General

  • Target

    The Hacker Playbook 3 -- Peter Kim -- Red team edition, North Charleston, South Carolina, 2018 -- Independently published -- 1980901759 -- 12ec418ef7df100bfb94e31da7e86727 -- Anna’s Archive.pdf

  • Size

    8.7MB

  • MD5

    12ec418ef7df100bfb94e31da7e86727

  • SHA1

    b2eef9887596afdc7be0d3bc5adec4ad98c42a5f

  • SHA256

    348842059581a135d984474a26f3b77d8aac4298deccbfdebed15fd4da3f4922

  • SHA512

    e257e209512f5bb3966f3aad7e24bd1fd1251f58d6818341de0f192f1b2c3485447981b9d44393c0eacf08b2e95434d5476afe73b3658468868a450c6094d1cb

  • SSDEEP

    196608:+wcx82dmnhC0rf2pjeU5QWh0Ga5vU1v6yrTZF2MDdAX/UC:4xVCVSpeia5vU1v6eTr1mXsC

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • The Hacker Playbook 3 -- Peter Kim -- Red team edition, North Charleston, South Carolina, 2018 -- Independently published -- 1980901759 -- 12ec418ef7df100bfb94e31da7e86727 -- Anna’s Archive.pdf
    .pdf
    • https://github.com/cyberspacekittens/bloodhound

    • https://hashcat.net/wiki/doku.php?id=example_hashes