text
stringlengths 4
429
|
---|
goes
|
show
|
that
|
opening
|
attachment
|
exploited
|
vulnerability
|
caused
|
process
|
named
|
GoogleTray.exe
|
launch
|
connect
|
mail.hfmforum.com/microsoftupdate/getupdate/default.aspx
|
Related
|
Backdoor
|
Beaconing
|
Pattern
|
linking
|
domain
|
registration
|
information
|
from
|
some
|
C&Cs
|
observed,
|
were
|
able
|
determine
|
other
|
domains
|
used
|
this
|
malicious
|
actor/group.
|
specific
|
example
|
this
|
following
|
registration
|
information
|
observed
|
MSUpdater
|
Trojan
|
domain:
|
http://ilta.ebiz.uapps.net/ProductFiles/productfiles/782804/2011siems.pptx
|
2012
|
Zscaler
|
Inc.
|
Seculert
|
Ltd.
|
Rights
|
Reserved.
|
Figure
|
WHOIS
|
information
|
domains
|
This
|
contact
|
information
|
used
|
other
|
domains
|
that
|
have
|
some
|
open-
|
source
|
reports
|
usage,
|
example:
|
SISEAU.COM
|
VSSIGMA.COM
|
These
|
domains
|
have
|
open-
|
source
|
reports
|
tied
|
malware
|
samples
|
with
|
hashes:
|
3459BC37967480DEE405A5AC678B942D2
|
6631815D4AB2A586021C24E02E5CC4513
|
Communication
|
these
|
domains
|
also
|
observed
|
with
|
following
|
communication
|
path
|
pattern:
|
/search[RndNum1]?h1=[Num1]&h2=[Num2]&h3=[String1]&h4=[String2]
|
example:
|
/search521649?h1=51&h2=1&h3=N07630&h4=FKFDFDAHAEBAEPFLFK
|
number
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.