Common Information
Type | Value |
---|---|
Value |
acrord32.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-26 | 13 | ALERT: SOC140 — Phishing Mail Detected — Suspicious Task Scheduler | ||
Details | Website | 2024-06-07 | 36 | Kimsuky is targeting an arms manufacturer in Europe. | ||
Details | Website | 2023-12-13 | 426 | Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Introduction | ||
Details | 2023-11-09 | 1572 | Modern Asian APT Groups | |||
Details | Website | 2022-09-26 | 231 | Unresponsive Behaving Strangely And 3 Unauthorized Banking Deposits Attempts - Virus, Trojan, Spyware, and Malware Removal Help | ||
Details | 2022-06-23 | 545 | Common TTPs of modern ransomware groups | |||
Details | Website | 2022-05-25 | 80 | Tandem Espionage | InQuest | ||
Details | Website | 2021-04-19 | 9 | Threat Hunting for Dridex Attacks: Red Canary & Carbon Black | ||
Details | 2020-08-12 | 107 | Chinese State-Sponsored Group 'RedDelta' Targets the Vatican and Catholic Organizations | |||
Details | 2020-07-28 | 106 | Chinese State-Sponsored Group 'RedDelta' Targets the Vatican and Catholic Organizations | |||
Details | Website | 2020-06-04 | 47 | New LNK attack tied to Higaisa APT discovered | Malwarebytes Labs | ||
Details | Website | 2019-10-25 | 20 | Using Expert Rules in ENS to Prevent Malicious Exploits | McAfee Blog | ||
Details | Website | 2019-07-24 | 47 | Chinese APT “Operation LagTime IT” Targets Government Information Technology Agencies in Eastern Asia | Proofpoint US | ||
Details | Website | 2019-02-04 | 30 | ExileRAT shares C2 with LuckyCat, targets Tibet | ||
Details | Website | 2018-12-12 | 74 | 50 CVEs in 50 Days: Fuzzing Adobe Reader - Check Point Research | ||
Details | Website | 2018-07-30 | 33 | Threat Hunting: Fine Tuning Sysmon & Logstash to find Malware Callbacks C&C - Syspanda | ||
Details | Website | 2018-07-05 | 318 | To crypt, or to mine – that is the question | ||
Details | Website | 2018-05-21 | 9 | Adobe, Me and an Arbitrary Free :: Analyzing the CVE-2018-4990 Zero-Day Exploit | ||
Details | Website | 2018-04-04 | 58 | Smoking Out the Rarog Cryptocurrency Mining Trojan | ||
Details | 2018-01-24 | 21 | Real-Time Detection of Malware Downloads via Large-Scale URL¬File¬Machine Graph Mining | |||
Details | 2016-12-24 | 106 | THE ELEPHANT IN THE ROOM | |||
Details | Website | 2016-04-26 | 11 | Detection of Squiblydoo COM+ Whitelist Bypassing with ECAT | ||
Details | Website | 2016-03-16 | 174 | Jump List Forensics: AppID Master List (400+ AppIDs) | ||
Details | Website | 2015-08-21 | 6 | One font vulnerability to rule them all #4: Windows 8.1 64-bit sandbox escape exploitation | ||
Details | Website | 2015-08-13 | 8 | One font vulnerability to rule them all #3: Windows 8.1 32-bit sandbox escape exploitation |