Does it modify "Run" keys to ensure it starts after a reboot? 5. Indicators of Compromise (IOCs) Host-based: File paths, registry keys, and mutexes.
Does it attempt to connect to a Command & Control (C2) server? Document IPs and ports. O_O_-_P_N_9-2022.rar
Summary of what the file does (e.g., "A compressed archive containing a downloader for the [Name] trojan"). 2. File Identification MD5: [Insert MD5 Hash] SHA-1: [Insert SHA-1 Hash] SHA-256: [Insert SHA-256 Hash] File Size: [Insert Size in KB/MB] Does it modify "Run" keys to ensure it starts after a reboot
Steps to identify and remove the threat from an infected system. O_O_-_P_N_9-2022.rar