General

  • Target

    fb44ae66e918fa41cfab6fc89e197236a5d4a313a43ffea164ef0ccb08f64cc5N

  • Size

    484KB

  • MD5

    04c0ff60d39651bd65c0c1538694ba90

  • SHA1

    8ba9def83ff505087fb99b1e769f82d9e7a7bf38

  • SHA256

    fb44ae66e918fa41cfab6fc89e197236a5d4a313a43ffea164ef0ccb08f64cc5

  • SHA512

    631e209f79e8d2152c382fb657386d431e88cff40cf766fd5557e37e1d6f3970fcf3c677f27c9df4e434ac032fdabcab62f6a840e64cd89d8e5746f62acc22d5

  • SSDEEP

    12288:MCkh22Ryl7NWkFkASPixctg37mmisw+rGCu1qvuS26:MCkYwMBkASqxt37mm34TP6

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • fb44ae66e918fa41cfab6fc89e197236a5d4a313a43ffea164ef0ccb08f64cc5N
    .pdf
    • http://aws.amazon.com/agreement/

    • http://aws.amazon.com/amis

    • http://aws.amazon.com/ec2/

    • http://aws.amazon.com/ec2/,2011.7AmazonInc.Amazonmachineimage.http://aws.amazon.com/amis,2011.8AmazonInc.Amazonwebservicecustomeragreement.http://aws.amazon.com/agreement/,2011.9AMDInc.Securevirtualmachinearchitecturereferencemanual,2005.[10]Apache.ab-apachehttpserverbenchmarkingtool.http://httpd.apache.org/docs/2.0/programs/ab.html,2011.[11]A.Azab,P.Ning,Z.Wang,X.Jiang,X.Zhang,andN.Skalsky.HyperSentry:enablingstealthyin-contextmeasurementofhypervisorintegrity.InProc.CCS,pages38�49,2010.[12]P.Barham,B.Dragovic,K.Fraser,S.Hand,T.Harris,A.Ho,R.Neugebauer,I.Pratt,andA.Wareld.Xenandtheartofvirtualization.InProc.SOSP.ACM,2003.[13]M.Ben-Yehuda,M.D.Day,Z.Dubitzky,M.Factor,N.Har'El,A.Gordon,A.Liguori,O.Wasserman,andB.-A.Yassour.Theturtlesproject:Designandimplementationofnestedvirtualization.InProc.OSDI,2010.[14]H.Chen,J.Chen,W.Mao,andF.Yan.Daonity-gridsecurityfromtwolevelsofvirtualization.InformationSecurityTechnicalReport,12

    • http://cialblogoftheinvisiblethings.org

    • http://cve.mitre.org/

    • http://etal.se

    • http://fudan.edu.cn

    • http://httpd.apache.org/docs/2.0/programs/ab.html

    • Show all