403 Forbidden
Tags
Common Information
Type Value
UUID ccce0343-1d32-44fa-92b0-44e8b3381148
Fingerprint 14577c2bba4a43e0
Analysis status DONE
Considered CTI value 0
Text language
Published None
Added to db Jan. 18, 2023, 11:22 p.m.
Last updated Aug. 31, 2024, 11:06 p.m.
Headline Forbidden
Title 403 Forbidden
Detected Hints/Tags/Attributes 1/0/0
Source URLs
Redirection Url
Details Source http://www.clearskysec.com/wp-content/uploads/2016/06/Operation-DustySky2_-6.2016_TLP_White.pdf
Details Source http://www.clearskysec.com/wp-content/uploads/2017/07/Operation%20Wilted%20Tulip.pdf
Details Source http://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf
Details Source http://www.clearskysec.com/wp-content/uploads/2017/12/Charming%20Kitten%202017.pdf
Details Source http://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf
Details Source https://darksidedxcftmqa.onion.foundation/
Details Source https://hybrid-analysis.com/sample/309d6cd27991b14cffe004ffbf3844dec6e050e2ed1604558627fa3077599032
Details Source https://hybrid-analysis.com/sample/9111dabc35d3540fa4dcc9d1d14b1d7d9af5cdc095853a851b699f000f1a0ccf
Details Source https://hybrid-analysis.com/sample/aed949d4f06c32ef291a8e9a17eb33b8a253838194144157e28596e03576d9a9?environmentId=120
Details Source https://hybrid-analysis.com/sample/af52141206b33929b062784f02d56dd188d5d975f49ea17a5cc81824cdfda845
Details Source https://hybrid-analysis.com/sample/bb7238944240e9eeee1371e1970cbd5d7697180b0ba1436ef7e62da3d97438db?environmentId=100
Details Source https://hybrid-analysis.com/sample/e4ccdbdc2c12bf2ee8c38e4ce5f12f5069d9f7ba525d9987ac0b2da4e3305b68
Details Source https://hybrid-analysis.com/sample/f8991e3f7b524edc26a64543b57dd3f7cd69a2f8b04ce934d9334bf8ade8b396
Details Source https://thisissecurity.stormshield.com/2014/08/20/poweliks-command-line-confusion/
Details Source https://thisissecurity.stormshield.com/2015/09/30/when-elf-billgates-met-windows/
Details Source https://thisissecurity.stormshield.com/2017/10/19/attacking-co-hosted-vm-hacker-hammer-two-memory-modules/
Details Source https://thisissecurity.stormshield.com/2018/01/12/agent-tesla-campaign/
Details Source https://thisissecurity.stormshield.com/2018/03/20/de-obfuscating-jump-chains-with-binary-ninja/
Details Source https://thisissecurity.stormshield.com/2018/03/29/in-depth-formbook-malware-analysis-obfuscation-and-process-injection/
Details Source https://thisissecurity.stormshield.com/2018/08/28/acridrain-stealer/
Details Source https://www.3cx.com/blog/news/mandiant-initial-results/
Details Source https://www.clearskysec.com/muddywater-targets-kurdish-groups-turkish-orgs/
Details Source https://www.clearskysec.com/wp-content/uploads/2016/01/Operation%20DustySky_TLP_WHITE.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2019/05/Iranian-Nation-State-APT-Leak-Analysis-and-Overview.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2019/06/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2019/08/ClearSky-2019-H1-Cyber-Events-Summary-Report.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2019/10/The-Kittens-Are-Back-in-Town-2-1.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2020/02/ClearSky-Fox-Kitten-Campaign.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2020/06/CryptoCore_Group.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2020/08/Dream-Job-Campaign.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2020/08/The-Kittens-are-Back-in-Town-3.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2020/10/Operation-Quicksand.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2020/12/Pay2Kitten.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2021/01/Lebanese-Cedar-APT.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2021/02/Conti-Ransomware.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2021/05/CryptoCore-Lazarus-Clearsky.pdf
Details Source https://www.clearskysec.com/wp-content/uploads/2021/08/Siamesekitten.pdf
Details Source https://www.cxotoday.com/cxo-bytes/advancing-security-ai-ml-applications-make-cybersecurity-framework-agile-intelligent/
Details Source https://www.cxotoday.com/cxo-bytes/top-5-cyber-security-companies-resolving-strategic-ransomware-attacks-in-india/
Details Source https://www.cxotoday.com/cxo-bytes/when-did-you-last-test-your-cyber-incident-response-plan/
Details Source https://www.cxotoday.com/press-release/fraud-awareness-week-list-of-companies-that-help-prevent-cybersecurity-fraud/
Details Source https://www.cxotoday.com/press-release/honeywell-introduces-expanded-ot-cybersecurity-capabilities-across-offerings-in-honeywell-connect-second-half-2022-product-release/
Details Source https://www.clearskysec.com/wp-content/uploads/2022/04/EvilNominatus_Ransomware_7.4.22.pdf
Details Source https://www.cxotoday.com/press-release/arete-launches-incident-response-retainer-program-to-reduce-impact-of-cyber-risks/
Details Source https://www.cxotoday.com/press-release/msps-hybrid-workers-and-connected-cars-face-cyber-threat-onslaught-in-2023/
Details Source https://www.cxotoday.com/press-release/quick-heal-reveals-the-next-generation-cyber-security-solution-version-23/
Details Source https://www.cxotoday.com/press-release/vi-business-introduces-vi-secure-a-comprehensive-cyber-security-portfolio-for-enterprises/
Details Source https://www.cxotoday.com/specials/2023-cybersecurity-predictions-from-zoom-ciso-michael-adams/
Details Source https://www.cxotoday.com/specials/leading-cyber-security-companies-focusing-on-emerging-threats-in-2023/
Details Source https://www.cxotoday.com/specials/outsmart-the-fraudsters-prevent-the-most-common-cyber-frauds-with-these-simple-steps/
Details Source https://www.emc.com/collateral/white-papers/h12756-wp-shell-crew.pdf
Details Source https://www.hybrid-analysis.com/
Details Source https://www.hybrid-analysis.com/sample/052dc2ccd09342d2e32f0b2e3153e73012facc712ac3c59e11ac8deb3610fd18/5d19edbb038838a054a876b9
Details Source https://www.hybrid-analysis.com/sample/1f6e267a9815ef88476fb8bedcffe614bc342b89b4c80eae90e9aca78ff1eab8
Details Source https://www.hybrid-analysis.com/sample/1ff376134182ba81f520f589885dabebb185a8a70c0db79f8e04687d62980c9b?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/20c61a9e16451777aae431cce15960e9b690c7d70b27384d0f4b3305c4cf10db?environmentId=120
Details Source https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e38d6?environmentId=110
Details Source https://www.hybrid-analysis.com/sample/442fe9bb6820ba79ca48429df8e5a01e991302be2a0d45a35c99c5d006a1d64a
Details Source https://www.hybrid-analysis.com/sample/47232b513efbd2c6fcd3dd1778aa00ca018710c8afd597d238ab1c94433747c4/5d9c9ed50288383e19febfe6
Details Source https://www.hybrid-analysis.com/sample/4f65cd98a90fc9ec7d8a5bb1087758f6c89251d365479c0c2429d023b6a732c2?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/4ff921531d9cb5c21b3ee081a5fd1c52d12690332dd1ea1608230b8de918ac09
Details Source https://www.hybrid-analysis.com/sample/5d631d77401615d53f3ce3dbc2bfee5d934602dc35d488aa7cebf9b3ff1c4816?environmentId=2
Details Source https://www.hybrid-analysis.com/sample/3aca697f1ac623ac970764dd1b248339d03f18acd5ba1b4a443ff9d5016f8e4e/5af3d6237ca3e179812bdfc5
Details Source https://www.hybrid-analysis.com/sample/6712718d0ef08b5f73421e85fd35d3bb475f167ff657448164887e5e75f2fb2f?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/6e4f6307149599c10bd23252197d181b58cbe2909e290fbb05c03a9a07210603?environmentId=1
Details Source https://www.hybrid-analysis.com/sample/72d6e9c228eeae8aba33f653d16adf63c231d4370e989a0ab10853fa87b23562?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/7e57dca4b9dec787e3fdbc983ee8111f97f75fa772e77a166ec18c49e1358f50?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/80c3e22b640b47e0c41f4185f091e2c523a9ef291a75b7007303e2267b8d68c5?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/8f435accbb65d3786a28f016e856465440a5c41dc679cc9fd3b1da323b160bc9/6216d3cc5357607d8a4d1c42
Details Source https://www.hybrid-analysis.com/sample/945c63a512d9d62583783329cd83d2872e250fba3c40d5fe0e36483a5a831a9a/5de484aa3f6a1d32720f2eee
Details Source https://www.hybrid-analysis.com/sample/95b5ef4e0284f82d4f6e68d750645f3475e174e10a2c33da18e372a212976a8d?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/97b22b1c6b99ba295c6d96b1315fb907ba0dd78918babf0ddb4638e8061edc3b
Details Source https://www.hybrid-analysis.com/sample/a4adbea4fcbb242f7eac48ddbf13c814d5eec9220f7dce01b2cc8b56a806cd37
Details Source https://www.hybrid-analysis.com/sample/ab32fed5cdd9fd87f961011bc992f00070b73b6083e1e20e79fb2cc03d062903/5fe1f94b72a08b0abc74ef3e
Details Source https://www.hybrid-analysis.com/sample/aece695cb9504886e2cba5d3b47af981c82efe16eff1f2f673e82366ca8653f2
Details Source https://www.hybrid-analysis.com/sample/b0b9beba8089d5ff30d11703648b1bc2083bac677da4cdd3a9ef007dd62282b4?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/b5ac9d86d8cd86432a450c5ff9b2af60597972d3413b181fdbbb98cc47225f3f
Details Source https://www.hybrid-analysis.com/sample/bd873063e1455338fe8e7aa11f0f392abf7fc25ceac785fbe2484ab396a14b2e
Details Source https://www.hybrid-analysis.com/sample/be51c1448074956b86138e3b570bd852c8aa992a923fe1d27b05e474bf8db569
Details Source https://www.hybrid-analysis.com/sample/c967628280e9021ad5c5da6b0174c4ba4c3b34dafc936951ce67f71d479f14a9?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/c9d3ffab53ba686df1de7142f4bdb1f8115e1119b354a7c34434d02ef87751e7/
Details Source https://www.hybrid-analysis.com/sample/ca56b35917e49868e70ba5e3fc328c776de8c9af361e4b3fc5010762c9e68e67/60d9ed1b27d48c1af94d9d0d
Details Source https://www.hybrid-analysis.com/sample/cd633e4e0741bcd242aac073dca1e4e124798343a756f8cac8a3778a952ad089/5e4cba5f6475ee0cee5f50d0
Details Source https://www.hybrid-analysis.com/sample/d16ad130daed5d4f3a7368ce73b87a8f84404873cbfc90cc77e967a83c947cd2?environmentId=1
Details Source https://www.hybrid-analysis.com/sample/d5dd3ecdd85e2c9e45c0b1e4985b28b33bc2ff187a7ae3d971fe6a216755c85e?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/dce8919a6c8460b43894701e86259a4291afd50530aed579ff4709de40d32d41?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/dfc56a704b5e031f3b0d2d0ea1d06f9157758ad950483b44ac4b77d33293cb38?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/e58117933d0b5312cc0f799b5f181482220f1e26f62f9eaa4f99ed50cd29b90c?environmentId=1
Details Source https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14e4d?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/f0a1aeaf2a6f3c6098696d3802675097072459b89213177f1e4f1494a67c250a
Details Source https://www.hybrid-analysis.com/sample/f65ba1cc50b29dd05ddaa83242f4b7bd0429841bfc4befa9e203cb6621d2389b?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/f9a4c6857bb3a4feebb232c54e6ecffd3742ce598b48e975d675b38232b8e30e?environmentId=300
Details Source https://www.hybrid-analysis.com/sample/fa48cd1fd8aab4a43e9ff1f7985c549040389036a03f9117f675d8737e1b34b5?environmentId=100
Details Source https://www.hybrid-analysis.com/sample/fd3c007e62be86abbbf41c8d286bd550224f37223a2f34f05244ce99b0c249f6
Details Source https://www.hybrid-analysis.com/string-search/results/dadfd0d8b49c6852e76468b76d381248d8db9f18250b303ead54986bca8dd98f
Details Source https://www.it-connect.fr/le-ransomware-cuba-sen-prend-aux-serveurs-exchange/
Details Source https://www.clearskysec.com/wp-content/uploads/2016/06/Operation-DustySky2_-6.2016_TLP_White.pdf