Article: Hunting COM Objects - published over 5 years ago. Content: COM objects have recently been used by penetration testers, Red Teams, and malicious actors to perform lateral movement. COM objects were studied by several other researchers in the past, including Matt Nelson (enigma0x3), who published a blog post about it in 2017. Some of these COM objects were also added to the Empire project. To improve the R... http://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html Published: 2019 06 04 14:45:00 Received: 2021 11 03 23:00:22 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: HiddenWasp Linux malware backdoor samples - published over 5 years ago. Content: Intezer HiddenWasp Malware Stings Targeted Linux Systems Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress) Links updated: Jan 19, 2023 File informatio 8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b 8f1c51c4963c0bad6cf04444feb411d7 shell f321685342fa373c33eb9479176a086a1c56c90a1826a... https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html Published: 2019 06 04 04:31:00 Received: 2024 03 13 18:00:17 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor