General

  • Target

    c2326f0d5a207c00ebd3831cf98a3d40N.pdf

  • Size

    906KB

  • MD5

    c2326f0d5a207c00ebd3831cf98a3d40

  • SHA1

    121801745651a14b99925d31f8e44f1f7db95c74

  • SHA256

    c4405f3bac1fa690c967f665d392730c09afbc693926abeaf4d94058e6b260ca

  • SHA512

    3847ee77e1f47aada63820157132dba65f29bf3d65722d67411cbce3030b60b79f21dacf89667da90ed3c7bc7583aefa045ee566c3674babb01c88a5c0ad024e

  • SSDEEP

    24576:pTyyeN6T+cPJcUt9gfTZzCQ50ID67nesUOps:+FfU0f1zCQVya

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • c2326f0d5a207c00ebd3831cf98a3d40N.pdf
    .pdf
    • http://ncstatecollege.edu

    • http://www.bowdoin.edu/facilities/transportation/pdf/auth%20to%20drive%20sept%202010.pdf

    • http://www.ncstatecollege.edu/cms/facilities

    • http://www.ncstatecollege.edu/cms/facilities.

    • http://www.ncstatecollege.edu/cms/media/PDF/Facilities/Driving_History_From17-411b.pdf

    • http://www.usbank.com/cgi_w/cfm/commercial_business/products_and_services/voyager_fleet_systems/fueling_locations.cfm

    • http://www.usbank.com/thirdParty/goOffsiteConfirm.cfm?BL=USB&ID=1571

    • http://www.usbank.com/thirdParty/goOffsiteConfirm.cfm?BL=USB&ID=1573&TPPath=locators.asp

    • http://www.usbank.com/thirdParty/goOffsiteConfirm.cfm?BL=USB&ID=1576

    • Show all