IoC Extractor
This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.
The Anatomy of Wiper Malware, Part 3: Input/Output Controls | CrowdStrikeDATE : 2022-09-22T07:00:00
SOURCE : crowdstrike.comFILE_HASH_SHA256:a294620543334a721a2ae8eaaf9680a0786f4b9a216d75b55cfd28f39e9430ea
e2ecec43da974db02f624ecadc94baf1d21fd1a5c4990c15863bb9929f781a0a
f07b0c79a8c88a5760847226af277cf34ab5508394a58820db4db5a8d0340fc7
5a209e40e0659b40d3d20899c00757fa33dc00ddcac38a3c8df004ab9051de0d
085256b114079911b64f5826165f85a28a2a4ddc2ce0d935fa8545651ce5ab09
becb74a8a71a324c78625aa589e77631633d0f15af1473dfe34eca06e7ec6b86