IoC Extractor
This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.
A doubled “Dragon Breath” adds new air to DLL sideloading attacksDATE : 2023-05-01T07:00:00
SOURCE : sophos.comFILE_HASH_SHA256:097899b3acb3599944305b064667e959c707e519aef3d98be1741bbc69d56a17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:telegramos.org
nsjdhmdjs.com