15 Ways to Download a File
Tags
attack-pattern: | Powershell - T1059.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Visual Basic - T1059.005 Tool - T1588.002 Powershell - T1086 Scripting - T1064 Scripting |
Common Information
Type | Value |
---|---|
UUID | 93f286e8-462c-470c-97ad-abbce05ad737 |
Fingerprint | 25cbb952053713a3 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | June 16, 2014, 7 a.m. |
Added to db | Jan. 18, 2023, 8:37 p.m. |
Last updated | Nov. 18, 2024, 1:38 a.m. |
Headline | 15 Ways to Download a File |
Title | 15 Ways to Download a File |
Detected Hints/Tags/Attributes | 49/1/23 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://blog.netspi.com/15-ways-to-download-a-file/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 74 | adodb.stream |
|
Details | Domain | 7 | xhttp.open |
|
Details | Domain | 3 | test.pl |
|
Details | Domain | 22 | test.py |
|
Details | Domain | 831 | example.com |
|
Details | Domain | 198 | youtube.com |
|
Details | File | 5 | test.ps1 |
|
Details | File | 46 | microsoft.xml |
|
Details | File | 1 | test.vbs |
|
Details | File | 6 | test.pl |
|
Details | File | 24 | test.py |
|
Details | File | 55 | test.php |
|
Details | File | 1 | texttoexe.ps1 |
|
Details | File | 1 | exetotext.ps1 |
|
Details | File | 24 | evil.exe |
|
Details | File | 4 | evil.txt |
|
Details | File | 59 | csc.exe |
|
Details | File | 2127 | cmd.exe |
|
Details | File | 1 | tempusers.txt |
|
Details | File | 1 | evilevil.exe |
|
Details | File | 1 | evilevil.cs |
|
Details | IPv4 | 1441 | 127.0.0.1 |
|
Details | Url | 1 | https://example.com/file |