Behavioral task
behavioral1
Sample
c267365aac51821cee713f8ac2e35efe172b21d90d63d9fa5c696ff9223b16ab.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c267365aac51821cee713f8ac2e35efe172b21d90d63d9fa5c696ff9223b16ab.pdf
Resource
win10v2004-20240226-en
General
-
Target
c267365aac51821cee713f8ac2e35efe172b21d90d63d9fa5c696ff9223b16ab
-
Size
5.2MB
-
MD5
bb0cde555249e39b945b97f4c512a6ea
-
SHA1
cfc1de3f7e5519f2a9af055ad45eccfd70b9a032
-
SHA256
c267365aac51821cee713f8ac2e35efe172b21d90d63d9fa5c696ff9223b16ab
-
SHA512
011aa03a0dbbfbab718f6b54ce636b5b147a25b81d3e071768b974c797fde9aed9e7fad69e64201c91db2322a36294d1316b520affcd1d3a00e5319f2bec3e76
-
SSDEEP
98304:/SgEA7mMl4YRZQmaPnsc7Oxy6LvkdYEpqEsBVKrj2dHf+56XRDNAa:/TEA7mq4GQmX3xyggpHuYrjK/+gEa
Malware Config
Signatures
Files
-
c267365aac51821cee713f8ac2e35efe172b21d90d63d9fa5c696ff9223b16ab.pdf
-
https://www.alteredsecurity.com/
-
https://github.com/samratashok/
-
https://github.com/OmerYa/Invisi-Shell
-
https://github.com/RythmStick/AMSITrigger
-
https://github.com/t3hbb/DefenderCheck
-
https://github.com/danielbohannon/Invoke-Obfuscation
-
https://adlab.enterprisesecurity.io/
-
https://learn.microsoft.com/en-us/powershell/module/activedirectory/?view=windowsserver2022-ps
-
https://github.com/samratashok/ADModule
-
https://github.com/BloodHoundAD/BloodHound
-
https://github.com/tevora-threat/SharpView/
-
https://github.com/Leo4j/Invoke-SessionHunter
-
https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc
-
https://github.com/enjoiz/Privesc
-
https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
-
https://github.com/SpecterOps/BloodHound
-
https://crtpbloodhound-altsecdashboard.msappproxy.net/
-
https://github.com/matterpreter/DefenderCheck
-
https://github.com/mkaring/ConfuserEx
-
https://github.com/Flangvik/NetLoader
-
https://github.com/samratashok/RACE
-
https://github.com/leechristensen/SpoolSample
-
https://github.com/p0dalirius/Coercer
-
https://github.com/GhostPack/Certify
-
https://github.com/NetSPI/PowerUpSQL
-
https://security.microsoft.com/
-
https://github.com/WhiteOakSecurity/MiniDumpDotNet
-
https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/
-
https://learn.microsoft.com/en-us/windows/security/application-security/application-control/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control
-
https://github.com/canix1/ADACLScanner
-
https://github.com/samratashok/Deploy-Deception
-
https://learn.microsoft.com/en-us/security/privileged-access-workstations/overview
-
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory
-
https://www.alteredsecurity.com/online-labs
-
https://www.alteredsecurity.com/bootcamps
-
https://discord.com/invite/vcEwaRMwJe
-
https://alteredsecurity.com/AlteredSecurityAttacking
-
https://github.com/samratashok/en-USen-USCreator
-
http://PowerView.ps
-
http://payload.ps
-
http://evil.ps
-
http://h.open
-
https://github.com/OmerYa/Invisi-Shellen-IN
-
https://github.com/RythmStick/AMSITriggeren-IN
-
https://github.com/t3hbb/DefenderChecken-IN
-
http://Invoke-PowerShellTcp_Detected.ps
-
http://en-USDefenderCheck.exePowerUp.ps
-
https://github.com/danielbohannon/Invoke-Obfuscationen-IN
-
http://Invoke-Mimi.ps
-
http://Invoke-MimiEx.ps
-
https://learn.microsoft.com/en-us/powershell/module/activedirectory/?view=windowsserver2022-psen-UShttps://github.com/samratashok/ADModuleen-INImport-Module
-
https://github.com/BloodHoundAD/BloodHounden-USen-USPowerView
-
https://github.com/ZeroDayLab/PowerSploit/blob/master/Recon/PowerView.ps1en-US.
-
https://github.com/tevora-threat/SharpView/AlteredSecurityAttacking
-
http://blocked.en-USen-USSeeFind-WMILocalAdminAccess.ps1andFind-PSRemotingLocalAdminAccess.ps
-
https://github.com/Leo4j/Invoke-SessionHunteren-US
-
https://github.com/PowerShellMafia/PowerSploit/tree/master/Privescen-USen-USPrivesc:
-
https://github.com/enjoiz/Privescen-USen-USwinPEAS-en-UShttps://github.com/carlospolop/PEASS-ng/tree/master/winPEASAlteredSecurityAttacking
-
https://github.com/BloodHoundAD/BloodHounden-US2.
-
https://github.com/SpecterOps/BloodHounden-USen-USBloodHoundLegacy
-
https://crtpbloodhound-altsecdashboard.msappproxy.net/en-USUse
-
http://altsecdashboard.onmicrosoft.com
-
https://adlab.enterprisesecurity.io/AlteredSecurityAttacking
-
http://SharpHound.ps
-
http://Get-PassHashes.ps
-
https://github.com/bohops/WSMan-WinRMAlteredSecurityAttacking
-
https://github.com/matterpreter/DefenderChecken-IN
-
http://Out-CompressedDll.ps
-
http://mimikatz_trunk.zip
-
https://github.com/mkaring/ConfuserExen-IN
-
https://github.com/Flangvik/NetLoaderen-IN
-
http://Invoke-PowerShellTcp.ps
-
https://github.com/samratashok/RACEen-IN
-
http://Invoke-SDPropagator.ps
-
http://RACE.ps
-
https://github.com/leechristensen/SpoolSampleen-US
-
https://github.com/p0dalirius/Coerceren-US
-
https://github.com/GhostPack/Certifyen-IN
-
https://github.com/NetSPI/PowerUpSQLAlteredSecurityAttacking
-
https://adlab.enterprisesecurity.io/en-USen-USOur
-
https://github.com/WhiteOakSecurity/MiniDumpDotNeten-US
-
https://github.com/WhiteOakSecurity/MiniDumpDotNet.git
-
http://proc.sz
-
http://proc.th
-
https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/AlteredSecurityAttacking
-
https://learn.microsoft.com/en-us/windows/security/application-security/application-control/introduction-to-en-USdevice-guard-virtualization-based-security-and-windows-defender-application-controlAlteredSecurityAttacking
-
http://lolbas-project.github.io
-
https://github.com/canix1/ADACLScannerAlteredSecurityAttacking
-
https://github.com/samratashok/Deploy-Deceptionen-USen-USNote
-
https://learn.microsoft.com/en-us/security/privileged-access-workstations/overviewen-USBest
-
https://learn.microsoft.com/en-us/windows-server/identity/ad-en-USds/plan/security-best-practices/best-practices-for-securing-active-directoryAlteredSecurityAttacking
-
https://www.alteredsecurity.com/online-labsen-USen-USFor
-
https://www.alteredsecurity.com/bootcampsen-USen-USFor
-
https://discord.com/invite/vcEwaRMwJeAlteredSecurityAttacking
- Show all
-