Details

_id 62fb40e4348d24c6a7973786
reference ['https://bazaar.abuse.ch/sample/4a59ac7ae76abb86ab2e035adbe5253247a2aad9b1ce9f59b3145333e34c26f7/']
md5 []
sha1 []
sha256 ['4a59ac7ae76abb86ab2e035adbe5253247a2aad9b1ce9f59b3145333e34c26f7', 'b6b51f4273420c24ea7dc13ef4cc7615262ccbdf6f5e5a49dae604ec153055ad']
mail []
ip []
domain ['tria.ge']
url ['https://tria.ge/220815-p83f2sdge8/behavioral2']
user x3ph1
tweet Analysis of Malicious PS Script https://tria.ge/220815-p83f2sdge8/behavioral2 Malicious PS Script Sample https://bazaar.abuse.ch/sample/4a59ac7ae76abb86ab2e035adbe5253247a2aad9b1ce9f59b3145333e34c26f7/ NetSupport Remote Control used: File:whost.exe Hash:b6b51f4273420c24ea7dc13ef4cc7615262ccbdf6f5e5a49dae604ec153055ad
id 1559171933991833601
retweets 0
link https://twitter.com/x3ph1/status/1559171933991833601
mentions []
hashtags []
date 2022-08-15 13:35:31
timestamp 1660595731

Tweet