Behavioral task
behavioral1
Sample
EvadingEDR.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EvadingEDR.pdf
Resource
win10v2004-20240802-en
General
-
Target
EvadingEDR.pdf
-
Size
13.4MB
-
MD5
238c0019aa2cd071918f380864c55221
-
SHA1
733394b2d7413f672db92205f75354ba71f5bcef
-
SHA256
93a39a7519a84b6296220dcb2e234c970cb36cf3f90d0d12593e8aefcce10bdd
-
SHA512
a6492633a59a38bcb71840ad3d22bec17b86188f100752ebfad9e870cf798ecab7b794d47467c26dba5a18251c9f2edb56985a49eebafcfaa47f7b354e7aea76
-
SSDEEP
196608:DxF+RfWllj0y6hZKvUaAh+S6LaAi6P4RcwpTDoR17s8YfbwwsTHpE780SzBPZ:D3I+llItZKvUX6OAi6PIBXy5fH6wr
Malware Config
Signatures
Files
-
EvadingEDR.pdf.pdf
-
http://2-4.mov
-
http://65CallTreeToJSON.py
-
http://6a377823-cff4-11ec-967c-000c29760114displayData.name
-
http://CallTreeToJSON.py
-
http://FileAssoc.ps
-
http://Set-FileAssoc.ps
-
http://action.int
-
http://blnfordtools.com
-
http://brevity.int
-
http://f.name
-
http://nostarch.com
-
http://overwritten.mov
-
http://process.name
-
http://[email protected]
-
http://schemas.microsoft.com/win/2004/08/events/event
-
http://sha256timestamp.ws.symantec.com/sha256/timestamp
-
http://structure.int
-
http://technique.int
-
http://www.nostarch.com
-
https://evil.com/payloadl.ps1
-
https://github.com/GhostPack/SafetyKatz
-
https://github.com/hasherezade/
-
https://github.com/hasherezade/process_ghosting/releases
-
https://learn.microsoft.com/en-us/windows/win32/api
-
https://learn.microsoft.com/en-us/windows/win32/api.Because
-
https://nostarch.com/evading-edr
-
https://www.learn-c.org
- Show all
-