id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
1,441
Figure 1 These digital certificates, self-signed or not, are the keys to updating apps in the Android ecosystem.
[ { "id": 46770, "label": "SOFTWARE", "start_offset": 96, "end_offset": 103 } ]
[]
[]
8,592
Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https://sites.google[.]com/view/ty85yt8tg8-download-rtih4ithr/ https://sites.google[.]com/view/user-id-568245/ https://sites.google[.]com/view/hhbejfdwdhwuhscbsb-xscvhdvbc/ Abused Dropbox Properties: https://www.dropbox[.]com/s/68y4vpfu8pc3imf/Iraq&Jewish.pdf
[ { "id": 26561, "label": "threat-actor", "start_offset": 16, "end_offset": 21 }, { "id": 26562, "label": "attack-pattern", "start_offset": 22, "end_offset": 30 }, { "id": 26563, "label": "location", "start_offset": 31, "end_offset": 39 }, { "id": 26564, "label": "threat-actor", "start_offset": 185, "end_offset": 190 }, { "id": 26565, "label": "URL", "start_offset": 229, "end_offset": 255 }, { "id": 26566, "label": "location", "start_offset": 256, "end_offset": 260 }, { "id": 26567, "label": "URL", "start_offset": 292, "end_offset": 318 }, { "id": 26568, "label": "location", "start_offset": 319, "end_offset": 323 }, { "id": 26569, "label": "URL", "start_offset": 340, "end_offset": 366 }, { "id": 26570, "label": "location", "start_offset": 367, "end_offset": 371 }, { "id": 26571, "label": "malware", "start_offset": 410, "end_offset": 417 }, { "id": 26572, "label": "URL", "start_offset": 430, "end_offset": 455 } ]
[]
[]
14,235
Although we were unable to find a PlugX sample through that particular GitHub, we surmise some PlugX variants in the wild use this GitHub repository to get their C&C information.
[ { "id": 48420, "label": "SOFTWARE", "start_offset": 71, "end_offset": 77 }, { "id": 44028, "label": "malware", "start_offset": 95, "end_offset": 100 }, { "id": 44025, "label": "malware", "start_offset": 34, "end_offset": 39 } ]
[]
[]
3,695
For defense evasion, both groups create or acquire tools for code signing the malware, or deobfuscate or decode files or information by using malware functions or utilities in the system.
[]
[]
[]
4,612
The Potential Chopper Webshell Execution model triggers when the web shell is already present on the machine and is being used as a backdoor to run commands as SYSTEM on the Exchange Server using China Chopper. The metrics provided by this model should be investigated carefully, since the ProxyLogon zero-day vulnerability was exploited in-the-wild, before Microsoft addressed the issue publicly.
[ { "id": 50512, "label": "malware", "start_offset": 18, "end_offset": 34 }, { "id": 50514, "label": "malware", "start_offset": 200, "end_offset": 213 }, { "id": 50515, "label": "vulnerability", "start_offset": 295, "end_offset": 328 }, { "id": 50513, "label": "SOFTWARE", "start_offset": 178, "end_offset": 193 }, { "id": 50516, "label": "identity", "start_offset": 363, "end_offset": 372 } ]
[]
[]
12,401
Like previous websites we’ve seen set up by this actor, this website has a link to their PGP public key at the bottom of the page.
[ { "id": 38549, "label": "location", "start_offset": 93, "end_offset": 99 }, { "id": 38550, "label": "malware", "start_offset": 125, "end_offset": 129 } ]
[]
[]
575
Ryuk will even send out Wake-on-LAN packets to wake up systems that have been configured with this feature.
[ { "id": 1923, "label": "malware", "start_offset": 0, "end_offset": 4 } ]
[]
[]
7,042
One argument.
[]
[]
[]
13,169
This version also changes the malware location and its name to UF, an abbreviation for USBferry.
[ { "id": 41102, "label": "location", "start_offset": 47, "end_offset": 50 }, { "id": 41103, "label": "malware", "start_offset": 87, "end_offset": 95 } ]
[]
[]
4,425
; bool flag = list.Count == 0; return !flag; }
[]
[]
[]
10,243
Brute force attacks
[ { "id": 31293, "label": "attack-pattern", "start_offset": 0, "end_offset": 11 } ]
[]
[]
3,863
Figure 13: Popup message when users open the document that abuses DDEAUTO Figure 14.
[]
[]
[]
13,586
The web shell can execute any PHP code sent by an HTTP POST request to the web shell.
[ { "id": 51673, "label": "attack-pattern", "start_offset": 4, "end_offset": 14 } ]
[]
[]
666
Macros Macros are the most straight-forward way for an attacker to weaponize Office documents.
[]
[]
[]
6,236
Conclusion
[]
[]
[]
321
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
10,114
Trend Micro Detection 019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134 2f1a5a7411d015d01aaee4535835400191645023 Backdoor.
[ { "id": 30834, "label": "location", "start_offset": 6, "end_offset": 11 }, { "id": 30835, "label": "SHA1", "start_offset": 22, "end_offset": 86 }, { "id": 30836, "label": "MD5", "start_offset": 88, "end_offset": 128 } ]
[]
[]
5,305
For an unknown reason, the malware deletes the aforementioned rules and creates them again, this time using the iptables command via the system() function.
[]
[]
[]
8,981
Interestingly, we found a sample from the Reptile rootkit framework in that same company, as well as network requests to a subdomain that belongs to Earth Berberoka’s infrastructure.
[ { "id": 27753, "label": "location", "start_offset": 26, "end_offset": 32 }, { "id": 27754, "label": "malware", "start_offset": 42, "end_offset": 49 }, { "id": 27755, "label": "attack-pattern", "start_offset": 50, "end_offset": 57 }, { "id": 27756, "label": "location", "start_offset": 76, "end_offset": 80 } ]
[]
[]
9,142
Lurk’s intermediate targets by year 2014 to 2016:
[ { "id": 28197, "label": "malware", "start_offset": 0, "end_offset": 4 } ]
[]
[]
9,535
A 2017 Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) report also discussed how Gh0st RAT variants wiped the MBR and replaced it with messages that varied across different samples.
[ { "id": 29250, "label": "location", "start_offset": 7, "end_offset": 17 }, { "id": 29251, "label": "malware", "start_offset": 101, "end_offset": 110 }, { "id": 29252, "label": "location", "start_offset": 134, "end_offset": 137 } ]
[]
[]
10,054
Figure 7. Folder c
[]
[]
[]
5,461
It’s quite odd (and probably underreported), however, to see it used as a vector for cyberespionage.
[]
[]
[]
862
In recent years, ransomware families are often glamorized as being some of the most dangerous types of malware.
[]
[]
[]
5,030
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.
[ { "id": 51098, "label": "threat-actor", "start_offset": 18, "end_offset": 27 }, { "id": 51100, "label": "location", "start_offset": 72, "end_offset": 82 }, { "id": 51101, "label": "SOFTWARE", "start_offset": 180, "end_offset": 185 }, { "id": 51102, "label": "attack-pattern", "start_offset": 199, "end_offset": 218 }, { "id": 51099, "label": "threat-actor", "start_offset": 57, "end_offset": 68 } ]
[ { "id": 1043, "from_id": 51099, "to_id": 51100, "type": "located-at" }, { "id": 1044, "from_id": 51099, "to_id": 51101, "type": "uses" }, { "id": 1045, "from_id": 51099, "to_id": 51102, "type": "uses" } ]
[]
8,805
This targeting is consistent with what others have subsequently reported.
[]
[]
[]
8,853
It should be noted that we have also observed an increase use of BLOB files since 2020.
[]
[]
[]
2,786
This new kind of attack tells us that at least some cybercriminals are starting to view theft of victim’s computing power to translate into cryptocurrencies as a better business proposition than the traditional practice of loading malware on the victim’s system through drive-by downloads.
[]
[]
[]
2,808
As with all ransomware attacks, Palo Alto Networks and Unit 42 recommends that anyone affected NOT pay the ransom.
[ { "id": 45703, "label": "identity", "start_offset": 32, "end_offset": 50 }, { "id": 45704, "label": "identity", "start_offset": 55, "end_offset": 62 } ]
[]
[]
3,743
2022-05-18:
[ { "id": 49565, "label": "TIME", "start_offset": 0, "end_offset": 10 } ]
[]
[]
14,303
Content of README.txt register.bat is used to gain administrator privilege.
[ { "id": 48516, "label": "FILEPATH", "start_offset": 11, "end_offset": 21 }, { "id": 48518, "label": "FILEPATH", "start_offset": 22, "end_offset": 34 }, { "id": 48519, "label": "attack-pattern", "start_offset": 51, "end_offset": 74 } ]
[ { "id": 441, "from_id": 48518, "to_id": 48519, "type": "uses" } ]
[]
8,495
Our research teams and threat hunters will work vigilantly to monitor and identify any new threat intelligence and will continue to share updates here: trendmicro.com/ukrainecrisis.
[ { "id": 26196, "label": "location", "start_offset": 22, "end_offset": 25 }, { "id": 26197, "label": "location", "start_offset": 33, "end_offset": 40 }, { "id": 26198, "label": "location", "start_offset": 41, "end_offset": 45 }, { "id": 26199, "label": "location", "start_offset": 65, "end_offset": 72 }, { "id": 26200, "label": "location", "start_offset": 73, "end_offset": 76 }, { "id": 26201, "label": "location", "start_offset": 114, "end_offset": 117 }, { "id": 26202, "label": "location", "start_offset": 118, "end_offset": 122 }, { "id": 26203, "label": "URL", "start_offset": 155, "end_offset": 183 } ]
[]
[]
5,285
Hence, we believe that it is possible that the Cyclops Blink botnet’s main purpose is to build an infrastructure for further attacks on high-value targets.
[ { "id": 51333, "label": "malware", "start_offset": 47, "end_offset": 60 } ]
[]
[]
9,108
Lurk also targeted programmatic advertising infrastructures to increase the scale of their operations.
[ { "id": 28116, "label": "threat-actor", "start_offset": 0, "end_offset": 4 } ]
[]
[]
4,883
Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.
[ { "id": 50892, "label": "TIME", "start_offset": 11, "end_offset": 15 }, { "id": 50893, "label": "attack-pattern", "start_offset": 62, "end_offset": 70 } ]
[]
[]
4,782
To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security.
[]
[]
[]
706
Yes, I said family.
[]
[]
[]
87
Compromising a user’s browser or a regular home PC will net the criminal an average system for mining coins, but higher-end systems will generate more income.
[ { "id": 45830, "label": "attack-pattern", "start_offset": 0, "end_offset": 29 } ]
[]
[]
7,566
This said macro executes a command to download the first stage payload using msiexec.exe, a Microsoft Installer tool that can download and run a Windows Installer file.
[ { "id": 23605, "label": "identity", "start_offset": 92, "end_offset": 101 }, { "id": 23606, "label": "location", "start_offset": 112, "end_offset": 116 }, { "id": 23607, "label": "location", "start_offset": 122, "end_offset": 125 }, { "id": 23608, "label": "location", "start_offset": 135, "end_offset": 138 } ]
[]
[]
8,596
Understanding the techniques used by attackers helps us counter these threats effectively.
[]
[]
[]
14,272
This is presumably used for the device’s ID registration: Figure 4.
[]
[]
[]
3,063
The developer even directly named these “infected packages” as “fake.virus” in the source code.
[ { "id": 48138, "label": "FILEPATH", "start_offset": 64, "end_offset": 74 } ]
[]
[]
5,882
When you think as nation state, what should a nation state be looking at for the future?
[]
[]
[]
1,722
Palo Alto Networks App-ID technology can identify I2P traffic as well 51 other tunneling applications.
[ { "id": 45115, "label": "SOFTWARE", "start_offset": 50, "end_offset": 53 }, { "id": 5127, "label": "identity", "start_offset": 0, "end_offset": 18 } ]
[]
[]
8,319
In later versions it was obfuscated with Base64.
[]
[]
[]
1,822
Figure 13. Copying tools and other malicious components to the compromised machine using AnyDesk
[ { "id": 5369, "label": "tools", "start_offset": 95, "end_offset": 102 } ]
[]
[]
533
A script file is also used to download or install ransomware.
[]
[]
[]
1,463
We further investigated the following cases:
[]
[]
[]
12,602
There have been no indications that this attack has hit any other organization outside of those targeted; we do not believe that this family is currently in widespread use.
[ { "id": 39180, "label": "identity", "start_offset": 52, "end_offset": 55 } ]
[]
[]
3,048
According to the Google Play store statistics, users have downloaded “AntiVirus for Android™” more than one million times and the app was listed in Top 100 free apps in Tools category.
[ { "id": 45757, "label": "SOFTWARE", "start_offset": 17, "end_offset": 29 }, { "id": 45758, "label": "malware", "start_offset": 70, "end_offset": 92 } ]
[]
[]
14,313
File lists of the directories are also stolen.
[]
[]
[]
13,054
Moyer is accused of offering 200 iPads to the Santa County Sheriff's office in exchange for concealed carry permits for four Apple employees.
[]
[]
[]
13,668
Figure 4.
[]
[]
[]
9,237
Whatever the source, former CISA boss Chris Krebs warns that SMBs, education sector organizations, and state and local governments may be disproportionately affected as these often have fewer resources to spend on security.
[ { "id": 28528, "label": "attack-pattern", "start_offset": 13, "end_offset": 19 }, { "id": 28530, "label": "location", "start_offset": 33, "end_offset": 37 }, { "id": 28532, "label": "location", "start_offset": 99, "end_offset": 102 }, { "id": 28533, "label": "location", "start_offset": 109, "end_offset": 112 }, { "id": 28534, "label": "location", "start_offset": 131, "end_offset": 134 }, { "id": 28535, "label": "location", "start_offset": 214, "end_offset": 222 } ]
[]
[]
4,939
In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.
[ { "id": 50958, "label": "TIME", "start_offset": 3, "end_offset": 11 }, { "id": 50959, "label": "threat-actor", "start_offset": 32, "end_offset": 37 }, { "id": 50960, "label": "SOFTWARE", "start_offset": 73, "end_offset": 90 } ]
[]
[]
5,575
Figure 2. Revix encrypting a QNAP NAS device Figure 3.
[]
[]
[]
5,265
Will mobile become cyberespionage’s main frontier?
[]
[]
[]
13,325
Justice officials say that the group's intrusions allowed the hackers to steal source code, customer account data, and personally identifiable information (PII).
[ { "id": 41484, "label": "attack-pattern", "start_offset": 80, "end_offset": 86 }, { "id": 41485, "label": "location", "start_offset": 116, "end_offset": 119 } ]
[]
[]
4,829
These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.
[ { "id": 50782, "label": "SOFTWARE", "start_offset": 49, "end_offset": 69 }, { "id": 50781, "label": "attack-pattern", "start_offset": 6, "end_offset": 14 } ]
[]
[]
2,291
The first 12 bytes of the OP_RETURN contains the IV, the last 16 bytes the GCM tag, while the middle section is the AES-256 GCM encrypted domain
[]
[]
[]
3,252
This includes the backdoor version (we observed V2 and V3), access keys, endpoint address, the bucket name for Alibaba Cloud OSS, and a URL for downloading the utility sc.exe that is used for taking screenshots.
[ { "id": 48369, "label": "FILEPATH", "start_offset": 168, "end_offset": 174 }, { "id": 48368, "label": "Infrastucture", "start_offset": 111, "end_offset": 128 } ]
[]
[]
3,709
FIN7 gathers information on network shares.
[ { "id": 49504, "label": "threat-actor", "start_offset": 0, "end_offset": 4 } ]
[]
[]
5,906
On episode four of #TrendTalksBizSec.
[]
[]
[]
11,243
jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }
[]
[]
[]
701
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
762
Instead, the block to be freed is marked and filled with 0x00 data and added to a pool.
[]
[]
[]
6,271
When Faghani first published his analysis this component of the malware was forcing the user’s Facebook account to “like” specific posts on a community page titled Sabır.
[ { "id": 19433, "label": "location", "start_offset": 143, "end_offset": 152 }, { "id": 19434, "label": "malware", "start_offset": 153, "end_offset": 157 } ]
[]
[]
7,632
But it also contains Kronos, a known banking trojan; and SmokeLoader, which is another payload downloader.
[ { "id": 23751, "label": "malware", "start_offset": 21, "end_offset": 27 }, { "id": 23752, "label": "location", "start_offset": 53, "end_offset": 56 }, { "id": 23753, "label": "malware", "start_offset": 57, "end_offset": 68 } ]
[]
[]
12,685
The Glupteba malware family is primarily distributed through pay per install (PPI) networks and via traffic purchased from traffic distribution systems (TDS).
[ { "id": 39366, "label": "malware", "start_offset": 4, "end_offset": 12 }, { "id": 39367, "label": "location", "start_offset": 92, "end_offset": 95 } ]
[]
[]
4,942
Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.
[ { "id": 50964, "label": "identity", "start_offset": 78, "end_offset": 81 }, { "id": 50965, "label": "threat-actor", "start_offset": 91, "end_offset": 96 }, { "id": 50966, "label": "TIME", "start_offset": 166, "end_offset": 175 }, { "id": 50963, "label": "SOFTWARE", "start_offset": 9, "end_offset": 19 } ]
[]
[]
2,547
* These analytic detectors will trigger automatically for Cortex XDR Pro customers.
[ { "id": 45591, "label": "SOFTWARE", "start_offset": 59, "end_offset": 73 } ]
[]
[]
11,437
On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.
[ { "id": 34945, "label": "location", "start_offset": 37, "end_offset": 45 }, { "id": 34946, "label": "attack-pattern", "start_offset": 79, "end_offset": 87 }, { "id": 34947, "label": "location", "start_offset": 89, "end_offset": 92 } ]
[]
[]
4,795
In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.
[]
[]
[]
5,278
With additional insights from Philippe Z Lin Note: This article has been updated on March 17, 2022, 2:00 a.m. ET to include Asus’ security bulletin.
[ { "id": 51321, "label": "identity", "start_offset": 124, "end_offset": 128 }, { "id": 51320, "label": "TIME", "start_offset": 84, "end_offset": 112 }, { "id": 51319, "label": "identity", "start_offset": 30, "end_offset": 44 } ]
[]
[]
3,598
Cassandra Crypter
[ { "id": 49378, "label": "tools", "start_offset": 0, "end_offset": 17 } ]
[]
[]
8,531
Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.
[ { "id": 26348, "label": "location", "start_offset": 32, "end_offset": 35 }, { "id": 26349, "label": "attack-pattern", "start_offset": 45, "end_offset": 53 } ]
[]
[]
1,748
Got a topic you want us to write about for you, your friends, or your family?
[]
[]
[]
13,929
MITRE ATT&CK tactics and techniques
[]
[]
[]
3,353
The malware abuses publicly available tools and cloud services for its malicious behavior.
[]
[]
[]
398
Xpanse is even able to classify those servers which have not been upgraded to the most recent version.
[ { "id": 46098, "label": "SOFTWARE", "start_offset": 0, "end_offset": 6 } ]
[]
[]
12,025
Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.
[ { "id": 37200, "label": "location", "start_offset": 32, "end_offset": 35 }, { "id": 37201, "label": "attack-pattern", "start_offset": 45, "end_offset": 53 } ]
[]
[]
1,570
While not spreading as widely as the Petya/NotPetya attacks, reports indicate that where Bad Rabbit has hit, it has caused severe disruption.
[ { "id": 4690, "label": "malware", "start_offset": 37, "end_offset": 42 }, { "id": 4691, "label": "malware", "start_offset": 43, "end_offset": 51 }, { "id": 4692, "label": "malware", "start_offset": 89, "end_offset": 99 } ]
[]
[]
4,555
The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.
[ { "id": 50365, "label": "attack-pattern", "start_offset": 53, "end_offset": 76 } ]
[]
[]
4,208
Fake Android porn app and Windows chat applications as lures
[]
[]
[]
13,030
In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.
[ { "id": 48871, "label": "attack-pattern", "start_offset": 69, "end_offset": 102 }, { "id": 48872, "label": "TIME", "start_offset": 3, "end_offset": 12 } ]
[]
[]
2,309
The landing page contained a simple HTML page loading two scripts—one for Capstone.js and another for the exploit chain.
[ { "id": 47396, "label": "SOFTWARE", "start_offset": 74, "end_offset": 85 } ]
[]
[]
2,477
The only malicious activity we have seen in our telemetry related to SpringShell involves HTTP requests to URLs containing the tomcatwar.jsp filename associated with the SpringShell proof-of-concept script.
[ { "id": 47550, "label": "vulnerability", "start_offset": 70, "end_offset": 81 }, { "id": 47551, "label": "FILEPATH", "start_offset": 128, "end_offset": 141 }, { "id": 47552, "label": "vulnerability", "start_offset": 171, "end_offset": 182 } ]
[]
[]
2,084
On the same taskbar, we also noticed the Telegram icon, which is a very popular messaging app for chatting – but is also used by threat actors such as LAPSUS$ to post news into specific channels.
[ { "id": 6199, "label": "threat-actor", "start_offset": 151, "end_offset": 158 }, { "id": 47212, "label": "SOFTWARE", "start_offset": 41, "end_offset": 49 } ]
[]
[]
3,117
The actions to take in response to this event are clear and simple: As always, we will continue to watch this event closely and provide any updates that we can.
[]
[]
[]
9,983
Figure 5. Compilation timestamp on 9002 RAT sample (top), timestamp of the malicious configuration (center), and snapshot of the program’s update log (bottom)
[ { "id": 30484, "label": "malware", "start_offset": 38, "end_offset": 46 }, { "id": 30485, "label": "location", "start_offset": 47, "end_offset": 53 }, { "id": 30486, "label": "location", "start_offset": 103, "end_offset": 109 }, { "id": 30487, "label": "location", "start_offset": 112, "end_offset": 115 } ]
[]
[]
7,107
The “dlpumgr32.exe” and “servTest” lines are related to the new version of SysUpdate which we described earlier.
[ { "id": 22256, "label": "location", "start_offset": 20, "end_offset": 23 }, { "id": 22257, "label": "location", "start_offset": 41, "end_offset": 44 }, { "id": 22258, "label": "malware", "start_offset": 75, "end_offset": 84 } ]
[]
[]
4,289
Some specific security measures organizations can implement: Recognize social engineering attempts.
[]
[]
[]
5,167
Tags Cloud | APT & Targeted Attacks | Cyber Crime | Expert Perspective | Network | Articles, News, Reports
[]
[]
[]
5,529
By using this method, the hackers get access to the full card details, which have a higher resale value on the cybercrime black market.
[]
[]
[]
6,370
The IP 174.129.157[.]251 is hosted on Amazon AWS, and Palo Alto Networks Cortex Xpanse history shows the IP had TCP port 443 open from April 29, 2022, until May 23, 2022, with a self-signed SSL certificate impersonating Microsoft Security:
[ { "id": 19752, "label": "IPV4", "start_offset": 7, "end_offset": 24 }, { "id": 19753, "label": "location", "start_offset": 50, "end_offset": 53 }, { "id": 19756, "label": "location", "start_offset": 190, "end_offset": 193 }, { "id": 19757, "label": "identity", "start_offset": 220, "end_offset": 229 }, { "id": 19758, "label": "location", "start_offset": 230, "end_offset": 238 } ]
[]
[]
13,252
PDB strings inside the MSI file
[]
[]
[]
2,579
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
14,197
The security community, including government agencies, should quicken their pace in sharing actionable intelligence, in order to improve public and private organizations’ threat hunting and detection efforts.
[]
[]
[]
7,321
Figure 20.
[]
[]
[]
9,995
Dump password from SQL database printdat.dll RAT (PlugX variant)
[ { "id": 30511, "label": "malware", "start_offset": 50, "end_offset": 55 } ]
[]
[]