HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks - Microsoft Security Blog
Common Information
Type Value
UUID f4f51f2c-456b-40a7-97bb-063c11e594f8
Fingerprint 200518393445ce4d
Analysis status DONE
Considered CTI value 2
Text language
Published Nov. 11, 2021, 9 a.m.
Added to db Sept. 26, 2022, 9:34 a.m.
Last updated Nov. 12, 2024, 11:53 a.m.
Headline HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks
Title HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks - Microsoft Security Blog
Detected Hints/Tags/Attributes 90/3/12
Attributes
Details Type #Events CTI Value
Details Domain 1
poocardy.net
Details Domain 1
malparque.org
Details File 1
malicious.docx
Details File 1
safe.docx
Details File 1
sptdintf.dll
Details File 1
imgengine.dll
Details File 380
notepad.exe
Details Deprecated Microsoft Threat Actor Naming Taxonomy (Groups in development) 2
DEV-0238
Details Deprecated Microsoft Threat Actor Naming Taxonomy (Groups in development) 2
DEV-0253
Details Deprecated Microsoft Threat Actor Naming Taxonomy (Groups in development) 16
DEV-0193
Details Url 1
http://poocardy.net/diretorio
Details Url 1
https://malparque.org/rest/restfuch.png