DISCARDED: Tales From the Threat Research Trenches cover image

Weird & Wacky Researcher Summer: The Artifacts & Detections Edition

DISCARDED: Tales From the Threat Research Trenches

00:00

How TA444 Is Being Used in an Infection Chain

The two primary methods that I see are sort of a beachhead, the very initial access sort of point that TA444 uses them for and it's basically a command line to download something from remote URL. So they are sort of like one time throw out use from at least everything that I've seen. And so it's it can be like as like heavyweight, I guess as you want it to be or as lightweight,.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app