General

  • Target

    Bug_Hunters_Methodology_Live_Day_Two_-_App_Analysis_Master.pdf

  • Size

    8.0MB

  • MD5

    fca5ec9415a3904cca6e4a9a64b24692

  • SHA1

    2a1250fa452041fc85f1ced0ecf8962d0d8ace58

  • SHA256

    5cc9399e6132691ce6f55e5a198e5822d9bb874c67d07da7b1c9503db7ab3149

  • SHA512

    a69cfb296526f5fac4f40cd631fbfc42309cd9f630463f07bcbee80e56fd9b51a7cb95826aa5114d3353c6b8b3b04e6d87de83171fcd76068734d41c55b6d887

  • SSDEEP

    196608:UFknu/JJhAZrf9d3ktFlGvrRUurGJ9r+Ha2cunDxb:U2u/8lhktAR0J9C6nqF

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Bug_Hunters_Methodology_Live_Day_Two_-_App_Analysis_Master.pdf
    .pdf
    • http://bugcrowd.com

    • http://deobfuscate.io

    • http://troupga5ke78yjdu4hv12s1v2m8dw3ks.oastify.com

    • http://www.blackhat.com/docs/euen-US-en-US14/materials/euen-US-en-US14en-US-en-USJaveden-US-en-USRevisitingen-US-en-USXSSen-US-en-USSanitization.pdf

    • https://academy.ranakhalil.com/p/web-security-academy-video-series

    • https://app.com/en-USresourceen-US?en-USparameteren-US=en-USvalueen-US&param2=valueen-USOr

    • https://app.com/en-USrouteen-US/en-USresourceen-US/en-USsuben-US-en-USresourceen-US/...en-USUnderstanding

    • https://bit.ly/3cIYgdt

    • https://blog.assetnote.io/bugen-US-en-USbounty/2020/02/02/expandingen-US-en-USattacken-US-en-USsurfaceen-US-en-USreacten-US-en-USnative/

    • Show all