PowerPoint Presentation
Common Information
Type | Value |
---|---|
UUID | f0a8ddb4-26c7-49ff-8af5-c38b20c4c422 |
Fingerprint | a1cc357191dd2e683f5296deae2f77a273617d76cf96e06447a2b249a3c1d1c0 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Nov. 16, 2022, 8:28 p.m. |
Added to db | Feb. 7, 2024, 6:47 p.m. |
Last updated | Aug. 31, 2024, 7:28 a.m. |
Headline | PowerPoint Presentation |
Title | PowerPoint Presentation |
Detected Hints/Tags/Attributes | 92/4/48 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 72 | symantec-enterprise-blogs.security.com |
|
Details | Domain | 280 | thehackernews.com |
|
Details | Domain | 251 | www.bleepingcomputer.com |
|
Details | Domain | 55 | otx.alienvault.com |
|
Details | Domain | 435 | www.hivepro.com |
|
Details | File | 1 | researchers-say-china-state-backed.html |
|
Details | md5 | 1 | d1b36aee7dc8cefe6101fe2fb7b9c544 |
|
Details | md5 | 1 | cfa7954722d4277d26e96edc3289a4ce |
|
Details | md5 | 1 | 8334f346585aa27ac6ae86e5adcaefa2 |
|
Details | md5 | 1 | 585fa6ba755facc1c3e2960f1c3f2c41 |
|
Details | md5 | 1 | 550f2d43320bbc8cf6e2faf71ae37c2e |
|
Details | md5 | 1 | 415b5faf53231dee903f2b8c0a5b8e19 |
|
Details | md5 | 1 | 23f361930d778a1f63c53dc36cd62d6c |
|
Details | md5 | 1 | 03fa6a2e8e779644dfd612d61e1e8769 |
|
Details | sha1 | 1 | da3f6926c2c7ef05334f5da2769cffb4631bfde7 |
|
Details | sha1 | 1 | a3d91de52447cba8fafb57e0679566fc0665401b |
|
Details | sha1 | 1 | 90b73ba3433b68f5038c5150723cde4083acfe71 |
|
Details | sha1 | 1 | 5ddce7c83d7ef1bee41cb66e147993ea08aea6f7 |
|
Details | sha1 | 1 | 2e1b8f65bf87430b736cf1e7fbc58b1a95be23d3 |
|
Details | sha1 | 1 | 26144e553b64ba64bfe8a3446de0f110f6b718db |
|
Details | sha1 | 1 | 17502da3da751ee7e3f777d859c5d142ca113fcc |
|
Details | sha1 | 1 | 0e26f2b3d70b5153ea10ef513a4211a6a8a8f6ba |
|
Details | MITRE ATT&CK Techniques | 542 | T1190 |
|
Details | MITRE ATT&CK Techniques | 152 | T1090 |
|
Details | MITRE ATT&CK Techniques | 116 | T1134 |
|
Details | MITRE ATT&CK Techniques | 627 | T1027 |
|
Details | MITRE ATT&CK Techniques | 168 | T1046 |
|
Details | MITRE ATT&CK Techniques | 157 | T1560 |
|
Details | MITRE ATT&CK Techniques | 122 | T1543 |
|
Details | MITRE ATT&CK Techniques | 197 | T1489 |
|
Details | MITRE ATT&CK Techniques | 695 | T1059 |
|
Details | MITRE ATT&CK Techniques | 333 | T1059.003 |
|
Details | MITRE ATT&CK Techniques | 235 | T1562 |
|
Details | MITRE ATT&CK Techniques | 70 | T1562.004 |
|
Details | MITRE ATT&CK Techniques | 56 | T1587 |
|
Details | MITRE ATT&CK Techniques | 96 | T1587.001 |
|
Details | MITRE ATT&CK Techniques | 243 | T1018 |
|
Details | MITRE ATT&CK Techniques | 245 | T1016 |
|
Details | MITRE ATT&CK Techniques | 504 | T1140 |
|
Details | MITRE ATT&CK Techniques | 56 | T1553 |
|
Details | MITRE ATT&CK Techniques | 6 | T1553.004 |
|
Details | MITRE ATT&CK Techniques | 492 | T1105 |
|
Details | Threat Actor Identifier by Thales | 2 | ATK 1 |
|
Details | Threat Actor Identifier by Thales | 2 | ATK 78 |
|
Details | Url | 1 | https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage- |
|
Details | Url | 1 | https://thehackernews.com/2022/11/researchers-say-china-state-backed.html |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/chinese-hackers-target- |
|
Details | Url | 1 | https://otx.alienvault.com/pulse/6373c57769f0990a421696db |