Table of Contents
Malware analysis
Initial vector
The initial vector
Cyber kill chain
The process graph resume the cyber kill chain used by the attacker.
Cyber Threat Intel
References MITRE ATT&CK Matrix
List of all the references with MITRE ATT&CK Matrix
Enterprise tactics |
Technics used |
Ref URL |
|
|
|
|
|
|
|
|
|
Indicators Of Compromise (IOC)
List of all the Indicators Of Compromise (IOC)
Indicator |
Description |
|
|
|
Domain requested |
|
IP requested |
|
HTTP/HTTPS requests |
|
IP C2 |
|
Domain C2 |
This can be exported as JSON format Export in JSON
Links
Links Anyrun:
Documents: