General

  • Target

    29c58fd0b1e0b68c4b52c6d8dc1772ee_JaffaCakes118

  • Size

    93KB

  • MD5

    29c58fd0b1e0b68c4b52c6d8dc1772ee

  • SHA1

    ddf470b1568174b8bfb8755b22ae9d734fff7d1b

  • SHA256

    1298b9e2300d15a09d828268fa3dd30b55c212cf204c9291af246dd16bdd52b3

  • SHA512

    3593942daa9743384fb45bdf7ee01823214370e6518d2a37b61849678f5957d41745d0e1a9516e8b8df21fb1bf38da32f4d50af6ef60c6bbfcb167f3ac528b21

  • SSDEEP

    1536:Hz99O8ekWgxHcKPAsLdhhQ0KLhRO0/vbiWQlGgmxWTEWuEBFyAYmWQpOCc9UwH:Twg1cKhdhh4d7w9YZCc9h

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 29c58fd0b1e0b68c4b52c6d8dc1772ee_JaffaCakes118
    .pdf
    • https://feedproxy.google.com/~r/Uplcv/~3/6naE_Nh8_CY/uplcv?utm_term=how+to+activate+familiars+in+lords+mobile

    • https://bohemiamaestro.com/webpagebuilder/ckfinder/userfiles/files/8049384208.pdf

    • https://menu2uplus.com/images/file/lurezo.pdf

    • http://www.kissdocs.com.au/wp-content/plugins/formcraft/file-upload/server/content/files/160b50a9b73943---jexowobivigumuzinesapa.pdf

    • https://sweetestspaparty.com/wp-content/plugins/formcraft/file-upload/server/content/files/16075538b7af9a---wolapawoxakijiwufilazimom.pdf

    • https://aartipalette.com/userfiles/file/85438069567.pdf

    • http://www.blackhillsdancecentre.com/wp-content/plugins/formcraft/file-upload/server/content/files/1607f460d1370a---59073139745.pdf

    • http://demkapi.com/resimler/files/riduzamevobebisuxol.pdf

    • http://kiko168.com/UploadFile/file/20210821023430184.pdf

    • Show all