Booby trap a shortcut with a backdoor
Tags
country: | Russia |
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Malware - T1587.001 Malware - T1588.001 Powershell - T1059.001 Trap - T1546.005 Powershell - T1086 Scripting - T1064 Trap - T1154 Scripting |
Common Information
Type | Value |
---|---|
UUID | eabcb570-7c2b-4648-9e45-7b9da335125c |
Fingerprint | 284b1c33253fe369 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Feb. 2, 2017, midnight |
Added to db | Feb. 17, 2023, 11:57 p.m. |
Last updated | Nov. 18, 2024, 1:38 a.m. |
Headline | UNKNOWN |
Title | Booby trap a shortcut with a backdoor |
Detected Hints/Tags/Attributes | 44/3/14 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.uperesia.com/booby-trapped-shortcut-generator |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | lnk.seek |
|
Details | Domain | 1 | lnk.read |
|
Details | Domain | 3 | www.uperesia.com |
|
Details | Domain | 5 | io.directory |
|
Details | Domain | 372 | wscript.shell |
|
Details | Domain | 13 | shortcut.save |
|
Details | Domain | 228 | system.io |
|
Details | File | 1 | interesting-title-to-click-on.pdf |
|
Details | File | 1 | ihaverun.txt |
|
Details | File | 13 | shortcut.tar |
|
Details | File | 1209 | powershell.exe |
|
Details | File | 7 | shortcut.ico |
|
Details | File | 12 | c:\windows\system32\shell32.dll |
|
Details | Url | 1 | https://www.uperesia.com/booby-trapped-shortcut |