IoC Extractor
This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.
Detecting Ongoing STARK#MULE Attack Campaign Targeting Victims Using US Military Document LuresDATE : 2023-07-26T07:00:00
SOURCE : securonix.comFILE_HASH_SHA256:E4A8610461D3B3C534346B9C874EDFF6D37CA085D578365FF75B25F682EC5FD0
6149D861F38DB6D6F5110B234EDB1BA31800F7EB621AD27B6CBF99F05DDEAE18
019E4327B8292DAD32C92209A1E0FA03636381B1163AC57941CD8CC711A40097
89062A28F33021539AB3D197C124040177E5AE94A05E1AC7A4F1C852D6B498CF
7893C8B41A2E4281E73A1761061AC9EEE52920B6840E43697AABF606F701D11A
C90EBF988F96C9A51D6AD0B23AD7260C6B7F8D3B7C905ACC20E18A7227E46237
6F11C52F01E5696B1AC0FAF6C19B0B439BA6F48F1F9851E34F0FA582B09DFA48
Domain:jkmusic.co.kr
notebooksell.kr
hhs.gov
pcworld.com
documentation.help
Url:https://www.hhs.gov/sites/default/files/dprk-cyber-espionage.pdf
https://www.pcworld.com/article/424188/manage-thumbs-db-files-in-windows-and-on-the-network.html
https://documentation.help/WinRAR/HELPCommandLineSyntax.htm