General

  • Target

    10441e69152ad400bac113b7a96a4d56_JaffaCakes118

  • Size

    64KB

  • MD5

    10441e69152ad400bac113b7a96a4d56

  • SHA1

    bc19ed76447611bff07b8ec39be6d18fa4e71c01

  • SHA256

    dcb5d6a06281612959281e8ecf53d231e59207e04375d106a887ac5d2270852a

  • SHA512

    a2b7d0e5b36c890bbfe5902be7e5cbf4c96eabac7944a733b31f58fcf03804dff6ca8c29856827dd363c44d5abcd722ebdcd065c203c1538edacf4a36195ed05

  • SSDEEP

    1536:vf/by5C/52JVdhmvmiRinp0brXetVAQh7sh:Pbt/5mVd8Oi4crXEaQhK

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 10441e69152ad400bac113b7a96a4d56_JaffaCakes118
    .pdf
    • https://cdn.sqhk.co/toralapiluw/ggHjbhd/smashy_road_2_key_clown_car.pdf

    • https://cdn.sqhk.co/xuxumududu/0jjfvEo/monument_valley_3_download.pdf

    • https://jerefukixuludew.weebly.com/uploads/1/3/4/6/134686450/e6ac8c9ad0d.pdf

    • https://kabuxezalexafa.weebly.com/uploads/1/3/0/8/130814122/juguzoj.pdf

    • https://poxaneduwi.weebly.com/uploads/1/3/4/2/134234601/b4041e2a1b8351.pdf

    • https://s3.amazonaws.com/tobobowu/vuxufavu.pdf

    • https://s3.amazonaws.com/xisakazelelinim/roblox_exploit_executor_2020.pdf

    • https://trafffe.ru/strik?utm_term=usa+today+subscription+phone+number

    • https://uploads.strikinglycdn.com/files/2519da83-0e40-4d15-be8a-6538e7a1624b/csi_web_adventures_case_3_answer_key.pdf

    • Show all