Behavioral task
behavioral1
Sample
6acdb99d2f3dd5fd1ccb4d89b7cc4aed13a4152980c785feeae87fb17aef1c1e.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6acdb99d2f3dd5fd1ccb4d89b7cc4aed13a4152980c785feeae87fb17aef1c1e.pdf
Resource
win10v2004-20240226-en
General
-
Target
6acdb99d2f3dd5fd1ccb4d89b7cc4aed13a4152980c785feeae87fb17aef1c1e
-
Size
1.4MB
-
MD5
575a0994590373b10a3318c05e3caa37
-
SHA1
7c7383f1f8b6cdca591935ffab6a154a1a92fe2d
-
SHA256
6acdb99d2f3dd5fd1ccb4d89b7cc4aed13a4152980c785feeae87fb17aef1c1e
-
SHA512
a8ac261d1e804c2794744ed76ea3842468c5e6efb3d8a857c792d17b616f2a72d8d8e00a2d9c2c4b18f67f0df025a34efa57c88ac2a40784704e794fe2d897d1
-
SSDEEP
24576:bQfXoqshdhlRIUhDC0Qitn2mIvSIYJLBx+uxU38Wb7qUwggpaDlOCAVQ:SozG0QitnrIOJ2l8WbkgSaDwCYQ
Malware Config
Signatures
Files
-
6acdb99d2f3dd5fd1ccb4d89b7cc4aed13a4152980c785feeae87fb17aef1c1e.pdf
-
https://www.cyber.gov.au/about-us/about-acsc/contact-us
-
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-ism-mapping
-
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism
-
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight
-
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/strategies-mitigate-cyber-security-incidents
-
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide
-
https://www.sans.org/blog/bloodhound-sniffing-out-path-through-windows-domains/
-
https://learn.microsoft.com/en-au/windows/release-health/release-information
-
https://docs.microsoft.com/en-au/windows/security/identity-protection/credential-guard/credential-guard-manage
-
https://learn.microsoft.com/en-au/windows/security/identity-protection/credential-guard/credential-guard-requirements
-
https://docs.microsoft.com/en-au/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules
-
https://learn.microsoft.com/en-au/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
-
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock
-
https://learn.microsoft.com/en-au/azure/active-directory/fundamentals/security-operations-privileged-accounts
-
https://learn.microsoft.com/en-au/azure/active-directory/fundamentals/service-accounts-group-managed
-
https://www.microsoft.com/en-au/download/details.aspx?id=46899
-
https://learn.microsoft.com/en-au/services-hub/health/remediation-steps-ad/regularly-check-for-and-remove-inactive-user-accounts-in-active-directory
-
https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines
-
https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-hardening/hardening-microsoft-365-office-2021-office-2019-and-office-2016
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
-
https://www.microsoft.com/en-us/msrc
-
https://isc.sans.edu/
-
https://www.google.com.au/
-
https://adblock-tester.com/
-
https://www.whatismybrowser.com/detect/is-java-installed
-
https://docs.microsoft.com/en-us/powershell/module/applocker/get-applockerpolicy?view=windowsserver2022-ps
-
https://docs.microsoft.com/en-us/powershell/module/applocker/test-applockerpolicy?view=windowsserver2022-ps
-
https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/remote-working-and-secure-mobility/secure-mobility
-
https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/outsourcing-and-procurement/cloud-security-guidance
-
https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-hardening/hardening-linux-workstations-and-servers
-
https://partners.cyber.gov.au/
-
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-faq
-
https://www.google.com.au
-
https://support.google.com/chrome/a/answer/9710898?hl=en.
-
https://www.adobe.com/devnet-docs/acrobatetk/tools/AppSec/Acrobat%20Application%20Security%20Guide.pdf.
- Show all
-