Threat Intelligence of Abused Public Post-Exploitation Frameworks
Common Information
Type | Value |
---|---|
UUID | ad4fd386-4857-44de-9ce5-50059ed12f49 |
Fingerprint | 950fd390bbd83f30ac1eab0b2bd433a797190c93e248b55d7f585652cb0af1bf |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Jan. 18, 2024, 4:16 p.m. |
Added to db | March 12, 2024, 8:13 p.m. |
Last updated | Aug. 31, 2024, 8:33 a.m. |
Headline | Threat Intelligence of Abused Public Post-Exploitation Frameworks |
Title | Threat Intelligence of Abused Public Post-Exploitation Frameworks |
Detected Hints/Tags/Attributes | 0/0/35 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 2 | cve-2016-9192 |
|
Details | Domain | 360 | attack.mitre.org |
|
Details | Domain | 112 | docs.google.com |
|
Details | Domain | 7 | jp.security.ntt |
|
Details | Domain | 144 | www.fortinet.com |
|
Details | Domain | 83 | cert.gov.ua |
|
Details | Domain | 26 | www.lac.co.jp |
|
Details | Domain | 189 | asec.ahnlab.com |
|
Details | Domain | 4127 | github.com |
|
Details | Domain | 2 | consoleinput.cc |
|
Details | Domain | 2 | koadic.shell |
|
Details | Domain | 2 | koadic.ws.run |
|
Details | Domain | 3 | payloads.py |
|
Details | Domain | 2 | value.read |
|
Details | Domain | 291 | raw.githubusercontent.com |
|
Details | Domain | 339 | system.net |
|
Details | Domain | 285 | microsoft.net |
|
Details | File | 2 | 20190213_001770.html |
|
Details | File | 2125 | cmd.exe |
|
Details | File | 2 | specialfolder.sys |
|
Details | File | 2 | handleshell.cs |
|
Details | File | 1018 | rundll32.exe |
|
Details | File | 459 | regsvr32.exe |
|
Details | File | 240 | wmic.exe |
|
Details | File | 2 | consoleinput.cpp |
|
Details | File | 33 | shell.exe |
|
Details | File | 2 | stdlib.js |
|
Details | File | 2 | exec_cmd.js |
|
Details | File | 1208 | powershell.exe |
|
Details | File | 2 | launcher_bat.py |
|
Details | File | 2 | %s%spayload.txt |
|
Details | File | 2 | self.psd |
|
Details | File | 2 | %s%spayload.bat |
|
Details | File | 2 | payloads.py |
|
Details | File | 2 | handlesendto.cs |