银狐最新攻击样本使用MSC文件传播 | CTF导航
Tags
Common Information
Type | Value |
---|---|
UUID | 1042ab55-a693-4874-ba39-8a9c80832587 |
Fingerprint | 1b3c934d5b244a24 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Sept. 10, 2024, midnight |
Added to db | Sept. 13, 2024, 2:49 a.m. |
Last updated | Nov. 16, 2024, 11:18 a.m. |
Headline | 银狐最新攻击样本使用MSC文件传播 |
Title | 银狐最新攻击样本使用MSC文件传播 | CTF导航 |
Detected Hints/Tags/Attributes | 0/0/17 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.ctfiot.com/204890.html |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 426 | ✔ | CTF导航 | https://www.ctfiot.com/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 83 | xz.aliyun.com |
|
Details | Domain | 1 | comc0m.com |
|
Details | File | 1 | 从网上下载0day.xsl |
|
Details | File | 1 | 0day.xsl |
|
Details | File | 1 | 解压缩py.zip |
|
Details | File | 2 | 下载的ps1.txt |
|
Details | File | 2 | wd.exe |
|
Details | File | 2 | 调用bandizip.exe |
|
Details | File | 2 | 解压缩code.7z |
|
Details | File | 2 | 通过python调用恶意python脚本code.jpg |
|
Details | File | 1 | code.jpg |
|
Details | File | 1 | 233.bin |
|
Details | File | 2 | 同时删除code.jpg |
|
Details | IPv4 | 1 | 118.107.42.233 |
|
Details | Url | 1 | https://xz.aliyun.com/t/15520先知社区 |
|
Details | Url | 1 | https://xz.aliyun.com/t/15520 |
|
Details | Url | 1 | http://comc0m.com/dan/118.107.42.233.bin |