Common Information
Type | Value |
---|---|
Value |
regsvr32.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-07 | 19 | Rolling your own home lab | ||
Details | Website | 2024-10-23 | 6 | PebbleDash와 RDP Wrapper를 악용한 Kimsuky 그룹의 최신 공격 사례 분석 - ASEC | ||
Details | Website | 2024-10-18 | 7 | New Bumblebee Loader Infection Chain Signals Possible Resurgence | ||
Details | Website | 2024-10-08 | 2 | CyberSecLabs — “Imposter” Walkthrough | ||
Details | Website | 2024-10-06 | 7 | Hunting for malicious scheduled tasks - Threat hunting with hints of incident response | ||
Details | 2024-09-30 | 78 | Global Threat Report | |||
Details | Website | 2024-09-30 | 33 | MDR in Action: Preventing The More_eggs Backdoor From Hatching | ||
Details | Website | 2024-09-26 | 52 | Storm-0501: Ransomware attacks expanding to hybrid cloud environments | ||
Details | Website | 2024-09-26 | 50 | Storm-0501: Ransomware attacks expanding to hybrid cloud environments | Microsoft Security Blog | ||
Details | Website | 2024-08-12 | 4 | Black Basta Ransomware and Threat Group | ||
Details | Website | 2024-08-12 | 5 | Qakbot | ||
Details | 2024-07-16 | 47 | Kimsuky’s Phishing and Payload Tactics | |||
Details | 2024-07-04 | 66 | Defending Against OS Credential Dumping: Threat Landscape, Strategies, and Best Practices | |||
Details | Website | 2024-06-20 | 48 | 疑似Kimsuky (APT-Q-2) 以军工招聘为饵攻击欧洲 | ||
Details | Website | 2024-06-04 | 43 | UNC1151 Strikes Again: Unveiling Their Tactics Against Ukraine's Ministry Of Defence - Cyble | ||
Details | 2024-05-31 | 166 | Emerging Threat: Inside Forest Blizzard's New Arsenal | |||
Details | 2024-04-29 | 336 | Bitdefender-Report-Confidential-DeepDive-creat7721-en_EN | |||
Details | Website | 2024-04-29 | 77 | Zloader: No Longer Silent in the Night | ||
Details | Website | 2024-04-24 | 180 | [QuickNote] Qakbot 5.0 – Decrypt strings and configuration | ||
Details | Website | 2024-04-22 | 43 | Nazar: A Lost Amulet — The Lost Reports | ||
Details | Website | 2024-04-01 | 124 | From OneNote to RansomNote: An Ice Cold Intrusion | ||
Details | 2024-03-13 | 283 | THREAT | |||
Details | Website | 2024-03-12 | 23 | Kimsuky 3 | ||
Details | 2024-03-05 | 207 | A Comprehensive Overview on Stealer Malware Families | |||
Details | Website | 2024-03-03 | 24 | Dissecting a Java Pikabot Dropper |