Malware analysis about unknown Israel APT campaign
Table of Contents
Malware analysis
Initial vector
The initial

Cyber kill chain
The process graph resume the cyber kill chain used by the attacker.
![alt text]()
Cyber Threat Intel
References MITRE ATT&CK Matrix
List of all the references with MITRE ATT&CK Matrix
Enterprise tactics |
Technics used |
Ref URL |
|
|
|
|
|
|
|
|
|
Indicators Of Compromise (IOC)
List of all the Indicators Of Compromise (IOC)
Indicator |
Description |
|
|
|
Domain requested |
|
IP requested |
|
HTTP/HTTPS requests |
|
IP C2 |
|
Domain C2 |
Links
Links Anyrun:
Documents: