Behavioral task
behavioral1
Sample
AA21-077A-Detecting_Post-Compromise_Threat_Activity_Using_CHIRP_508.pdf
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
AA21-077A-Detecting_Post-Compromise_Threat_Activity_Using_CHIRP_508.pdf
Resource
win10-en-20211104
General
-
Target
AA21-077A-Detecting_Post-Compromise_Threat_Activity_Using_CHIRP_508.pdf
-
Size
243KB
-
MD5
d45b2bcb634e2d0cf063c082889bbebc
-
SHA1
fe368a8a74a298d0cfb86ec16955dfa53aa8a664
-
SHA256
534263edccea45c6f46aaa418554bf6d2815358d281718a03decfef960032687
-
SHA512
4944795cb354c10ac0c0244f55b4cbbdd1ac67e58de854fbdf65c119eb4ea23e27424ff849b165aadcd9f1ceab5d8959c71436c6aaed7353a207c271c916a53c
Malware Config
Signatures
Files
-
AA21-077A-Detecting_Post-Compromise_Threat_Activity_Using_CHIRP_508.pdf.pdf
-
https://github.com/cisagov/CHIRP
-
https://us-cert.cisa.gov/report
-
https://us-cert.cisa.gov/ncas/analysis-reports/ar21-039b
-
https://us-cert.cisa.gov/ncas/alerts/aa21-008a
-
https://us-cert.cisa.gov/ncas/alerts/aa20-352a
-
https://github.com/cisagov
-
https://github.com/cisagov/Sparrow
-