Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.cybereason.com/blog/research/portdoor-new-chinese-apt-backdoor-attack-targets-russian-defense-sector
Resource
win7-20231215-en
URLScan
Powered by URLScan.io, see original Report.
Community
Engines
Overall
URLScan
Screenshots May contain NSFW images

Links
-
hxxps://nao-sec[.]org/2020/01/an-overhead-view-of-the-royal-road[.]html
-
hxxps://malpedia[.]caad[.]fkie[.]fraunhofer[.]de/actor/tick
-
hxxps://malpedia[.]caad[.]fkie[.]fraunhofer[.]de/actor/tonto_team
-
hxxps://malpedia[.]caad[.]fkie[.]fraunhofer[.]de/actor/ta428
-
hxxps://en[.]wikipedia[.]org/wiki/Rubin_Design_Bureau
-
hxxps://malpedia[.]caad[.]fkie[.]fraunhofer[.]de/details/win[.]8t_dropper
-
hxxps://support[.]microsoft[.]com/en-us/office/equation-editor-6eac7d71-3c74-437b-80d3-c7dea24fdf3f
-
hxxps://cve[.]mitre[.]org/cgi-bin/cvename[.]cgi?name=CVE-2017-11882
-
hxxps://cve[.]mitre[.]org/cgi-bin/cvename[.]cgi?name=CVE-2018-0798
-
hxxps://cve[.]mitre[.]org/cgi-bin/cvename[.]cgi?name=CVE-2018-0802
-
hxxps://malpedia[.]caad[.]fkie[.]fraunhofer[.]de/actor/hellsing
-
hxxps://malpedia[.]caad[.]fkie[.]fraunhofer[.]de/actor/rancor
-
hxxps://www[.]gidropribor[.]ru/en/
-
hxxps://en[.]wikipedia[.]org/wiki/Autonomous_underwater_vehicle
-
hxxps://attack[.]mitre[.]org/techniques/T1070/006/
-
hxxps://support[.]microsoft[.]com/en-us/office/load-or-unload-a-template-or-add-in-program-2479fe53-f849-4394-88bb-2a6e2a39479d
-
hxxps://attack[.]mitre[.]org/techniques/T1134/001/
-
hxxps://blog[.]talosintelligence[.]com/2020/03/bisonal-10-years-of-play[.]html
-
hxxps://unit42[.]paloaltonetworks[.]com/unit42-bisonal-malware-used-attacks-russia-south-korea/
-
hxxps://attack[.]mitre[.]org/techniques/T1592/
-
hxxps://attack[.]mitre[.]org/techniques/T1566/001/
-
hxxps://attack[.]mitre[.]org/techniques/T1059/003/
-
hxxps://attack[.]mitre[.]org/techniques/T1137/006/
-
hxxps://attack[.]mitre[.]org/techniques/T1055/
-
hxxps://attack[.]mitre[.]org/techniques/T1036/005/
-
hxxps://attack[.]mitre[.]org/techniques/T1497/
-
hxxps://attack[.]mitre[.]org/techniques/T1573/
-
hxxps://attack[.]mitre[.]org/techniques/T1083/
-
hxxps://attack[.]mitre[.]org/techniques/T1071/
-
hxxps://attack[.]mitre[.]org/techniques/T1082/
-
hxxps://attack[.]mitre[.]org/techniques/T1090/002/
-
hxxps://attack[.]mitre[.]org/techniques/T1027/
-
hxxps://attack[.]mitre[.]org/techniques/T1124/
-
hxxps://attack[.]mitre[.]org/techniques/T1057/
-
hxxps://attack[.]mitre[.]org/techniques/T1218/011/
-
hxxps://twitter[.]com/intent/tweet?original_referer=hxxps://www[.]cybereason[.]com/blog/research/portdoor-new-chinese-apt-backdoor-attack-targets-russian-defense-sector&utm_medium=social&utm_source=twitter&url=hxxps://www[.]cybereason[.]com/blog/research/portdoor-new-chinese-apt-backdoor-attack-targets-russian-defense-sector&utm_medium=social&utm_source=twitter&source=tweetbutton&text=
-
hxxp://www[.]facebook[.]com/share[.]php?u=hxxps://www[.]cybereason[.]com/blog/research/portdoor-new-chinese-apt-backdoor-attack-targets-russian-defense-sector&utm_medium=social&utm_source=facebook
-
hxxp://www[.]linkedin[.]com/shareArticle?mini=true&url=hxxps://www[.]cybereason[.]com/blog/research/portdoor-new-chinese-apt-backdoor-attack-targets-russian-defense-sector&utm_medium=social&utm_source=linkedin
-
hxxps://www[.]linkedin[.]com/company/cybereason
-
hxxps://twitter[.]com/cr_nocturnus
-
hxxps://www[.]facebook[.]com/Cybereason/
-
hxxps://twitter[.]com/cybereason
-
hxxps://www[.]youtube[.]com/channel/UCOm7AaB0HiNH4Phe66sK0Ew
-
hxxps://www[.]instagram[.]com/cybereason
-
hxxps://cookiepedia[.]co[.]uk/giving-consent-to-cookies
-
hxxps://www[.]onetrust[.]com/products/cookie-consent/