Common Information
Type Value
Value
acrord32.exe
Category
Type File
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2024-10-26 13 ALERT: SOC140 — Phishing Mail Detected — Suspicious Task Scheduler
Details Website 2024-06-07 36 Kimsuky is targeting an arms manufacturer in Europe.
Details Website 2023-12-13 426 Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Introduction
Details Pdf 2023-11-09 1572 Modern Asian APT Groups
Details Website 2022-09-26 231 Unresponsive Behaving Strangely And 3 Unauthorized Banking Deposits Attempts - Virus, Trojan, Spyware, and Malware Removal Help
Details Pdf 2022-06-23 545 Common TTPs of modern ransomware groups
Details Website 2022-05-25 80 Tandem Espionage | InQuest
Details Website 2021-04-19 9 Threat Hunting for Dridex Attacks: Red Canary & Carbon Black
Details Pdf 2020-08-12 107 Chinese State-Sponsored Group 'RedDelta' Targets the Vatican and Catholic Organizations
Details Pdf 2020-07-28 106 Chinese State-Sponsored Group 'RedDelta' Targets the Vatican and Catholic Organizations
Details Website 2020-06-04 47 New LNK attack tied to Higaisa APT discovered | Malwarebytes Labs
Details Website 2019-10-25 20 Using Expert Rules in ENS to Prevent Malicious Exploits | McAfee Blog
Details Website 2019-07-24 47 Chinese APT “Operation LagTime IT” Targets Government Information Technology Agencies in Eastern Asia | Proofpoint US
Details Website 2019-02-04 30 ExileRAT shares C2 with LuckyCat, targets Tibet
Details Website 2018-12-12 74 50 CVEs in 50 Days: Fuzzing Adobe Reader - Check Point Research
Details Website 2018-07-30 33 Threat Hunting: Fine Tuning Sysmon & Logstash to find Malware Callbacks C&C - Syspanda
Details Website 2018-07-05 318 To crypt, or to mine – that is the question
Details Website 2018-05-21 9 Adobe, Me and an Arbitrary Free :: Analyzing the CVE-2018-4990 Zero-Day Exploit
Details Website 2018-04-04 58 Smoking Out the Rarog Cryptocurrency Mining Trojan
Details Pdf 2018-01-24 21 Real-Time Detection of Malware Downloads via Large-Scale URL¬File¬Machine Graph Mining
Details Pdf 2016-12-24 106 THE ELEPHANT IN THE ROOM
Details Website 2016-04-26 11 Detection of Squiblydoo COM+ Whitelist Bypassing with ECAT
Details Website 2016-03-16 174 Jump List Forensics: AppID Master List (400+ AppIDs)
Details Website 2015-08-21 6 One font vulnerability to rule them all #4: Windows 8.1 64-bit sandbox escape exploitation
Details Website 2015-08-13 8 One font vulnerability to rule them all #3: Windows 8.1 32-bit sandbox escape exploitation