Common Information
Type | Value |
---|---|
Value |
c:\windows\system32\services.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-14 | 39 | Blinded by Silence | ||
Details | Website | 2024-10-06 | 30 | Trojan:Win64/Zusy.CZ!MTB Virus Analysis & Easy Fix Ways – | ||
Details | Website | 2024-10-01 | 29 | What is Trojan:Win32/LsassDump.A Virus? Remove Now – | ||
Details | Website | 2024-09-13 | 143 | THM Metasploit Meterpreter | ||
Details | Website | 2024-09-11 | 24 | Trojan:Win32/Leonem – Gridinsoft Blogs | ||
Details | Website | 2024-05-24 | 23 | Detection Engineering :: Velociraptor - Digging deeper! | ||
Details | Website | 2023-12-13 | 426 | Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Introduction | ||
Details | 2023-11-09 | 1572 | Modern Asian APT Groups | |||
Details | Website | 2023-09-25 | 206 | From ScreenConnect to Hive Ransomware in 61 hours - The DFIR Report | ||
Details | Website | 2023-05-24 | 4 | How to stop attacks from network? - Virus, Trojan, Spyware, and Malware Removal Help | ||
Details | Website | 2023-04-05 | 15 | Detecting Named Pipe Token Impersonation Abuse | ||
Details | Website | 2022-07-20 | 62 | OODA: X-Ops Takes On Burgeoning SQL Server Attacks | ||
Details | Website | 2022-02-21 | 89 | Qbot and Zerologon Lead To Full Domain Compromise | ||
Details | Website | 2021-11-08 | 28 | Detecting CONTI CobaltStrike Lateral Movement Techniques - Part 1 - CYB3RSN0RLAX | ||
Details | Website | 2020-10-16 | 6 | Second Zerologon attacker seen exploiting internet honeypot | ||
Details | Website | 2017-04-11 | 22 | Chronicles of a Threat Hunter: Hunting for Remotely Executed Code via Services & Lateral Movement with Sysmon, Win Event Logs, and ELK | ||
Details | 2014-03-11 | 482 | Malware Memory Analysis for Non-Specialists: Investigating Publicly Available Memory Image for the Stuxnet Worm | |||
Details | 2013-03-27 | 163 | APT1: technical backstage | |||
Details | Website | 2012-12-11 | 14 | Extracting ZeroAccess from NTFS Extended Attributes | ||
Details | Website | 2011-09-15 | 158 | Неиллюзорно поражён | ||
Details | Website | 2011-05-16 | 66 | Dumping Hashes on Win2k8 R2 x64 with Metasploit :: malicious.link — welcome | ||
Details | Website | 2009-08-12 | 25 | Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics | Corelan Cybersecurity Research | ||
Details | — | 216 | Microsoft Word - FTA 1009 - njRAT Uncovered_rev2 |