-
https://doi.org/10.1080/10556780008805771
-
http://www.emis.de/MATH-item?0986.90085
-
https://doi.org/10.1109/ISCC.2013.6755058
-
https://www.censys.io/
-
https://doi.org/10.1007/978-3-642-15512-3_24
-
https://doi.org/10.1109/JSAC.2014.2358814
-
https://doi.org/10.1109/INFCOM.2011.5935091
-
https://doi.org/10.1016/j.cose.2021.102380
-
https://doi.org/10.1016/j.comnet.2020.107699
-
https://doi.org/10.1109/ACCESS.2020.2985990
-
https://doi.org/10.1109/ICCD46524.2019.00012
-
https://doi.org/10.1016/j.comnet.2018.04.015
-
https://doi.org/10.1109/SSCI.2018.8628729
-
https://doi.org/10.1109/ACCESS.2019.2927355
-
https://doi.org/10.1016/j.comnet.2012.07.017
-
https://doi.org/10.1016/j.comnet.2017.02.007
-
https://www.shodan.io/
-
https://doi.org/10.1016/j.comnet.2012.07.021
-
https://doi.org/10.3390/fi13080198
-
https://doi.org/10.1016/j.cose.2021.102549
-
https://www.virustotal.com/
-
https://doi.org/10.1007/978-3-030-71017-0_8
-
https://doi.org/10.1109/ACCESS.2018.2880884
-
https://doi.org/10.1007/978-3-031-34969-0_5
-
https://ghidra-sre.org/
-
https://virusshare.com/
-
https://www.microsoft.com/en-us/windows
-
https://git-scm.com/
-
https://www.cygwin.com/
-
https://www.codeblocks.org/
-
https://doi.org/10.1007/978-3-642-13672-6_36
-
https://doi.org/10.1109/CTC.2010.8
-
https://doi.org/10.1016/j.future.2020.02.002
-
https://doi.org/10.1016/j.cose.2020.101760
-
https://doi.org/10.1007/978-3-319-67810-8_3
-
https://doi.org/10.1016/j.neucom.2020.10.054
-
https://doi.org/10.1007/BF00994018
-
http://www.emis.de/MATH-item?0831.68098
-
https://doi.org/10.5220/0006209504550463
-
https://doi.org/10.1007/978-3-319-46681-1_9
-
https://doi.org/10.4236/jis.2014.52006
-
https://doi.org/10.1007/978-3-540-45167-9_11
-
https://doi.org/10.1214/009053607000000677
-
https://doi.org/10.1109/WIW.2016.040
-
http://www.emis.de/MATH-item?0963.05002
-
https://doi.org/10.1080/19361610.2018.1387734
-
https://doi.org/10.1109/ICMLA.2018.00168
-
https://doi.org/10.1137/1.9781611972825.71
-
https://doi.org/10.1155/2015/659101
-
https://doi.org/10.1007/s41109-019-0195-3
-
https://doi.org/10.1109/ICICCT.2018.8473321
-
https://doi.org/10.1109/ACCESS.2019.2896003
-
https://doi.org/10.14569/ijacsa.2019.0100148
-
https://doi.org/10.1007/s11416-016-0267-1
-
https://doi.org/10.1109/ICTAI.2013.53
-
https://doi.org/10.1007/s00500-019-03940-5
-
https://doi.org/10.48550/ARXIV.1802.10135
-
https://arxiv.org/abs/1802.10135
-
https://doi.org/10.1109/AISP.2012.6313810
-
https://doi.org/10.1016/S1361-3723(14)70531-7
-
https://doi.org/10.1007/s11416-015-0252-0
-
https://doi.org/10.1109/CoASE.2015.7294263
-
https://lief.quarkslab.com/
-
https://doi.org/10.1109/MALWARE.2010.5665796
-
https://doi.org/10.1109/CICN.2014.176
-
https://doi.org/10.1109/ICACCI.2014.6968547
-
https://enterprise.verizon.com/resources/reports/dbir
-
http://arxiv.org/abs/0807.0093
-
https://doi.org/10.1109/ICCCBDA.2017.7951933
-
https://doi.org/10.1007/s11042-017-5104-0
-
https://doi.org/10.1016/j.procs.2018.03.072
-
https://doi.org/10.24963/ijcai.2019/576
-
https://doi.org/10.1109/ICOIN.2018.8343255
-
https://doi.org/10.1007/978-3-031-34969-0_6
-
http://www.towardsdatascience.com/
-
http://www.emis.de/MATH-item?1007.68152
-
http://www.ams.org/mathscinet-getitem?mr=3295556
-
http://www.emis.de/MATH-item?1315.68208
-
http://www.emis.de/MATH-item?1110.68124
-
http://www.ams.org/mathscinet-getitem?mr=4234387
-
https://www.kaggle.com/c/microsoft-malware-prediction
-
http://www.ams.org/mathscinet-getitem?mr=4205495
-
http://www.emis.de/MATH-item?1356.68004
-
https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/
-
https://www.comparitech.com/antivirus/malware-statistics-facts/
-
https://www.securitymagazine.com/articles/97166-ransomware-attacks-nearly-doubled-in-2021
-
https://marcoramilli.com/2016/12/16/malware-training-sets-a-machine-learning-dataset-for-everyone/
-
https://doi.org/10.1007/978-3-031-34969-0_7
-
https://doi.org/10.3390/su13094716
-
https://doi.org/10.1016/j.aej.2021.11.061
-
https://doi.org/10.1186/s13673-016-0076-z
-
https://doi.org/10.1109/ACCESS.2020.3004814
-
https://doi.org/10.3390/s22020410
-
https://doi.org/10.1016/j.jnca.2019.102481
-
https://doi.org/10.1007/s10664-019-09760-3
-
https://doi.org/10.3390/electronics11111798
-
https://doi.org/10.3390/electronics10020186
-
https://doi.org/10.4018/IJSWIS.2021100104
-
https://doi.org/10.1587/transinf.2019INI0003
-
http://www.ams.org/mathscinet-getitem?mr=3927955
-
https://doi.org/10.1016/j.cosrev.2019.03.001
-
https://doi.org/10.1016/j.cose.2018.07.019
-
https://doi.org/10.1016/j.jnca.2018.10.022
-
https://doi.org/10.1016/j.jnca.2018.12.014
-
https://doi.org/10.1016/j.future.2019.11.034
-
https://doi.org/10.1016/S1353-4858(20)30030-1
-
https://doi.org/10.1016/j.comcom.2019.08.013
-
https://doi.org/10.1016/j.cose.2021.102400
-
https://doi.org/10.1109/ACCESS.2019.2937347
-
https://doi.org/10.1109/ACCESS.2020.3046442
-
https://doi.org/10.1109/ACCESS.2020.2981397
-
https://doi.org/10.1061/(ASCE)WR.1943-5452.0000749
-
https://doi.org/10.1109/COMST.2019.2953364
-
https://doi.org/10.1109/ACCESS.2019.2924045
-
https://doi.org/10.1016/j.giq.2019.02.003
-
https://doi.org/10.1007/s11416-006-0012-2
-
https://doi.org/10.1109/ACCESS.2019.2960412
-
https://doi.org/10.1109/ACCESS.2018.2853985
-
https://doi.org/10.1109/ACCESS.2020.3041951
-
https://doi.org/10.1145/3530812
-
https://doi.org/10.1007/978-3-031-34969-0_8
-
https://sites.google.com/view/iot-network-intrusion-dataset/home
-
https://doi.org/10.1016/j.ifacol.2016.11.078
-
https://doi.org/10.1109/JIOT.2019.2935189
-
https://doi.org/10.1155/2019/6516253
-
https://doi.org/10.1002/spy2.112
-
https://doi.org/10.1016/j.patcog.2021.107965
-
https://doi.org/10.3390/s21092987
-
https://doi.org/10.1109/TKDE.2008.239
-
https://doi.org/10.1109/TKDE.2015.2458858
-
https://doi.org/10.1109/TSMCB.2012.2187280
-
https://doi.org/10.3390/app11073022
-
https://doi.org/10.1109/TKDE.2017.2761347
-
https://doi.org/10.3390/math9070751
-
https://doi.org/10.3390/s20092559
-
https://doi.org/10.3390/s20061706
-
https://doi.org/10.1186/s13677-018-0123-6
-
https://doi.org/10.1145/2939672.2939785
-
https://www.sciencedirect.com/science/article/pii/S0022169419304251
-
https://doi.org/10.1007/s10551-017-3549-8
-
https://doi.org/10.1109/ACCESS.2022.3149482
-
https://doi.org/10.1016/j.aap.2019.105405
-
https://doi.org/10.1007/978-3-031-34969-0_9
-
https://doi.org/10.1109/ACCESS.2021.3087316
-
https://doi.org/10.1109/ACCESS.2021.3118642
-
https://doi.org/10.36346/sarjet.2019.v01i03.003
-
https://doi.org/10.1177/18479790221093992
-
https://doi.org/10.1016/j.knosys.2018.10.025
-
https://doi.org/10.4018/IJCWT.2017040101
-
https://doi.org/10.1007/978-3-642-27245-5_27
-
https://doi.org/10.1007/978-981-19-3311-0_45
-
https://doi.org/10.1016/j.cose.2020.101905
-
https://doi.org/10.1007/s11036-017-0937-3
-
https://doi.org/10.1016/j.ins.2013.04.028
-
https://doi.org/10.1201/9781003134527-17
-
http://www.ams.org/mathscinet-getitem?mr=4358205
-
https://doi.org/10.1016/j.comcom.2015.01.006
-
https://doi.org/10.1109/TDSC.2015.2457918
-
https://doi.org/10.1109/TCC.2016.2582278
-
https://doi.org/10.32604/csse.2021.015282
-
https://doi.org/10.1109/MNET.2011.5958005
-
https://doi.org/10.1016/j.jnca.2010.06.008
- Show all
-