General

  • Target

    ec61717c4cef2dfea4623d6b8729dd9a_JaffaCakes118

  • Size

    68KB

  • MD5

    ec61717c4cef2dfea4623d6b8729dd9a

  • SHA1

    a2ca183dc37c407550193855b4f2b84b2740f0d2

  • SHA256

    89a5133ba3666ecc8ded1b169b727215379a8d99cd6f28dcb2b24b0ac9143885

  • SHA512

    13ed003efc33995c2d4ae467ea94c044911f865390483157cce43c28f2fec7409cb48ea5078208b9c1ef41e4b460cf07c97d7effd77e672c66535cfafe29fbf5

  • SSDEEP

    1536:dEq+b9gDg0rFWxGD+e2+7DPi8bsWOpOaZEWc52R2CnUx1w2nEh:zqgDbrF+Re2QDFFaZY2kCUx1j2

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • ec61717c4cef2dfea4623d6b8729dd9a_JaffaCakes118
    .pdf
    • https://feedproxy.google.com/~r/Uplcv/~3/PmAiG5ZyT-k/uplcv?utm_term=fortnite+new+update+apk

    • http://hatowo.com/app/webroot/uploads/files/gitid.pdf

    • https://confidence-ist.mktechsol.com/ckfinder/userfiles/files/notomopamaxo.pdf

    • http://yztools.com/images/upload/File/25485257424.pdf

    • http://chupanhnoithat.vn/upload/files/gafesuzewovudaxi.pdf

    • http://www.seminariomenorvalencia.com/admin/lib/ckfinder/userfiles/files/bojotili.pdf

    • https://dentalrud.com/userfiles/file/87876945323.pdf

    • https://www.elektrobetrieb-scholz.de/wp-content/plugins/formcraft/file-upload/server/content/files/161417cbe32bf7---96004302211.pdf

    • http://lynxitservices.com/ckfinder/userfiles/files/bakunipekawerufamu.pdf

    • Show all