Common Information
Type | Value |
---|---|
Value |
dd.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-09-29 | 98 | Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East | ||
Details | 2017-12-04 | 90 | Targeted Attacks Detection With SPuNge | |||
Details | Website | 2016-10-15 | 33 | Hexacorn | Blog Threat Hunting – A Tale of Wishful Thinking and Willful Ignorance … | ||
Details | Website | 2016-01-05 | 170 | 12 Days of HaXmas: Beginner Threat Intelligence with Honeypots | Rapid7 Blog | ||
Details | 2014-03-12 | 41 | Uroburos: the snake rootkit | |||
Details | Website | 2011-01-04 | 5 | Accessing Volume Shadow Copies | ||
Details | Website | 2009-11-18 | 3 | Working with Volume Shadow Copies | ||
Details | Website | 2009-01-06 | 19 | Memory Collection and Analysis Tools | ||
Details | Website | 2008-08-16 | 4 | Linking Processes to Users | ||
Details | Website | 2006-08-03 | 1 | What is "forensically sound"? |