Threat Intelligence of Abused Public Post-Exploitation Frameworks
Image Description
Common Information
Type Value
UUID ad4fd386-4857-44de-9ce5-50059ed12f49
Fingerprint 950fd390bbd83f30ac1eab0b2bd433a797190c93e248b55d7f585652cb0af1bf
Analysis status DONE
Considered CTI value 0
Text language
Published Jan. 18, 2024, 4:16 p.m.
Added to db March 12, 2024, 8:13 p.m.
Last updated Aug. 31, 2024, 8:33 a.m.
Headline Threat Intelligence of Abused Public Post-Exploitation Frameworks
Title Threat Intelligence of Abused Public Post-Exploitation Frameworks
Detected Hints/Tags/Attributes 0/0/35
Attributes
Details Type #Events CTI Value
Details CVE 2
cve-2016-9192
Details Domain 360
attack.mitre.org
Details Domain 112
docs.google.com
Details Domain 7
jp.security.ntt
Details Domain 144
www.fortinet.com
Details Domain 83
cert.gov.ua
Details Domain 26
www.lac.co.jp
Details Domain 189
asec.ahnlab.com
Details Domain 4127
github.com
Details Domain 2
consoleinput.cc
Details Domain 2
koadic.shell
Details Domain 2
koadic.ws.run
Details Domain 3
payloads.py
Details Domain 2
value.read
Details Domain 291
raw.githubusercontent.com
Details Domain 339
system.net
Details Domain 285
microsoft.net
Details File 2
20190213_001770.html
Details File 2125
cmd.exe
Details File 2
specialfolder.sys
Details File 2
handleshell.cs
Details File 1018
rundll32.exe
Details File 459
regsvr32.exe
Details File 240
wmic.exe
Details File 2
consoleinput.cpp
Details File 33
shell.exe
Details File 2
stdlib.js
Details File 2
exec_cmd.js
Details File 1208
powershell.exe
Details File 2
launcher_bat.py
Details File 2
%s%spayload.txt
Details File 2
self.psd
Details File 2
%s%spayload.bat
Details File 2
payloads.py
Details File 2
handlesendto.cs