Remote detection of a user's AV using Flash
Tags
attack-pattern: | Domains - T1583.001 Domains - T1584.001 Malware - T1587.001 Malware - T1588.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 |
Common Information
Type | Value |
---|---|
UUID | 88e92e6e-40c7-4aec-834e-9c2f61bb834d |
Fingerprint | 9df2a3cad9124cc3 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | June 17, 2016, 10:55 a.m. |
Added to db | Jan. 18, 2023, 7:31 p.m. |
Last updated | Nov. 18, 2024, 3:30 p.m. |
Headline | GreenDog's blog |
Title | Remote detection of a user's AV using Flash |
Detected Hints/Tags/Attributes | 19/1/9 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | www.linshunghuang.com |
|
Details | Domain | 4134 | github.com |
|
Details | Domain | 1 | dbggl.pw |
|
Details | File | 1 | mitm.pdf |
|
Details | File | 1 | flashav.swf |
|
Details | Github username | 2 | grrrdog |
|
Details | Url | 1 | https://www.linshunghuang.com/papers/mitm.pdf |
|
Details | Url | 1 | https://github.com/grrrdog/flashav. |
|
Details | Url | 1 | https://dbggl.pw/flashav.swf |