General

  • Target

    e4f40a3b4a4524215c0728852b1d50f6de03f6f03653955f388dc1162f5a560e

  • Size

    23.3MB

  • MD5

    d2d2b434d6ebb9711912356d1a099495

  • SHA1

    dccf6ff810ef5042f45a5f28cc7a84b48deae717

  • SHA256

    e4f40a3b4a4524215c0728852b1d50f6de03f6f03653955f388dc1162f5a560e

  • SHA512

    d5690f4ece8725bb19b9acb291f8df43185b3d3e4da95ef01064555e1f3e9d2b680ec72c96967d11f5210792010d26d4fbb4cc61a2aa81dda3b5cc22993d2768

  • SSDEEP

    393216:lByEm0NBFvS+DlCfH6xsJVf/jp/tpB9rBWwciEw4QbUs87Sm/LgqXVocqGAFdBcQ:00zFzsax4VTpFpB9uqbUB7bMqVqVFdBd

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • e4f40a3b4a4524215c0728852b1d50f6de03f6f03653955f388dc1162f5a560e
    .pdf
    • https://www.bpbonline.com/

    • https://rebrand.ly/b41126

    • https://github.com/bpbpublications

    • https://discord.bpbonline.com/

    • https://www.wireshark.org/download.html

    • https://www.winpcap.org/install/default.htm

    • https://nmap.org/npcap/

    • http://testphp.vulnweb.com/login.php

    • http://xcal1.vodafone.co.uk/

    • Show all