Common Information
Type | Value |
---|---|
Value |
ekrn.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2020-04-03 | 44 | Zoomed In: A Look into a Coinminer Bundled with Zoom Installer | ||
Details | Website | 2020-04-03 | 44 | Zoomed In: A Look into a Coinminer Bundled with Zoom Installer | ||
Details | Website | 2019-08-19 | 122 | Uncovering a MyKings Variant Via MDR | ||
Details | 2019-08-14 | 367 | Silence 2.0: Going Global | |||
Details | 2019-08-14 | 362 | Silence 2.0 Going Global | |||
Details | 2018-08-23 | 110 | “狼毒草”APT 组织—持续多年的定 向攻击威胁 | |||
Details | Website | 2018-07-05 | 318 | To crypt, or to mine – that is the question | ||
Details | 2018-06-25 | 117 | UNKNOWN | |||
Details | Website | 2018-03-05 | 55 | GandCrab-2 | ||
Details | Website | 2018-02-08 | 63 | GandCrab Ransomware Distribution Begins in Korea - ASEC BLOG | ||
Details | Website | 2017-01-20 | 30 | Analyzing KillDisk Ransomware, Part 1: Whitelisting | McAfee Blog | ||
Details | Website | 2016-10-11 | 389 | VenisRansomware - Pastebin.com | ||
Details | Website | 2016-06-18 | 32 | CVE-2014-6352漏洞及定向攻击样本分析 – 8090安全门户 | ||
Details | 2015-07-08 | 341 | Word Template | |||
Details | Website | 2015-06-23 | 14 | Analysis and Exploitation of an ESET Vulnerability | ||
Details | 2015-04-24 | 164 | Operation Tropic Trooper: Relying on Tried-and-Tested Flaws to Infiltrate Secret Keepers | |||
Details | 2014-09-15 | 176 | VB2014-proceedings.indb | |||
Details | 2014-07-03 | 119 | CosmicDuke: Cosmu with a twist of MiniDuke | |||
Details | Website | 2013-03-14 | 38 | New Exploit Kit, Ransomware and AV evasion | Malwarebytes Labs | ||
Details | Website | 2012-05-29 | 1126 | Hexacorn | Blog Quick look at… | ||
Details | 2011-11-23 | 112 | W32.Duqu | |||
Details | 2011-10-20 | 74 | report_pubv2 | |||
Details | 2011-07-11 | 66 | W32.Stuxnet Dossier | |||
Details | Website | 2011-01-31 | 297 | The Honeypot Incident – How strong is your UF (Reversing FU) | Corelan Cybersecurity Research | ||
Details | 2011-01-03 | 280 | Stuxnet Under the Microscope |