diff --git a/Additional Analysis/Terraloader/02-01-20/Analysis.md b/Additional Analysis/Terraloader/02-01-20/Analysis.md index 14a5c48..9118863 100644 --- a/Additional Analysis/Terraloader/02-01-20/Analysis.md +++ b/Additional Analysis/Terraloader/02-01-20/Analysis.md @@ -983,9 +983,11 @@ CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US 259e2142575482b958a102a |Indicator|Description| | ------------- |:-------------:| -||| +|569590b6fc4ec9d482223f7cb077973084cfcb7a22b64aa9e75047ca9bc09eb6|Job Description.js| +|91697faf2e820b809f75991df861e34635f8f31f931f8a4b03d7d9a4e8d4ee56|dll payload| +|4e03abcc149e9d36f2645033e17ec215f454bc494304b30975ed5639ad26caea|Decoy document| -
The IOC can be exported in JSON
+
The IOC can be exported in JSON

References MITRE ATT&CK Matrix

@@ -995,7 +997,7 @@ CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US 259e2142575482b958a102a |Defense Evasion|Regsvr32
Install Root Certificate|https://attack.mitre.org/techniques/T1117/
https://attack.mitre.org/techniques/T1130/| |Discovery|Query Registry|https://attack.mitre.org/techniques/T1012/| -
This can be exported as JSON format Export in JSONhttps://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Additional%20Analysis/Terraloader/02-01-20/Json/MitreAttack.json
+
This can be exported as JSON format Export in JSON

Links

Original tweet: