Just Another Blue Teamer · @LeeArchinal
77 followers · 130 posts · Server ioc.exchange

Happy Tuesday everyone! is the topic of today's , specifically ThreatMon takes a deep-dive into the malware, which is a remote access trojan (RAT). Enjoy and Happy Hunting!

Link to article in the comments!

***AS usual I am going to leave one of the MITRE ATT&CK blank. I would like to see if any of you that see this can help FILL in that blank! If so, leave your thoughts in the comments OR send me a DM!***

Notable MITRE ATT&CK TTPs:
TA0007 - Discovery
T1087 - Account Discovery
T1083 - File and Directory Discovery
T1018 - Remote System Discovery
T1082 - System Information Discovery

TA0009 - Collection
T[What technique covers the threat actor capturing information under the TEMP folder?] - Good luck!

TA0011 - Command And Control
T1071.001 - Application Layer Protocol: Web Protocols

TA0002 - Execution
T1059.003 - Command and Scripting Interpreter: Windows Command Shell

#apt37 #readoftheday #RokRat #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting

Last updated 2 years ago

Redhotcyber · @redhotcyber
491 followers · 1005 posts · Server mastodon.bida.im
Anonymous :anarchism: 🏴 · @YourAnonRiots
5520 followers · 34007 posts · Server mstdn.social

ScarCruft, the North Korean threat group behind , has adapted to the blocking of macros by using oversized LNK files.

thehackernews.com/2023/05/nort

#CyberSecurity #Hacking #InfoSec #Malware #RokRat

Last updated 2 years ago