BROKERS IN THE SHADOWS – Part 2: Analyzing Petya’s DoublePulsarV2.0 Backdoor - Check Point Software
Tags
attack-pattern: | Data Exploits - T1587.004 Exploits - T1588.005 Python - T1059.006 Software - T1592.002 |
Common Information
Type | Value |
---|---|
UUID | c3088962-b3b5-4895-93f1-9f1eacb469c2 |
Fingerprint | 62dfdd114425b203 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | July 3, 2017, midnight |
Added to db | Jan. 18, 2023, 8:17 p.m. |
Last updated | Nov. 15, 2024, 6:44 a.m. |
Headline | BROKERS IN THE SHADOWS – Part 2: Analyzing Petya’s DoublePulsarV2.0 Backdoor |
Title | BROKERS IN THE SHADOWS – Part 2: Analyzing Petya’s DoublePulsarV2.0 Backdoor - Check Point Software |
Detected Hints/Tags/Attributes | 47/1/4 |
Source URLs
URL Provider