Today we show how to quickly analyze a suspicious PDF file to determine whether it contains malicious contents. Check the youtube video for the full analysis process.
RING Ø LABS
Here are indicators of compromise to block:
The analysis techniques shown in the video are standard practice when dealing with suspicious PDF documents. Thanks to the quick actions of someone, the download site this PDF reaches back to was already taken down. Good job...someone.