Running the Labyrenth: Unit 42 CTF
Tags
attack-pattern: | Data Python - T1059.006 Server - T1583.004 Server - T1584.004 Tool - T1588.002 Brute Force - T1110 |
Common Information
Type | Value |
---|---|
UUID | c307d51e-a50d-4718-822c-e22b211d2574 |
Fingerprint | 203bcb51aba5077a |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Aug. 16, 2016, 2:10 p.m. |
Added to db | Jan. 19, 2023, 12:10 a.m. |
Last updated | Nov. 16, 2024, 10:14 a.m. |
Headline | Ghetto Forensics |
Title | Running the Labyrenth: Unit 42 CTF |
Detected Hints/Tags/Attributes | 42/1/12 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | http://www.ghettoforensics.com/2016/08/running-labyrenth-unit-42-ctf.html |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | oledir.py |
|
Details | Domain | 9 | decalage.info |
|
Details | Domain | 9 | olevba.py |
|
Details | File | 1 | antid.exe |
|
Details | File | 1 | oledir.py |
|
Details | File | 1 | calc.xls |
|
Details | File | 12 | decalage.inf |
|
Details | File | 9 | olevba.py |
|
Details | File | 1 | repsych.asm |
|
Details | File | 79 | file.txt |
|
Details | md5 | 1 | 31211332133221321332133221321332 |
|
Details | Url | 7 | http://decalage.info/python/oletools |