text
stringlengths
4
429
targeted
attacks.
This
report
provided
some
insight
into
threat
draws
information
available
open-
source.
particular,
beaconing
patterns
indicators
were
identified
facilitate
detection
threat.
Additionally,
related
malware
samples
(see
Appendix
malware
family
names,
such
Ovoxual
have
been
listed
further
identification
related
samples.
Based
information
available,
threat
arrives
phishing
emails
with
attachment,
possibly
related
conferences
particular
targeted
industry.
exploits
vulnerabilities
within
Adobe
(for
example,
exploit
used
against
CVE-
2010-
2883)
drops
series
files
begin
communicating
with
command
control
(C&C).
binary
dropped
launched
from
exploit
virtual
machine
(VM)
aware
order
prevent
analysis
within
sandbox.
detected,
will
drop
executable
(often
named
msupate.exe
which
also