General

  • Target

    Incident Response in the Age of Cloud Techniques and best practices to effectively respond to cybersecurity incidents (Erdal Ozkaya) (z-lib.org).pdf

  • Size

    40.6MB

  • Sample

    220911-rr1x1abgd3

  • MD5

    e42ff3dc29d98d01e72198f6fd6f0edf

  • SHA1

    e12e3cdace48a7ca82252ad8c1d9724fc28bd03e

  • SHA256

    ad9a997727e3fefa9b58b8b823e25bd7f6e01c116ea4cfaa1d836cea8f537ce3

  • SHA512

    d1f4de87f15fb06cbf7781c592d6a499531cd5feb0deef5e7f4a4109534a9137f68215a46476b1da002274f8644787ad77f34070e1cf22e74b59ac9620c4f7ba

  • SSDEEP

    786432:h567tCUNCKybR4iHo5b44NSV53FiNvFv6ON1Mq3hYCMMHSSLG4iU4WA6xa:X0nqgFNSVLGFvNSq3hVnVLG453s

Score
3/10

Malware Config

Targets

    • Target

      Incident Response in the Age of Cloud Techniques and best practices to effectively respond to cybersecurity incidents (Erdal Ozkaya) (z-lib.org).pdf

    • Size

      40.6MB

    • MD5

      e42ff3dc29d98d01e72198f6fd6f0edf

    • SHA1

      e12e3cdace48a7ca82252ad8c1d9724fc28bd03e

    • SHA256

      ad9a997727e3fefa9b58b8b823e25bd7f6e01c116ea4cfaa1d836cea8f537ce3

    • SHA512

      d1f4de87f15fb06cbf7781c592d6a499531cd5feb0deef5e7f4a4109534a9137f68215a46476b1da002274f8644787ad77f34070e1cf22e74b59ac9620c4f7ba

    • SSDEEP

      786432:h567tCUNCKybR4iHo5b44NSV53FiNvFv6ON1Mq3hYCMMHSSLG4iU4WA6xa:X0nqgFNSVLGFvNSq3hVnVLG453s

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks