Behavioral task
behavioral1
Sample
The Hacker Playbook 3 -- Peter Kim -- Red team edition, North Charleston, South Carolina, 2018 -- In.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
The Hacker Playbook 3 -- Peter Kim -- Red team edition, North Charleston, South Carolina, 2018 -- In.pdf
Resource
win10v2004-20240802-en
General
-
Target
The Hacker Playbook 3 -- Peter Kim -- Red team edition, North Charleston, South Carolina, 2018 -- Independently published -- 1980901759 -- 12ec418ef7df100bfb94e31da7e86727 -- Anna’s Archive.pdf
-
Size
8.7MB
-
MD5
12ec418ef7df100bfb94e31da7e86727
-
SHA1
b2eef9887596afdc7be0d3bc5adec4ad98c42a5f
-
SHA256
348842059581a135d984474a26f3b77d8aac4298deccbfdebed15fd4da3f4922
-
SHA512
e257e209512f5bb3966f3aad7e24bd1fd1251f58d6818341de0f192f1b2c3485447981b9d44393c0eacf08b2e95434d5476afe73b3658468868a450c6094d1cb
-
SSDEEP
196608:+wcx82dmnhC0rf2pjeU5QWh0Ga5vU1v6yrTZF2MDdAX/UC:4xVCVSpeia5vU1v6eTr1mXsC
Malware Config
Signatures
Files
-
The Hacker Playbook 3 -- Peter Kim -- Red team edition, North Charleston, South Carolina, 2018 -- Independently published -- 1980901759 -- 12ec418ef7df100bfb94e31da7e86727 -- Anna’s Archive.pdf.pdf
-
https://github.com/cyberspacekittens/bloodhound
-
https://hashcat.net/wiki/doku.php?id=example_hashes
-