Analysis of the new TA505 campaign
Table of Contents
Malware analysis
86ccedaa93743e83787f53e09e376713.docx
The first sample
Cyber kill chain
The process graphs resume all the cyber kill chains used by the attacker.
References MITRE ATT&CK Matrix
List of all the references with MITRE ATT&CK Matrix
Enterprise tactics |
Technics used |
Ref URL |
|
|
|
Indicators Of Compromise (IOC)
List of all the Indicators Of Compromise (IOC)
Indicator |
Description |
|
|
|
Domain requested |
|
IP requested |
|
HTTP/HTTPS requests |
|
Domain C2 |
|
IP C2 |
This can be exported as JSON format Export in JSON
Links
Links Anyrun:
Samples :
Documents: