General

  • Target

    14f6a202b3855468e52a9292b6432ed0_NeikiAnalytics

  • Size

    442KB

  • MD5

    14f6a202b3855468e52a9292b6432ed0

  • SHA1

    a5bc2bc0be3fee2cd078ecb36627ab50762a7891

  • SHA256

    6bb58d4570c12668eb56cc6961a56fcf40a6ef0f921aa72265e3602e6dc389f0

  • SHA512

    0ab48c1350598eaa7e35e767b5624813bac1716f69776c48c751838a3cd6a4d297cdcb9d7ce1d18c31a0aa1fa2d6859b89487cbe95bf0c2e5ed34654740a0952

  • SSDEEP

    12288:7GXotZ3A7DjRJntCpS4tDKnORexG43GOOvwl:ioZ3qPR1sEc5exG43Ggl

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 14f6a202b3855468e52a9292b6432ed0_NeikiAnalytics
    .pdf
    • http://BCCmissratiowhenvaryingBCCsizeandnumberofpagesperentry.by

    • http://acm.org

    • http://cs.wisc.edu

    • http://download.intel.com/design/processor/specupdt/320836.pdf,May2011.[21]IntelXeonProcessorE5Family:Speci

    • http://dx.doi.org/10.1145/2830772.2830819.1.INTRODUCTION`Bordercontrol'meanstheactivitycarriedoutataborder...inresponseexclusivelytoanintentiontocrossortheactofcrossingthatborder,regardlessofanyotherconsideration,consistingofborderchecksandbordersurveillance.Article2,Section9oftheSchengenBordersCode1WiththebreakdownofDennardscaling,specializedhardwareacceleratorsarebeinghailedasonewaytoimproveperformanceandreducepower.Computationscanbeo

    • http://virtical.upv.es/pub/sc13.pdf,Nov.2013.[16]USDepartmentofDefense,

    • http://www.amd.com/us/products/desktop/processors/a-series/Pages/nextgenapu.aspx

    • http://www.amd.com/us/products/desktop/processors/a-series/Pages/nextgenapu.aspx.[15]J.Goodacre,

    • http://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html

    • Show all