text
stringlengths 4
429
|
---|
Figure
|
Related
|
Malware
|
Initial
|
Check-
|
Request
|
check-
|
request
|
values
|
correspond
|
following
|
meanings:
|
parameter
|
value
|
corresponds
|
Windows
|
version,
|
Windows
|
(version
|
5.1)
|
parameter
|
value
|
victim
|
identification
|
string
|
created
|
encoding
|
volume
|
serial
|
number
|
victim
|
system
|
concatenated
|
with
|
random
|
number
|
string
|
within
|
user-
|
agent
|
(BKANAHEAFPEM)
|
result
|
encoding
|
victim
|
machine
|
name
|
number
|
following
|
search5
|
path
|
random
|
remaining
|
hard-
|
coded
|
Trojan.
|
BHI06233
|
string
|
thought
|
related
|
actor
|
group
|
related
|
targets
|
campaign,
|
where
|
stand
|
Baker
|
Hughes
|
https://www.virustotal.com/file/d8a976979d4eeaf7485249c49d4a31824638a49dac308c5114c113b4a3eed9c9/analysis/1300216834/
|
2012
|
Zscaler
|
Inc.
|
Seculert
|
Ltd.
|
Rights
|
Reserved.
|
International
|
along
|
with
|
other
|
companies
|
oil,
|
gas,
|
energy
|
sector
|
were
|
focus
|
some
|
targeted
|
attacks.19
|
data
|
check-
|
HTTP
|
communication
|
from
|
encoded
|
using
|
single-
|
byte
|
XORing
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.