Ongoing campaign loads DLL that claims to be txt file into memory. Follow on activity from both and

C2 8.208.90.2, 47.241.106.208, various domains usually starting with f1[.]pipen[.]at

IOC's in @MISPProject Priv.

thedfirreport.com/2020/04/24/u …pic.twitter.com/0OoRNLWZBO

#dfir #cobaltstrike #tvrat #Ursnif

Last updated 5 years ago