These indicators are patterns that can be used to detect malicious activity.
File Hashes:
- SHA-256 Hash:
CA47C8710C4FFB4908A42BD986B14CDDCCA39E30BB0B11ED5CA16FE8922A468B
- Multiple Hashes: This indicator includes a SHA-1 hash, a SHA-256 hash, and an MD5 hash, suggesting multiple ways to identify a specific malicious file:
- SHA-1:
1239288A5876C09D9F0A67BCFD645735168A7C80
- SHA-256:
19CC41A0A056E503CC2137E19E952814FBDF14F8D83F799AEA9B96ABFF11EFBB
- MD5:
4AFDC05708B8B39C82E60ABE3ACE55DB
- SHA-1:
Domain Names: The following domain names are identified as indicators, meaning they are likely associated with malicious infrastructure (e.g., Command and Control servers, phishing sites):
cjlaspcorne.icu
owlflright.digital
seallysl.site
quilltayle.live
smeltingt.run
jawdedmirror.run
medicinebuckerrysa.pw
computeryrati.site
nestlecompany.pro
authorizev.site
piratetwrath.run
mercharena.biz
wallkedsleeoi.shop
gutterydhowi.shop
jrxsafer.top
quavabvc.top
calmingtefxtures.run
rambutanvcx.run
These IOCs can be used by security professionals to identify and block connections to malicious infrastructure and detect known malicious files within their networks. The document also lists various MITRE ATT&CK patterns, which describe common adversary tactics and techniques.
No comments:
Post a Comment