IoC Extractor

This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.

Tomcat Under Attack: Exploring Mirai Malware and Beyond

DATE : 2023-07-25T07:00:00
SOURCE : aquasec.com

FILE_HASH_SHA256:
0515cd2ba84a5da10c63cadae06f04d778d66c054b9184edb57be6ea95a1095b
997f303c3696788923e41d35a26fc2c79a11ec34389028d81a6fb43f8c11aecf
0df529cbb87b51c91f4b98bfe4600627a8fce66ec12b8a3bad59fccf6779f679
489ac3fdefac8d07e198c0c6346c9c9ae7c141a86ef3ec1720f61d171862a87a
8ada5545b85c18d24a914e4b46f3275fca2d360ca5bfb91bf3ee4e7fde667065
9d4963fa1b4d2bb576ac801c4a1efa5a0758d615aaa7d9cc5ae27f7955f67dee
35bb6ca1389fd3f4343090135ff11a69bc4315b1e46bd789301d675da813028d
2ee307971d8529b2a882b194b30d7e439db3d0b51ccbf5bf5fedb5deb1116606
ce718bf0fefb061bafd115639f6942b11ef3ac96e74a6b4fc19710e9e03a083a
5ee119fe3ce335200a2f029625bf9fa3ec495b8322093b59528029e1d6c9b69f
a0fcc70704a49c38f1e7b9bbdc5fddd83ebd23da748b796d46e8211b86c5c3d6
bcc98241024fa6c1d0d1f2b48b9d4b9b8558de07621dcf109eaf9d18815018b8
b0731816f2363f9afbfc05797ced85ce137b9fa7d8d92f423edd4ff32feeda2d
696d3c58966d2e742cb02f34866d456413920fb83d3cb5ee49d285998167f6ff
690f7d22545b0c59fe638082bac2bc5fd35214008d5065bf773ea57f0bfd1789
c086430aed0607ee6291402d16969a10ba8aaab81421aa5fae5085e3b5dd56bb
d0ad85e652e2c6091af6f347aef9e918c954580609f715e376226edd12b5bc15
5407cc0b19573b6c807b7fcb188aa3af3e762cf9c65379cd8f70d815f89283dc
7b108418d450682e2c7f1acbef0e546a622bb73e829682fdbcc0dc8fc3e4876f
4c2969c6f81043985c73547096498df064ca2d8e77c5d9ec8a47925a77ce776b
99b96d232693a7de6899e47b0da66af59a7eb7cbc3b9fadd8b88039e714e23f1
6eadfab5438dc777b4abff3bee5d6d8d0043ea2cfade18af1e71eae16f3b0bd2
11bcad6663b6ba025c4d9b6e80dbc5d5f103c5b9977ff8f138ca1c8486b7e0a7
519dd6c3d0e5e022c63ad7b892f5ac51e6dc9d047c03e91510b4bcbabea24d58