Inc Ransom Attack Analysis: Extortion Methodologies - ReliaQuest
Tags
Common Information
Type | Value |
---|---|
UUID | f646cc52-f7a5-420a-95af-af6902c6cd8f |
Fingerprint | b4691bd18825b6c3 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 10, 2024, 9:07 a.m. |
Added to db | Sept. 12, 2024, 3:03 p.m. |
Last updated | Nov. 17, 2024, 6:55 p.m. |
Headline | Inc Ransom Attack Analysis: Extortion Methodologies |
Title | Inc Ransom Attack Analysis: Extortion Methodologies - ReliaQuest |
Detected Hints/Tags/Attributes | 98/3/10 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 99 | ✔ | Cyware News - Latest Cyber News | https://cyware.com/allnews/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 152 | cve-2023-3519 |
|
Details | Domain | 49 | wmiexec.py |
|
Details | Domain | 88 | secretsdump.py |
|
Details | Domain | 2 | palloaltonetworks.com |
|
Details | File | 40 | netscan.exe |
|
Details | File | 7 | megasyncsetup64.exe |
|
Details | File | 256 | net.exe |
|
Details | File | 45 | wmiexec.py |
|
Details | File | 85 | secretsdump.py |
|
Details | File | 2 | split.exe |