Windows Exploitation: wmic - Hacking Articles
Tags
Common Information
Type | Value |
---|---|
UUID | 970d085a-598e-4653-b210-393155687be4 |
Fingerprint | e6689b9115a50dd7 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Jan. 23, 2019, 8:31 a.m. |
Added to db | Jan. 18, 2023, 11:21 p.m. |
Last updated | Nov. 17, 2024, 6:54 p.m. |
Headline | Hacking Articles |
Title | Windows Exploitation: wmic - Hacking Articles |
Detected Hints/Tags/Attributes | 36/2/14 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 20 | www.hackingarticles.in |
|
Details | File | 240 | wmic.exe |
|
Details | File | 1 | g8gkv.xsl |
|
Details | File | 1 | launcher.xsl |
|
Details | File | 456 | mshta.exe |
|
Details | File | 1 | payload.xsl |
|
Details | IPv4 | 18 | 192.168.1.107 |
|
Details | IPv4 | 6 | 192.168.1.109 |
|
Details | Url | 3 | https://www.hackingarticles.in/koadic-com-command-control-framework |
|
Details | Url | 1 | http://192.168.1.107:9996/g8gkv.xsl |
|
Details | Url | 2 | https://www.hackingarticles.in/hacking-with-empire-powershell-post-exploitation-agent |
|
Details | Url | 1 | http://192.168.1.107 |
|
Details | Url | 1 | http://192.168.1.107:8080/launcher.xsl |
|
Details | Url | 1 | http://192.168.1.109/payload.xsl |