toolsmith: Attack & Detection: Hunting in-memory adversaries with Rekall and WinPmem
Tags
Common Information
Type | Value |
---|---|
UUID | d5f187f3-94fb-4bc6-81a3-ff879a12ef6c |
Fingerprint | 3cd589ca09af2fae |
Analysis status | IN_PROGRESS |
Considered CTI value | 0 |
Text language | |
Published | May 1, 2015, 8:50 a.m. |
Added to db | Jan. 18, 2023, 9:47 p.m. |
Last updated | Nov. 17, 2024, 6:54 p.m. |
Headline | UNKNOWN |
Title | toolsmith: Attack & Detection: Hunting in-memory adversaries with Rekall and WinPmem |
Detected Hints/Tags/Attributes | 82/2/14 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 43 | setup.sh |
|
Details | File | 1 | toolsmith.bat |
|
Details | File | 1 | meterpreter_output.txt |
|
Details | File | 1208 | powershell.exe |
|
Details | File | 27 | invoke-mimikatz.ps1 |
|
Details | File | 1 | winpmem.exe |
|
Details | File | 59 | 2.exe |
|
Details | File | 1 | compromised.raw |
|
Details | File | 1 | d:\forensics\memoryimages\toolsmith\compromised.raw |
|
Details | File | 2125 | cmd.exe |
|
Details | File | 1 | _2396.dmp |
|
Details | Github username | 5 | mattifestation |
|
Details | IPv4 | 1 | 192.168.177.130 |
|
Details | Url | 3 | https://raw.githubusercontent.com/mattifestation/powersploit/master/exfiltration/invoke-mimikatz.ps1 |