Attention: please enable javascript in order khổng lồ properly view & use this malware analysis service.

Bạn đang xem: S53fds65f dsfdsfdsf

This trang web uses cookies lớn enhance your browsing experience. Please note that by continuing khổng lồ use this site you consent to the terms of our Data Protection Policy.

Toggle navigation

Sandbox Quichồng Scans Resources Request Info More YARA Search String Search File Collection Search Report Search " placeholder="IPhường, Domain, Hash…">
Threat Score: 85/100 AV Detection: Marked as clean Labeled as: No error Link Twitter Thư điện tử pháo

This report is generated from a file or URL submitted to this webservice on December 25th 2019 03:24:17 (UTC)Guest System: Windows 7 32 bit, Professional, 6.1 (build 7601), Service Paông chồng 1 Report generated by Falbé Sandbox v8.30 © Hybrid Analysis

Remote Access Reads terminal service related keys (often RDP related) Persistence Writes data khổng lồ a remote process Fingerprint Queries kernel debugger information Queries sensitive IE security settings Reads the active computer name Reads the cryptographic machine GUID Evasive sầu Marks tệp tin for deletion Spreading Opens the MountPointManager (often used to lớn detect additional infection locations) Tries lớn access unusual system drive letters
This report has 27 indicators that were mapped lớn 17 attaông chồng techniques & 8 tactics. View all details
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Commvà & Control Exfiltration Impact
Drive-by Compromise AppleScript .bash_protệp tin and .bashrc Access Token Manipulation Access Token Manipulation Account Manipulation Account Discovery AppleScript Audio Capture Commonly Used Port Automated Exfiltration Data Destruction
Exploit Public-Facing Application CMSTP Accessibility Features Accessibility Features Binary Padding Bash History Application Window Discovery Application Deployment Software Automated Collection Communication Through Removable Media Data Compressed Data Encrypted for Impact
External Remote Services Command-Line Interface Account Manipulation AppCert DLLs BITS Jobs Brute Force Browser Bookmark Discovery Distributed Component Object Model Clipboard Data Connection Proxy Data Encrypted Defacement
Hardware Additions Compiled HTML File AppCert DLLs AppInit DLLs Bypass User Account Control Credential Dumping Domain Trust Discovery Exploitation of Remote Services Data from Information Repositories Custom Commvà và Control Protocol Data Transfer Size Limits Disk Content Wipe
Replication Through Removable Media Control Panel Items AppInit DLLs Application Shimming Clear Comm& History Credentials in Files File and Directory Discovery
Logon Scripts Data from Local System Custom Cryptographic Protocol Exfiltration Over Alternative Protocol Disk Structure Wipe
Spearphishing Attachment Dynamic Data Exchange Application Shimming Bypass User Account Control CMSTP Credentials in Registry Network Service Scanning Pass the Hash Data from Network Shared Drive Data Encoding Exfiltration Over Commvà and Control Channel Endpoint Denial of Service
Spearphishing Link Execution through API Authentication Package DLL Search Order Hijacking Code Signing
Exploitation for Credential Access Network Share Discovery Pass the Ticket Data from Removable Media Data Obfuscation Exfiltration Over Other Network Medium Firmware Corruption
Spearphishing via Service Execution through Module Load BITS Jobs Dylib Hijacking Compile After Delivery Forced Authentication Network Sniffing Remote Desktop Protocol
Data Staged Domain Fronting Exfiltration Over Physical Medium Inhibit System Recovery
Supply Chain Compromise Exploitation for Client Execution Bootkit Exploitation for Privilege Escalation Compiled HTML File Hooking

Xem thêm: Download Adobe Indesign Cc 2020 Portable, Download Adobe Indesign Cc 2020 Mới Nhất

Domain Generation Algorithms Scheduled Transfer Network Denial of Service
Trusted Relationship Graphical User Interface Browser Extensions Extra Window Memory Injection Component Firmware Input Capture Peripheral Device Discovery
Remote Services Input Capture Fallback Channels Resource Hijacking
Valid Accounts InstallUtil Change Default File Association File System Permissions Weakness Component Object Model Hijacking Input Prompt Permission Groups Discovery Replication Through Removable Media Man in the Browser Multi-hop Proxy Runtime Data Manipulation
Launchctl Component Firmware Hooking
Control Panel Items Kerberoasting Process Discovery Shared Webroot Screen Capture Multi-Stage Channels Service Stop
Local Job Scheduling Component Object Model Hijacking Image File Execution Options Injection DCShadow Keychain Query Registry
SSH Hijacking Video Capture Multib& Communication Stored Data Manipulation
LSASS Driver Create Account Launch Daemon Deobfuscate/Decode Files or Information LLMNR/NBT-NS Poisoning và Relay Remote System Discovery Taint Shared Content Multilayer Encryption Transmitted Data Manipulation
Mshta DLL Search Order Hijacking New Service Disabling Security Tools Network Sniffing Security Software Discovery Third-tiệc nhỏ Software Port Knocking
PowerShell Dylib Hijacking Path Interception DLL Search Order Hijacking Password Filter DLL System Information Discovery Windows Admin Shares Remote Access Tools
Regsvcs/Regasm External Remote Services Plist Modification DLL Side-Loading Private Keys System Network Configuration Discovery Windows Remote Management Remote File Copy
Regsvr32 File System Permissions Weakness Port Monitors Execution Guardrails Securityd Memory System Network Connections Discovery Standard Application Layer Protocol
Rundll32 Hidden Files và Directories Process Injection
Exploitation for Defense Evasion Two-Factor Authentication Interception System Owner/User Discovery Standard Cryptographic Protocol
Scheduled Task Hooking
Scheduled Task Extra Window Memory Injection System Service Discovery Standard Non-Application Layer Protocol
Scripting Hypervisor Service Registry Permissions Weakness File Deletion
Image File Execution Options Injection Setuid và Setgid File Permissions Modification Virtualization/Sandbox Evasion Web Service
Signed Binary Proxy Execution Kernel Modules và Extensions
SID-History Injection File System Logical Offsets
Signed Script Proxy Execution Launch Agent Startup Items Gatekeeper Bypass
Source Launch Daetháng Subởi vì Group Policy Modification
Space after Filename Launchctl Suvì Caching Hidden Files & Directories
Third-các buổi tiệc nhỏ Software LC_LOAD_DYLIB Addition Valid Accounts Hidden Users
Trap Local Job Scheduling Web Shell Hidden Window
Trusted Developer Utilities Login Item HISTCONTROL
User Execution Logon Scripts Image File Execution Options Injection
Windows Management Instrumentation LSASS Driver Indicator Blocking
Windows Remote Management Modify Existing Service Indicator Removal from Tools
XSL Script Processing Netsh Helper DLL Indicator Removal on Host
New Service Indirect Command Execution
Office Application Startup Install Root Certificate
Path Interception InstallUtil
Pmenu Modification Launchctl
Port Knocking LC_MAIN Hijacking
Port Monitors Masquerading
Rc.comtháng Modify Registry
Re-opened Applications Mshta
Redundant Access Network Share Connection Removal
Registry Run Keys / Startup Folder NTFS File Attributes
Scheduled Task Obfuscated Files or Information
Screensaver Pdanh sách Modification
Security Support Provider Port Knocking
Service Registry Permissions Weakness Process Doppelgänging
Setuid & Setgid Process Hollowing
Shortcut Modification Process Injection
SIP and Trust Provider Hijacking Redundant Access
Startup Items Regsvcs/Regasm
System Firmware Regsvr32
Systemd Service Rootkit
Time Providers Rundll32
Trap Scripting
Valid Accounts Signed Binary Proxy Execution
Web Shell Signed Script Proxy Execution
Windows Management Instrumentation Event Subscription SIP. and Trust Provider Hijacking
Winlogon Helper DLL Software Packing
Space after Filename
Template Injection
Trusted Developer Utilities
Valid Accounts
Virtualization/Sandbox Evasion
Web Service
XSL Script Processing
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Commvà and Control Exfiltration Impact
Service Execution

Bài viết liên quan