General

  • Target

    288651f2ddbc166429ff2e92a308f8a362c3bb7155c551f5c8162180151d5f74

  • Size

    364KB

  • MD5

    f6f794859b17271f312a69627ac0553a

  • SHA1

    f6b859acce128436d2b1a7d16c924f01b6dfc6fe

  • SHA256

    288651f2ddbc166429ff2e92a308f8a362c3bb7155c551f5c8162180151d5f74

  • SHA512

    c963b21af9c7812d1b762e7dd6ec0e9a7a27740a01ab51568fb0fd9878f0da418751bda2096a6e48983c074f6f67bb343f43b34dbca03cafbf704b2655601d4c

  • SSDEEP

    6144:4esNUpwZhPPIEMKhrWAk29SfQm0Cp5ckpGsvzjsTeIy+rnrBiS:sa6DPPIEdBWAkA80Cp5ckptvzjsTTrnz

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 288651f2ddbc166429ff2e92a308f8a362c3bb7155c551f5c8162180151d5f74
    .pdf
    • https://www.cisa.gov/tlp

    • https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    • https://www.cisa.gov/resources-tools/resources/secure-by-design

    • https://cwe.mitre.org/

    • http://cisa.dhs.gov

    • http://cisa.gov

    • http://CISA.gov