China-based Fangxiao group behind a long-running phishing campaign
A China-based financially motivated group, tracked as Fangxiao, is behind a large-scale phishing campaign dating back as far as 2019. Researchers...
A China-based financially motivated group, tracked as Fangxiao, is behind a large-scale phishing campaign dating back as far as 2019. Researchers...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:raccoon, family:redline, family:smokeloader, family:vidar, botnet:05ad9c5ec543eb32dfa8e77bcd579c06, botnet:1827, botnet:517, botnet:5m, botnet:mario23_10, backdoor, collection, discovery, evasion, infostealer, persistence,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 6f4d157d440bbb29905c20b50c428f83SHA1: 8418cf4d252ee2ac8f9fa64fa1c362b9be4ffbc5ANALYSIS DATE: 2022-11-18T03:41:09ZTTPS: T1222, T1053, T1012, T1082,...
Score: 10 MALWARE FAMILY: dcratTAGS:family:dcrat, family:djvu, family:raccoon, family:redline, family:smokeloader, family:vidar, botnet:05ad9c5ec543eb32dfa8e77bcd579c06, botnet:1827, botnet:517, botnet:5m, botnet:mario23_10, backdoor, collection, discovery, evasion, infostealer,...
Score: 7 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: 9f3522bc02122b36a3f56dd7f10d89a8SHA1: d17952baa029eeb4553fa6f70e042e8f2c49a1ecANALYSIS DATE: 2022-11-18T04:28:27ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 3c3e6245a9f9f3c0dc1943d4821353e2SHA1: 3413cc858da15a7aa8e3cc9124a69faa97cc0e74ANALYSIS DATE: 2022-11-18T05:32:31ZTTPS: T1060, T1112, T1082, T1005,...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:raccoon, family:redline, family:smokeloader, family:vidar, botnet:05ad9c5ec543eb32dfa8e77bcd579c06, botnet:1827, botnet:517, botnet:5m, botnet:mario23_10, botnet:srt123, backdoor, collection, discovery, evasion, infostealer,...