ScreenShot
Created | 2021.08.05 12:30 | Machine | s1_win7_x6401 |
Filename | 제4기AMP 안내자료.pdf | ||
Type | PDF document, version 1.6 | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 11 detected (Artemis, vlynu@0, PDFEXP, Casdet, FakePDF, FakeDocu) | ||
md5 | 70294ac8b61bfb936334bcb6e6e8cc50 | ||
sha256 | 512ad244c58064dfe102f27c9ec8814f3e3720593fe1e3ed48a8cb385d52ff84 | ||
ssdeep | 3072:xMLZB6xP2cQ8mUjIgBPsP5TUYdFTCrQlGvwJpKz9z7PDHUx2p:KLbGPQ8DZkPDFTCEl7s9z7PbB | ||
imphash | |||
impfuzzy |
Network IP location
Signature (1cnts)
Level | Description |
---|---|
watch | File has been identified by 11 AntiVirus engines on VirusTotal as malicious |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | APT_Kimsuky_PDF_Enc_Shellcode_Aug_2021_1 | Detect encoded Kimsuky shellcode used in fake PDF against South Korea | binaries (upload) |
warning | PDF_Javascript_ShellCode | PDF Javascript ShellCode | binaries (upload) |
notice | PDF_Format_Z | PDF Format | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|