GitHub / Compcode1 / ioc4-unsigned-executable
This case study focused on a low-profile intrusion attempt involving a standalone executable (patcher.exe) found in a writable but non-standard directory (C:\ProgramData\WinUpdate).
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Compcode1%2Fioc4-unsigned-executable
Stars: 0
Forks: 0
Open issues: 0
License: gpl-3.0
Language: Jupyter Notebook
Size: 0 Bytes
Dependencies parsed at: Pending
Created at: 6 days ago
Updated at: 6 days ago
Pushed at: 6 days ago
Last synced at: 6 days ago
Topics: application-triage-framework, cybersecurity, edr-telemetry, host-log-cross-reference-protocol, unsigned-executable-detection