General

  • Target

    Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats (Gerard Johansen) (z-lib.org).pdf

  • Size

    67.6MB

  • Sample

    220911-hb53caeghj

  • MD5

    4b05d8c40a8facdea608f8a5dba6cd06

  • SHA1

    c4c27a817c6b63164d1de3e0889302b5d92c2d7d

  • SHA256

    e84fcb4980ba29bec4425981d3339e70b20c80516ad299f5f3f5c1d14e720155

  • SHA512

    2b016df3a9514ddeb9ea6dc84c5b5b26ef06890b3310f44ec694fcec5d94d38eddf152ab1ba490012ec47aa3282715cb74353378bca6416ff636c82ac781b9fc

  • SSDEEP

    1572864:X2OPjqNkw83WJ12SzWsMWFNZjh5XLZZFYc9Hg4viub6:mO7qNklwASd9jh5VZ2c24quW

Score
3/10

Malware Config

Targets

    • Target

      Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats (Gerard Johansen) (z-lib.org).pdf

    • Size

      67.6MB

    • MD5

      4b05d8c40a8facdea608f8a5dba6cd06

    • SHA1

      c4c27a817c6b63164d1de3e0889302b5d92c2d7d

    • SHA256

      e84fcb4980ba29bec4425981d3339e70b20c80516ad299f5f3f5c1d14e720155

    • SHA512

      2b016df3a9514ddeb9ea6dc84c5b5b26ef06890b3310f44ec694fcec5d94d38eddf152ab1ba490012ec47aa3282715cb74353378bca6416ff636c82ac781b9fc

    • SSDEEP

      1572864:X2OPjqNkw83WJ12SzWsMWFNZjh5XLZZFYc9Hg4viub6:mO7qNklwASd9jh5VZ2c24quW

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks