Table of Contents
Malware analysis
Initial vector
The initial vector

Cyber kill chain
The process graph resume the cyber kill chain used by the attacker.
![alt text]()
Cyber Threat Intel
References MITRE ATT&CK Matrix
List of all the references with MITRE ATT&CK Matrix
Enterprise tactics |
Technics used |
Ref URL |
|
|
|
|
|
|
|
|
|
Indicators Of Compromise (IOC)
List of all the Indicators Of Compromise (IOC)
Indicator |
Description |
|
|
|
Domain requested |
|
IP requested |
|
HTTP/HTTPS requests |
|
IP C2 |
|
Domain C2 |
This can be exported as JSON format Export in JSON
Links
Links Anyrun:
Documents: