id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
3,298 | The command will list the installation directory of several popular instant messaging applications including WeChat, QQ, and Aliwangwang and return this information to the C&C server. | [
{
"id": 48384,
"label": "SOFTWARE",
"start_offset": 109,
"end_offset": 115
},
{
"id": 48386,
"label": "SOFTWARE",
"start_offset": 125,
"end_offset": 136
},
{
"id": 48385,
"label": "SOFTWARE",
"start_offset": 117,
"end_offset": 119
}
] | [] | [] |
364 | If you’ve already deployed signatures and your logs are showing attempted exploits, consider blocking or monitoring the IP addresses sending the requests. | [] | [] | [] |
426 | There are many kinds of coin mining software. | [] | [] | [] |
1,649 | Common sense is the best defense against these types of abusive programs. | [] | [] | [] |
7,714 | Other samples also included an Excel file attachment with malicious macros that install FlawedAmmyy, or a URL included in the email that supposedly downloads the file needed to download the malware. | [
{
"id": 23970,
"label": "malware",
"start_offset": 88,
"end_offset": 99
}
] | [] | [] |
4,386 | Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread. | [] | [] | [] |
6,620 | https://unit42.paloaltonetworks.com/behind-the-scenes-with-oilrig/ | [] | [] | [] |
5,135 | "It's mine, I defend everything inside" …and realizing that this is actually how cybercriminals work. | [] | [] | [] |
2,784 | And while the computer is impacted like this, the attacker is earning money. | [] | [] | [] |
4,892 | Many YouTube creators provide an email address on their channel for business opportunities. | [] | [] | [] |
7,154 | New sample of Type 1 malware variant and a rootkit called Pandora found April 2020: One rootkit sample for hiding files processes, files, and services found October 2020: | [
{
"id": 22365,
"label": "location",
"start_offset": 4,
"end_offset": 10
},
{
"id": 22366,
"label": "location",
"start_offset": 14,
"end_offset": 18
},
{
"id": 22367,
"label": "location",
"start_offset": 37,
"end_offset": 40
},
{
"id": 22368,
"label": "attack-pattern",
"start_offset": 43,
"end_offset": 50
},
{
"id": 22372,
"label": "attack-pattern",
"start_offset": 88,
"end_offset": 95
},
{
"id": 22373,
"label": "location",
"start_offset": 96,
"end_offset": 102
},
{
"id": 22374,
"label": "location",
"start_offset": 138,
"end_offset": 141
}
] | [] | [] |
4,234 | This one is called “sysctrls” and it looks for files with the following extensions: | [] | [] | [] |
6,883 | The vast majority of these messages were sent to spam without any user ever seeing them, and we were able to preemptively block the domains using Safe Browsing. | [
{
"id": 21523,
"label": "tools",
"start_offset": 4,
"end_offset": 8
},
{
"id": 21524,
"label": "location",
"start_offset": 71,
"end_offset": 75
},
{
"id": 21525,
"label": "location",
"start_offset": 83,
"end_offset": 87
},
{
"id": 21526,
"label": "location",
"start_offset": 89,
"end_offset": 92
}
] | [] | [] |
2,614 | Lapsus$ Group has made headlines recently for high-profile attacks, with an apparent goal of gaining notoriety. | [
{
"id": 47794,
"label": "threat-actor",
"start_offset": 1,
"end_offset": 8
}
] | [] | [] |
336 | All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “ladomfichisi1987@mail.ru”. | [
{
"id": 1156,
"label": "IPV4",
"start_offset": 41,
"end_offset": 56
},
{
"id": 46025,
"label": "location",
"start_offset": 60,
"end_offset": 67
},
{
"id": 44703,
"label": "EMAIL",
"start_offset": 138,
"end_offset": 162
}
] | [
{
"id": 148,
"from_id": 1156,
"to_id": 44703,
"type": "related-to"
}
] | [] |
10,309 | Trojan.MSIL.OCEANMAP.A | [] | [] | [] |
437 | And, as noted before, this happens without the user’s knowledge or consent. | [] | [] | [] |
900 | The malware proceeds to generate a unique key that will be used in subsequent file encryption using the following data: This data is concatenated to form a string similar to the following: Figure 5. | [] | [] | [] |
8,060 | Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https://sites.google[.]com/view/ty85yt8tg8-download-rtih4ithr/ https://sites.google[.]com/view/user-id-568245/ https://sites.google[.]com/view/hhbejfdwdhwuhscbsb-xscvhdvbc/ Abused Dropbox Properties: https://www.dropbox[.]com/s/68y4vpfu8pc3imf/Iraq&Jewish.pdf | [
{
"id": 25012,
"label": "threat-actor",
"start_offset": 16,
"end_offset": 21
},
{
"id": 25013,
"label": "attack-pattern",
"start_offset": 22,
"end_offset": 30
},
{
"id": 25014,
"label": "location",
"start_offset": 31,
"end_offset": 39
},
{
"id": 25015,
"label": "threat-actor",
"start_offset": 185,
"end_offset": 190
},
{
"id": 25016,
"label": "URL",
"start_offset": 229,
"end_offset": 255
},
{
"id": 25017,
"label": "location",
"start_offset": 256,
"end_offset": 260
},
{
"id": 25018,
"label": "URL",
"start_offset": 292,
"end_offset": 318
},
{
"id": 25019,
"label": "location",
"start_offset": 319,
"end_offset": 323
},
{
"id": 25020,
"label": "URL",
"start_offset": 340,
"end_offset": 366
},
{
"id": 25021,
"label": "location",
"start_offset": 367,
"end_offset": 371
},
{
"id": 25022,
"label": "malware",
"start_offset": 410,
"end_offset": 417
},
{
"id": 25023,
"label": "URL",
"start_offset": 430,
"end_offset": 455
}
] | [] | [] |
3,327 | This plug-in can inject malicious scripts into the response of the victim’s web server by leveraging the WinDivert package, which is used to sniff and manipulate the network traffic on Windows. | [
{
"id": 48408,
"label": "SOFTWARE",
"start_offset": 105,
"end_offset": 114
},
{
"id": 48409,
"label": "SOFTWARE",
"start_offset": 185,
"end_offset": 192
}
] | [] | [] |
7,835 | Today, Palo Alto Networks researcher Claud Xiao is delivering a presentation titled “Insecure Internal Storage in Android” at the Hacks in Taiwan Conference (HITCON). Claud is discussing techniques for accessing private data in Android’s internal storage system using the Android Debug Bridge (ADB) backup/restore functionality. | [] | [] | [] |
2,592 | Additional Resources | [] | [] | [] |
13,170 | Figure 3. | [] | [] | [] |
5,909 | So, take care, have a great day. | [] | [] | [] |
2,441 | Unit 42 first observed scanning traffic early on March 30, 2022 with HTTP requests to servers that included the test strings within the URL. | [
{
"id": 47510,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 47511,
"label": "TIME",
"start_offset": 49,
"end_offset": 63
}
] | [] | [] |
5,115 | That's not how it works at all. | [] | [] | [] |
12,219 | We terminated 33 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan. | [] | [] | [] |
9,074 | Trend Micro™ Deep Security™ provides virtual patching that protects endpoints from threats such as malicious redirections to malware-hosting URLs as well as those that exploit unpatched vulnerabilities. | [] | [] | [] |
11,696 | The lure document redirected from the phishing page that discusses Indian and Pakistani political map issues Figure 10 | [
{
"id": 36041,
"label": "location",
"start_offset": 4,
"end_offset": 8
},
{
"id": 36042,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 46
},
{
"id": 36043,
"label": "location",
"start_offset": 47,
"end_offset": 51
},
{
"id": 36045,
"label": "location",
"start_offset": 74,
"end_offset": 77
}
] | [] | [] |
3,674 | Both groups use spear-phishing campaigns with attachments that are embedded with exploits as an entry point to the target system. | [
{
"id": 49467,
"label": "attack-pattern",
"start_offset": 16,
"end_offset": 40
}
] | [] | [] |
604 | But as organizations have gotten more effective at blocking malicious attachments like Hancitor, we’ve seen the attackers behind Hancitor adapt to evade detection and prevention. | [
{
"id": 46198,
"label": "malware",
"start_offset": 130,
"end_offset": 138
},
{
"id": 46200,
"label": "malware",
"start_offset": 88,
"end_offset": 96
}
] | [] | [] |
6,978 | In previous years, some CrimsonRAT samples were also found to be hosted on the viral91[.]xyz domain. | [] | [] | [] |
78 | Here are three things to watch for: | [] | [] | [] |
13,083 | Articles, News, Reports | [] | [] | [] |
11,544 | The group commonly uses Google or OWA password reset lures to steal credentials from targets, often using the MailJet or SendGrid API to send phishing emails. | [
{
"id": 35375,
"label": "attack-pattern",
"start_offset": 142,
"end_offset": 150
}
] | [] | [] |
5,121 | Not even misinformation, just storytelling that tries to make it far more dramatic than it is. | [] | [] | [] |
9,004 | Indicators of Compromise (IOCs) | [] | [] | [] |
7,890 | What a difference a year makes in the threat environment. | [] | [] | [] |
3,290 | The malware uses a number of methods to execute the shell command or script. | [] | [] | [] |
7,139 | Infection Vector | [
{
"id": 22318,
"label": "tools",
"start_offset": 10,
"end_offset": 16
}
] | [] | [] |
4,704 | TAG actively monitors threat actors and the evolution of their tactics and techniques. | [
{
"id": 50592,
"label": "identity",
"start_offset": 0,
"end_offset": 3
}
] | [] | [] |
251 | In particular, fake donation websites mimicking popular websites can be misleading, as described earlier. | [
{
"id": 45948,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 64
},
{
"id": 45947,
"label": "attack-pattern",
"start_offset": 15,
"end_offset": 37
}
] | [] | [] |
10,838 | It then creates a zip file with the name <uniqueId>.zip (note that the unique ID is not a real device ID, the malware just calculates a custom unique ID based on the device ID value), and writes the files into the compressed file. | [
{
"id": 33061,
"label": "location",
"start_offset": 90,
"end_offset": 94
},
{
"id": 33062,
"label": "identity",
"start_offset": 118,
"end_offset": 122
},
{
"id": 33063,
"label": "location",
"start_offset": 185,
"end_offset": 188
}
] | [] | [] |
311 | The first step is identifying them in your network. | [] | [] | [] |
4,074 | Figure 4. | [] | [] | [] |
8,108 | After downloading the extra DEX file from the C&C server, the second-layer droppers invoke extra code to download, install, and launch the callCam app on the device. | [
{
"id": 25120,
"label": "location",
"start_offset": 124,
"end_offset": 127
},
{
"id": 25121,
"label": "malware",
"start_offset": 139,
"end_offset": 146
}
] | [] | [] |
4,486 | These vendors operate with deep technical expertise to develop and operationalize exploits. | [] | [] | [] |
8,283 | This information was exceptionally useful, as it allowed us to find multiple Facebook accounts controlled by the threat actor. | [] | [] | [] |
11,706 | These two samples appear to be debug versions as they have no activities or any other component except Metasploit. | [
{
"id": 36082,
"label": "malware",
"start_offset": 103,
"end_offset": 113
}
] | [] | [] |
5,181 | We studied six widely used DDS implementations, chosen based on executions’ number of users and customers in the critical sectors globally. | [] | [] | [] |
11,226 | POST http://{C2}/?Key={GUID}&Crc={Identifier} { "appName": "Gmail Downloader", "targetname": "{Email}", "HostName": "REDACTED", "srcUserIP": "REDACTED", "actionType": "First", "timeOccurrence": "05/01/2022 05:50:31 PM", "OS": "REDACTED", "OSVersion": "REDACTED", "SystemModel": "REDACTED", "SystemType": "REDACTED", "srcName": "REDACTED", "srcOrgName": "REDACTED" } | [
{
"id": 34327,
"label": "location",
"start_offset": 0,
"end_offset": 4
},
{
"id": 34328,
"label": "URL",
"start_offset": 5,
"end_offset": 44
},
{
"id": 34330,
"label": "TIME",
"start_offset": 206,
"end_offset": 217
}
] | [] | [] |
12,648 | Txt | [] | [] | [] |
3,643 | But those out there who are in positions that might make them a high value target do need to be concerned about this. | [] | [] | [] |
14,228 | Figure 5: GitHub account hosting an HTML page used for C&C communication | [
{
"id": 48414,
"label": "SOFTWARE",
"start_offset": 10,
"end_offset": 17
}
] | [] | [] |
2,948 | Meanwhile, see our full research blog for full details on how attackers are distributing and using XMRig to generate Monero. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [
{
"id": 48104,
"label": "tools",
"start_offset": 100,
"end_offset": 105
}
] | [] | [] |
3,891 | Organizations must also identify which systems were affected and immediately isolate them and triage the impacted systems for restorations and recovery. | [] | [] | [] |
1,212 | After an SMS is received, these receivers and observers will check the originating number and/or message body, and block the SMS by some policies (Figure 3 and Figure 4). | [] | [] | [] |
5,123 | We know this time and time again—yes a bunch of nation-state stuff does happen but the vast majority of you are unaffected by it same with there's a massive amount of script-kiddie just sort of scanning random people with random tools that are just seeing what they can get away with that and if you have solid, automated defenses that doesn't really impact you. | [] | [] | [] |
6,204 | Figure 8. | [] | [] | [] |
11,940 | We terminated 123 YouTube channels as part of our investigation into coordinated influence operations linked to Russia. | [] | [] | [] |
7,588 | NSIS Installer sections | [
{
"id": 23651,
"label": "malware",
"start_offset": 0,
"end_offset": 4
}
] | [] | [] |
600 | The attackers behind Hancitor aren’t the first to time their spam attacks like this, but it is an effective tactic to try and increase their chances of success, especially when combined with the other innovation that we’ve seen. | [
{
"id": 44791,
"label": "malware",
"start_offset": 22,
"end_offset": 30
},
{
"id": 44792,
"label": "attack-pattern",
"start_offset": 62,
"end_offset": 74
}
] | [
{
"id": 23,
"from_id": 44791,
"to_id": 44792,
"type": "uses"
}
] | [] |
7,165 | We updated it again at 4:30 PM to add a link to IssueMakersLab's website and to add new IoC information. | [
{
"id": 22409,
"label": "TIME",
"start_offset": 23,
"end_offset": 30
},
{
"id": 22411,
"label": "location",
"start_offset": 73,
"end_offset": 76
}
] | [] | [] |
6,399 | Coincidentally, recent attempts to browse the textile manufacturer’s website result in a 500 internal server error message. | [] | [] | [] |
14,174 | The Director of National Intelligence Avril Haines said “Nevertheless, our analysts assess that Putin is unlikely to be deterred by such setbacks and instead may escalate, essentially doubling down.” | [
{
"id": 48219,
"label": "identity",
"start_offset": 4,
"end_offset": 50
},
{
"id": 48220,
"label": "identity",
"start_offset": 96,
"end_offset": 102
}
] | [] | [] |
3,840 | This initial version of ANEL had a hardcoded version labeled “5.0.0 beta1” that contained incomplete code. | [
{
"id": 11641,
"label": "malware",
"start_offset": 24,
"end_offset": 28
}
] | [] | [] |
1,467 | Table 1 If one app is signed using the publicly known private keys, it is easy for other apps on the same device to replace this vulnerable app with another APK file, silently with no user knowledge or interaction. | [] | [] | [] |
14,143 | This is somewhat surprising, considering Operation Earth Kitsune’s espionage tools were entirely fresh-developed. | [
{
"id": 48206,
"label": "campaign",
"start_offset": 41,
"end_offset": 66
}
] | [] | [] |
14,135 | Mattermost server activity. | [
{
"id": 48197,
"label": "Infrastucture",
"start_offset": 0,
"end_offset": 17
}
] | [] | [] |
1,039 | Through the types of accounts advertised on Taobao, an attacker can steal a student or staff account, assume their identity, and gain unauthorized access to standard university resources. | [
{
"id": 46531,
"label": "SOFTWARE",
"start_offset": 43,
"end_offset": 50
}
] | [] | [] |
5,307 | The OpenSSL library is then initialized, and the core component proceeds to initialize the hard-coded modules. | [
{
"id": 51360,
"label": "SOFTWARE",
"start_offset": 4,
"end_offset": 11
}
] | [] | [] |
1,557 | Additionally, this attack technique is not exclusive to the Sofacy Group. | [
{
"id": 45056,
"label": "threat-actor",
"start_offset": 61,
"end_offset": 73
}
] | [] | [] |
14,109 | While malware authors can fake this, useful information can still be gleaned with enough samples. | [] | [] | [] |
6,508 | Decoding this script reveals that it contains a backdoor: | [] | [] | [] |
1,316 | Upon execution, the malware will install itself as a service with the following parameters: It may also set the following registry key for persistence: | [] | [] | [] |
14,294 | This happens when the data is uploaded with the hidden iframe found in the bottom right part of the page (underlined in red). | [] | [] | [] |
8,301 | In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts. | [
{
"id": 25593,
"label": "threat-actor",
"start_offset": 41,
"end_offset": 56
},
{
"id": 25594,
"label": "location",
"start_offset": 57,
"end_offset": 61
},
{
"id": 25598,
"label": "location",
"start_offset": 126,
"end_offset": 129
}
] | [] | [] |
13,157 | The group then targets potentially unsecured related organizations that could serve as jumping-off points for attacks. | [] | [] | [] |
9,400 | Indicators of Compromise (IoCs) SHA-256 Package name Label 0c4b08bec1251b1ebc715a7ef1a712cdcb4d37ce0093d88f7fa73b0e05bf7b0e com.sas.gplayservices.accesibility GSERVICES 38acf26161a2c6429ee40d9b70d8419a9bd00eaa8740d221f943cea3229372dd com.sas.gservices.accesibility GSERVICES 3bf85d0aff5ddc0c57e43b879631ee692d98d01f5c964336471f1cdfe0d291f8 com.example.rat rat 7cb0eb93de496e2141b6e0541465ca71a84063867381085692885c75aa59cb1b com.pdf.searcher.dd Pdf Searcher 8ad18bd8f5d2f1fd9e00211170e8a540ddf7f51618588fab31b4ddd2b34b75e1 com.pdfd.researcher.resaq_ver1 Caller c8e1a702a27309c22728792c64aad4abc14ec2bfad1b30a4f27b8ebc6bcc68ff com.sas.gservices.accesibility GSERVICES C&C servers 3.95.71.123:3000 18.206.105.66:3000 40.114.109.69:3000 52.21.5.241:2000 Phishing domain http://gooogle[.]press/ MITRE ATT&CK Techniques Tactic Technique ID Description Initial Access Masquerade as Legitimate Application T1444 Used to masquerade as a legitimate chat app Persistence Abuse Device Administrator Access to Prevent Removal T1401 | [
{
"id": 28935,
"label": "SHA1",
"start_offset": 60,
"end_offset": 124
},
{
"id": 28936,
"label": "SHA1",
"start_offset": 170,
"end_offset": 234
},
{
"id": 28937,
"label": "SHA2",
"start_offset": 276,
"end_offset": 340
},
{
"id": 28938,
"label": "SHA2",
"start_offset": 361,
"end_offset": 425
},
{
"id": 28940,
"label": "SHA1",
"start_offset": 459,
"end_offset": 523
},
{
"id": 28941,
"label": "MD5",
"start_offset": 562,
"end_offset": 626
},
{
"id": 28942,
"label": "attack-pattern",
"start_offset": 759,
"end_offset": 767
},
{
"id": 28943,
"label": "URL",
"start_offset": 776,
"end_offset": 799
},
{
"id": 28944,
"label": "location",
"start_offset": 953,
"end_offset": 957
},
{
"id": 28945,
"label": "attack-pattern",
"start_offset": 974,
"end_offset": 1026
}
] | [] | [] |
4,457 | We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world. | [
{
"id": 50233,
"label": "identity",
"start_offset": 61,
"end_offset": 67
},
{
"id": 50234,
"label": "identity",
"start_offset": 79,
"end_offset": 91
},
{
"id": 50235,
"label": "identity",
"start_offset": 129,
"end_offset": 135
}
] | [] | [] |
9,872 | For the full technical analyses of all the malware, techniques, tools, MITRE ATT&CK techniques and indicators of compromise (IoCs) we found in this campaign, download the research brief, “Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data”. Tags Malware | APT & Targeted Attacks | Endpoints | Research | | [
{
"id": 30096,
"label": "location",
"start_offset": 95,
"end_offset": 98
},
{
"id": 30097,
"label": "location",
"start_offset": 148,
"end_offset": 156
},
{
"id": 30098,
"label": "threat-actor",
"start_offset": 208,
"end_offset": 212
},
{
"id": 30099,
"label": "location",
"start_offset": 262,
"end_offset": 265
},
{
"id": 30100,
"label": "location",
"start_offset": 319,
"end_offset": 322
}
] | [] | [] |
5,120 | So there is an overwhelming amount of sort of information or misinformation. | [] | [] | [] |
1,224 | More specifically, the code was separated into two parts. | [] | [] | [] |
1,935 | We’ve summarized all the mentioned findings in the table below. | [] | [] | [] |
9,060 | While we do not have any knowledge of who the actual Lazarus attackers are, the data collected from the backend systems gives us some insights into the internet usage patterns of systems likely owned by Lazarus group members. | [
{
"id": 27976,
"label": "malware",
"start_offset": 53,
"end_offset": 60
},
{
"id": 27977,
"label": "location",
"start_offset": 71,
"end_offset": 74
},
{
"id": 27978,
"label": "location",
"start_offset": 187,
"end_offset": 193
}
] | [] | [] |
539 | Since ransomware threat actors have had years to evolve their techniques, there are now several different ways for attackers to receive payments and provide the "service" they claim to offer. | [] | [] | [] |
14,389 | Endpoint security needs to step outside the endpoint silo to keep step with advanced attackers. | [] | [] | [] |
4,655 | GET http://{C2}/Index.php?vubc={identity} HTTP/1.1 | [
{
"id": 14119,
"label": "URL",
"start_offset": 4,
"end_offset": 40
}
] | [] | [] |
121 | The cloud is only one aspect of our full 1H 2021 report. | [
{
"id": 45839,
"label": "TIME",
"start_offset": 41,
"end_offset": 48
}
] | [] | [] |
5,588 | How to protect NAS devices | [] | [] | [] |
1,142 | The author simply rolled around a bit more. | [] | [] | [] |
9,743 | Figure 1. | [] | [] | [] |
10,426 | TROJ_HTV.ZJGD-A Downloads and executes TeamViewer C&C 185[.]70[.]186[.]145 | [
{
"id": 31693,
"label": "location",
"start_offset": 26,
"end_offset": 29
},
{
"id": 31694,
"label": "malware",
"start_offset": 39,
"end_offset": 49
},
{
"id": 31695,
"label": "IPV4",
"start_offset": 56,
"end_offset": 76
}
] | [] | [] |
11,945 | We terminated 2 YouTube channels as part of our investigation into coordinated influence operations linked to Moldova. | [] | [] | [] |
13,099 | As an associate member of the consortium, Trend Micro will now be able to participate in technical and strategic projects and help to shape the ROS-I roadmap. | [] | [] | [] |
13,619 | Oplib.dll side-loading | [
{
"id": 51708,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
2,113 | Situation Overview | [] | [] | [] |
14,381 | EDR is an example of how stealthy or evasive attackers can be better uncovered than with traditional endpoint protection. | [] | [] | [] |
10,258 | installing decrypt.exe – 661d4a0d877bac9b813769a85c01bce274a77b29ccbd4b71e5b92df3c425b93b gdrive.exe – cbd9cb7b69f864ce8bae983ececb7cf8627f9c17fdaba74bd39baa5cdf605f79 3fd45b9b33ff5b6363ba0013178572723b0a912deb8235a951aa3f0aa3142509 installing decrypt.exe – 661d4a0d877bac9b813769a85c01bce274a77b29ccbd4b71e5b92df3c425b93b gdrive.exe – 2060f1e108f5feb5790320c38931e3dc6c7224edf925bf6f1840351578bbf9cc Decoy File | [
{
"id": 31353,
"label": "SHA1",
"start_offset": 26,
"end_offset": 90
},
{
"id": 31354,
"label": "SHA2",
"start_offset": 104,
"end_offset": 168
},
{
"id": 31355,
"label": "SHA2",
"start_offset": 170,
"end_offset": 234
},
{
"id": 31356,
"label": "SHA2",
"start_offset": 261,
"end_offset": 325
},
{
"id": 31357,
"label": "SHA1",
"start_offset": 339,
"end_offset": 403
},
{
"id": 31358,
"label": "location",
"start_offset": 405,
"end_offset": 410
}
] | [] | [] |
2,473 | The lack of webshell functionality suggests that this is likely uploaded by scanners attempting to discover servers vulnerable to SpringShell. | [
{
"id": 47545,
"label": "attack-pattern",
"start_offset": 12,
"end_offset": 20
},
{
"id": 47546,
"label": "vulnerability",
"start_offset": 130,
"end_offset": 141
}
] | [] | [] |