Detecting New Threats: The Heuristic Approach with DFI - InQuest
Tags
Common Information
Type | Value |
---|---|
UUID | df520341-a4ea-4f64-9cdc-e1eaa2f4e89e |
Fingerprint | b04198f709bceaeb |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | May 31, 2024, 5:33 p.m. |
Added to db | Aug. 31, 2024, 12:24 a.m. |
Last updated | Nov. 17, 2024, 6:54 p.m. |
Headline | Detecting New Threats: The Heuristic Approach with DFI |
Title | Detecting New Threats: The Heuristic Approach with DFI - InQuest |
Detected Hints/Tags/Attributes | 30/1/23 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 137 | ✔ | InQuest | https://inquest.net/blog/rss | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 372 | wscript.shell |
|
Details | Domain | 13 | oshell.run |
|
Details | Domain | 141 | research.checkpoint.com |
|
Details | File | 2125 | cmd.exe |
|
Details | File | 1 | heaventool.bat |
|
Details | File | 2 | 'payload.exe |
|
Details | File | 1 | msd89h2j389uh.bat |
|
Details | File | 55 | payload.exe |
|
Details | File | 37 | 'cmd.exe |
|
Details | File | 1 | encrypted.vbs |
|
Details | sha256 | 1 | 61f28f87755265f1bacdefbaca8a86e4c5fa71c20206702f4816bc81358fac16 |
|
Details | sha256 | 1 | d44f161b75cba92d61759ef535596912e1ea8b6a5a2067a2832f953808ca8609 |
|
Details | sha256 | 1 | 9c5883cf118f1d22795f7b5661573f8099554c5a3f78d592e8917917baa6d20f |
|
Details | sha256 | 1 | 2aa9459160149ecefd1c9b63420eedc7fe3a21ae0ca3e080c93fd39fef32e9c0 |
|
Details | sha256 | 1 | 8155a6423d64f30d2994163425d3fbe14a52927d3616ffacea36ddc71a6af4b0 |
|
Details | sha256 | 1 | c1436f65acbf7123d1a45b0898be69ba964f0c6d569aa350c9d8a5f187b3c0e7 |
|
Details | sha256 | 1 | de8ecd738f1f24a94aba06f19d426399bc250cc5e7b848b2cbd92fc1d6906403 |
|
Details | sha256 | 1 | d5483049dc32d1a57e759839930fe17fe31a5f513d24074710f98ec186f06777 |
|
Details | sha256 | 1 | 19a8201c6a3063b897d696330c1b60bd97914514d2ae6a6c3c1796bec236724a |
|
Details | Url | 1 | https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation |
|
Details | Yara rule | 1 | rule Generic_PDF_Contains_Batch_Script { strings: $pdf_anchor = "PDF Comment '%PDF" $bat_1 = /\\b[a-z0-9]+\\.bat/ nocase condition: $pdf_anchor at 0 and any of ($bat_*) } |
|
Details | Yara rule | 1 | rule Generic_PDF_Contains_VBScript { strings: $pdf_anchor = "PDF Comment '%PDF" $vb_1 = /\\b[a-z0-9]+\\.vbs/ nocase condition: $pdf_anchor at 0 and any of ($vb_*) } |
|
Details | Yara rule | 1 | rule Generic_PDF_Contains_PowerShell_Reference { strings: $pdf_anchor = "PDF Comment '%PDF" $ps_1 = "powershell" nocase condition: $pdf_anchor at 0 and any of ($ps_*) } |