[Intel]: https://sysdig.com/blog/muhstik-malware-botnet-analysis/ #90
Labels
missing:tag:JavaScript
missing:tag:Non-persistentStorage
missing:tag:T1001
missing:tag:T1005
missing:tag:T1021.002
missing:tag:T1027.002
missing:tag:T1040
missing:tag:T1048
missing:tag:T1053.003
missing:tag:T1053.007
missing:tag:T1057
missing:tag:T1070.004
missing:tag:T1071.001
missing:tag:T1083
missing:tag:T1205
missing:tag:T1222
missing:tag:T1491
missing:tag:T1546.004
missing:tag:T1548.001
missing:tag:T1567
missing:tag:T1573
missing:tag:T1609
missing:tag:T1610
Area
Malware reports
Parent threat
Impact
Finding
https://sysdig.com/blog/muhstik-malware-botnet-analysis/
Industry reference
uses:k8s
uses:Non-persistentStorage
attack:T1190:Exploit Public-Facing Application
attack:T1505.003:Web Shell
attack:T1105:Ingress Tool Transfer
attack:T1053.003:Cron
attack:T1037.004:RC Scripts
Malware reference
Muhstik
wltm
Actor reference
No response
Component
No response
Scenario
No response
The text was updated successfully, but these errors were encountered: