General

  • Target

    40e8d34b0142d56ab6ba9c89b72a26ae_JaffaCakes118

  • Size

    18KB

  • MD5

    40e8d34b0142d56ab6ba9c89b72a26ae

  • SHA1

    6b3f830cf15ccc6d2d4c0ed45c70789f443fc14d

  • SHA256

    0f45f66cb479373946b7d794b552904403e9de92942f9d1ac5f69d4af44748f2

  • SHA512

    612f52664d83251ad89edc1986fee24416192be5def748d0937542798469710aee7329ef36876c26c5231324a263b7b7241fafee8366d99196580ea3d710831d

  • SSDEEP

    384:Vzn73+i4imMz1J9YUIvkSWkrvc7yLRpyLmRwLr2UwHdXhdjVYjeLzBd0M950b2Vf:VznSiEMz1oUIvDWq07y9py6RwLr2UwHb

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 40e8d34b0142d56ab6ba9c89b72a26ae_JaffaCakes118
    .pdf
    • http://hooyengaujcsiniio.myhome.cx

    • http://likeujcsiniio.myhome.cx

    • http://ujcsiniio.myhome.cx

    • http://ujcsiniio.myhome.cx/1cd8cd1cd2cd5/Cracking-the-Gender-Code-Who-Rules-the-Wired-World-by-Melanie-Stewart-Millar.pdf

    • http://ujcsiniio.myhome.cx/1cd9cd4cd7cd0cd0/The-Rules-by-Nancy-Holder.pdf

    • http://ujcsiniio.myhome.cx/1cd9cd5cd9cd4cd9/The-Rules-in-Rome-by-A-L-Sowards.pdf

    • http://ujcsiniio.myhome.cx/2cd1cd5cd3cd2cd2/What-If-You-Broke-All-the-Rules-by-Liz-Ruckdeschel.pdf

    • http://ujcsiniio.myhome.cx/2cd1cd6cd9cd0cd8/Against-All-Rules-by-Summerita-Rhayne.pdf

    • http://ujcsiniio.myhome.cx/2cd1cd9cd2cd9cd8/The-Slope-Rules-The-Rules-1-by-Melanie-Hooyenga.pdf

    • Show all