Creating a Stealthy Backdoor .Exe and How to Detect If Your PC Has Been Hacked!
Tags
attack-pattern: | Malware - T1587.001 Malware - T1588.001 Powershell - T1059.001 Server - T1583.004 Server - T1584.004 Tool - T1588.002 Powershell - T1086 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | 041a1fd5-a861-45ce-a548-449d6c0a4953 |
Fingerprint | 1e8b395b1aa4a5a1 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Oct. 20, 2024, 4:36 p.m. |
Added to db | Oct. 20, 2024, 7:28 p.m. |
Last updated | Nov. 17, 2024, 6:55 p.m. |
Headline | Creating a Stealthy Backdoor .Exe and How to Detect If Your PC Has Been Hacked! |
Title | Creating a Stealthy Backdoor .Exe and How to Detect If Your PC Has Been Hacked! |
Detected Hints/Tags/Attributes | 36/1/9 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 166 | ✔ | Backdoor on Medium | https://medium.com/feed/tag/backdoor | 2024-08-30 22:08 |
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |