-
Q: What is the source of the patterns listed in this document?A: Private email from James Butterworth (Sands Corp).
-
Q: What file property pattern is listed as suspicious?A: PE Checksum = "0".
-
Q: What specific URL strings should be watched?A: Any URL that contains "HXXP" or "H00P".
-
Q: What registry key is mentioned for autostart?A: HKLM.../Current Version/Run.
-
Q: What is a suspicious indicator regarding file archives?A: Any file archive larger than 2Gb (Zip/Rar/Etc).
-
Q: What user behavior is flagged regarding RDP?A: User logging into another machine via RDP (excluding Admin Accounts).
-
Q: What service query is listed as suspicious?A: Service queries "http://ipinfo.io/".
-
Q: What indicator relates to IRC?A: Open IRC Connections (Sessions) - Not using common IRC Ports.
-
Q: What pattern indicates a 'Hidden' service?A: Service Flagged as "Hidden".
-
Q: What file extensions are mentioned in the context of stolen signing certificates?A: ".CN" or ".KR".
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.