Timelining a Malicious VHD for More Intelligence
Tags
attack-pattern: | Data Malware - T1587.001 Malware - T1588.001 Screensaver - T1546.002 Tool - T1588.002 Screensaver - T1180 |
Common Information
Type | Value |
---|---|
UUID | 05dcd923-9821-4627-a56d-75d90cca58fa |
Fingerprint | a4309a6aaee78685 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Aug. 4, 2023, midnight |
Added to db | Nov. 6, 2023, 8:08 p.m. |
Last updated | Nov. 7, 2024, 9:47 p.m. |
Headline | Timelining a Malicious VHD for More Intelligence |
Title | Timelining a Malicious VHD for More Intelligence |
Detected Hints/Tags/Attributes | 30/1/15 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://forensicitguy.github.io/timelining-malware-vhd-intelligence/ |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 124 | ✔ | Tony Lambert | https://forensicitguy.github.io/feed.xml | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 93 | bazaar.abuse.ch |
|
Details | Domain | 2 | plaso.readthedocs.io |
|
Details | Domain | 5 | log2timeline.py |
|
Details | Domain | 1 | psteal.py |
|
Details | File | 1 | installing-with-docker.html |
|
Details | File | 5 | log2timeline.py |
|
Details | File | 1 | psteal.py |
|
Details | File | 9 | timeline.csv |
|
Details | File | 31 | invoice.pdf |
|
Details | File | 1 | invoice-hopeislost.js |
|
Details | md5 | 1 | ad9d11227a86b863e31ddf6019cc7ab5 |
|
Details | md5 | 22 | f34d5f2d4577ed6d9ceec516c1f5a744 |
|
Details | sha256 | 1 | 72ba4bd27c5d95912ac5e572849f0aaf56c5873e03f5596cb82e56ac879e3614 |
|
Details | Url | 1 | https://bazaar.abuse.ch/sample/72ba4bd27c5d95912ac5e572849f0aaf56c5873e03f5596cb82e56ac879e3614/. |
|
Details | Url | 1 | https://plaso.readthedocs.io/en/latest/sources/user/installing-with-docker.html |