General

  • Target

    6acdb99d2f3dd5fd1ccb4d89b7cc4aed13a4152980c785feeae87fb17aef1c1e

  • Size

    1.4MB

  • MD5

    575a0994590373b10a3318c05e3caa37

  • SHA1

    7c7383f1f8b6cdca591935ffab6a154a1a92fe2d

  • SHA256

    6acdb99d2f3dd5fd1ccb4d89b7cc4aed13a4152980c785feeae87fb17aef1c1e

  • SHA512

    a8ac261d1e804c2794744ed76ea3842468c5e6efb3d8a857c792d17b616f2a72d8d8e00a2d9c2c4b18f67f0df025a34efa57c88ac2a40784704e794fe2d897d1

  • SSDEEP

    24576:bQfXoqshdhlRIUhDC0Qitn2mIvSIYJLBx+uxU38Wb7qUwggpaDlOCAVQ:SozG0QitnrIOJ2l8WbkgSaDwCYQ

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 6acdb99d2f3dd5fd1ccb4d89b7cc4aed13a4152980c785feeae87fb17aef1c1e
    .pdf
    • https://www.cyber.gov.au/about-us/about-acsc/contact-us

    • https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-ism-mapping

    • https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism

    • https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight

    • https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/strategies-mitigate-cyber-security-incidents

    • https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide

    • https://www.sans.org/blog/bloodhound-sniffing-out-path-through-windows-domains/

    • https://learn.microsoft.com/en-au/windows/release-health/release-information

    • https://docs.microsoft.com/en-au/windows/security/identity-protection/credential-guard/credential-guard-manage

    • Show all