Domains: ithr.org api.store scheta.site AppX9rwyqtrq9gw3wnmrap9a412nsc7145qh.mca sun1.space amgreetings.tech tnetworkslicense.ru thecyberwire.com tech-department.us 1204knos.ru twitter.com cbre.tech 1204networks.ru info-zoomapp.com nixonpeabody.tech storageplace.pro meetlng.group kellyservices-hr.com formeld.tech gertefin.com septcntr.com webmicrosoftservicesystem.com aka.ms sharepoint.com hubergroup.tech Sub Domains: cabotcorpsupport-my.sharepoint.com nixonpeabody.tech-department.us mckinseyhrcompany-my.sharepoint.com cbre.tech-department.us zoonn.ithr.org teannviewer.ithr.org amydeks.ithr.org amgreetings.tech-department.us hubergroup.tech-department.us formeld.tech-department.us tab1eu.ithr.org kellyserviceshr-my.sharepoint.com zoonn.meetlng.group abobe.ithr.org kellyhrservices-my.sharepoint.com kellyservicesheadhunter-my.sharepoint.com perimeter81support-my.sharepoint.com App.AppX9rwyqtrq9gw3wnmrap9a412nsc7145qh.mca kellyservicesrecruitmentdep-my.sharepoint.com URLs: https://scheta.site/api.store/Setup.msix https://scheta.site/api.store/ZoomInstaller.msix sha256: 44cac5bf0bab56b0840bd1c7b95f9c7f5078ff417705eeaaf5ea5a2167a81dd5 06b4aebbc3cd62e0aadd1852102645f9a00cc7eea492c0939675efba7566a6de 2ed5660c7b768b4c2a7899d00773af60cd4396f24a2f7d643ccc1bf74a403970 48aa2393ef590bab4ff2fd1e7d95af36e5b6911348d7674347626c9aaafa255e b79633917e51da2a4401473d08719f493d61fd64a1b10fe482c12d984d791ccb 11b71429869f29122236a44a292fde3f0269cde8eb76a52c89139f79f4b97e63 ffb45dc14ea908b21e01e87ec18725dff560c093884005c2b71277e2de354866 7e646dfe7b7f330cb21db07b94f611eb39f604fab36e347fb884f797ba462402 2ba527fb8e31cb209df8d1890a63cda9cd4433aa0b841ed8b86fa801aff4ccbd CVEs: CVE-2023-36884 CVE-2021-43890 -------------------------------------------------------------------------- Hash 44cac5bf0bab56b0840bd1c7b95f9c7f5078ff417705eeaaf5ea5a2167a81dd5: Source: Zenbox Tactic Name: Collection Tactic ID: TA0009 Technique Name: Input Capture Technique ID: T1056 Tactic Name: Discovery Tactic ID: TA0007 Technique Name: System Information Discovery Technique ID: T1082 Technique Name: Virtualization/Sandbox Evasion Technique ID: T1497 Tactic Name: Credential Access Tactic ID: TA0006 Technique Name: Input Capture Technique ID: T1056 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: Disable or Modify Tools Technique ID: T1562.001 Technique Name: Virtualization/Sandbox Evasion Technique ID: T1497 Hash 06b4aebbc3cd62e0aadd1852102645f9a00cc7eea492c0939675efba7566a6de: Source: Zenbox Tactic Name: Collection Tactic ID: TA0009 Technique Name: Input Capture Technique ID: T1056 Tactic Name: Discovery Tactic ID: TA0007 Technique Name: System Information Discovery Technique ID: T1082 Technique Name: Virtualization/Sandbox Evasion Technique ID: T1497 Tactic Name: Credential Access Tactic ID: TA0006 Technique Name: Input Capture Technique ID: T1056 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: Disable or Modify Tools Technique ID: T1562.001 Technique Name: Virtualization/Sandbox Evasion Technique ID: T1497 Technique Name: Software Packing Technique ID: T1027.002 Technique Name: Obfuscated Files or Information Technique ID: T1027 Hash 2ed5660c7b768b4c2a7899d00773af60cd4396f24a2f7d643ccc1bf74a403970: Error: File "2ed5660c7b768b4c2a7899d00773af60cd4396f24a2f7d643ccc1bf74a403970" not found Hash 48aa2393ef590bab4ff2fd1e7d95af36e5b6911348d7674347626c9aaafa255e: Source: Zenbox Tactic Name: Persistence Tactic ID: TA0003 Technique Name: DLL Side-Loading Technique ID: T1574.002 Tactic Name: Discovery Tactic ID: TA0007 Technique Name: System Information Discovery Technique ID: T1082 Technique Name: Security Software Discovery Technique ID: T1518.001 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: DLL Side-Loading Technique ID: T1574.002 Technique Name: Timestomp Technique ID: T1070.006 Tactic Name: Privilege Escalation Tactic ID: TA0004 Technique Name: DLL Side-Loading Technique ID: T1574.002 Source: CAPA Tactic Name: Execution Tactic ID: TA0002 Technique Name: Command and Scripting Interpreter Technique ID: T1059 Technique Name: Shared Modules Technique ID: T1129 Tactic Name: Discovery Tactic ID: TA0007 Technique Name: System Information Discovery Technique ID: T1082 Technique Name: File and Directory Discovery Technique ID: T1083 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: Obfuscated Files or Information Technique ID: T1027 Hash b79633917e51da2a4401473d08719f493d61fd64a1b10fe482c12d984d791ccb: Source: Zenbox Tactic Name: Execution Tactic ID: TA0002 Technique Name: Scripting Technique ID: T1064 Tactic Name: Discovery Tactic ID: TA0007 Technique Name: System Information Discovery Technique ID: T1082 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: Scripting Technique ID: T1064 Hash 11b71429869f29122236a44a292fde3f0269cde8eb76a52c89139f79f4b97e63: Source: Zenbox Tactic Name: Collection Tactic ID: TA0009 Technique Name: Input Capture Technique ID: T1056 Tactic Name: Discovery Tactic ID: TA0007 Technique Name: System Information Discovery Technique ID: T1082 Technique Name: Virtualization/Sandbox Evasion Technique ID: T1497 Tactic Name: Credential Access Tactic ID: TA0006 Technique Name: Input Capture Technique ID: T1056 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: Disable or Modify Tools Technique ID: T1562.001 Technique Name: Virtualization/Sandbox Evasion Technique ID: T1497 Source: Zenbox Linux Tactic Name: Discovery Tactic ID: TA0007 Technique Name: Security Software Discovery Technique ID: T1518.001 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: Hidden Files and Directories Technique ID: T1564.001 Hash ffb45dc14ea908b21e01e87ec18725dff560c093884005c2b71277e2de354866: Error: File "ffb45dc14ea908b21e01e87ec18725dff560c093884005c2b71277e2de354866" not found Hash 7e646dfe7b7f330cb21db07b94f611eb39f604fab36e347fb884f797ba462402: Hash 2ba527fb8e31cb209df8d1890a63cda9cd4433aa0b841ed8b86fa801aff4ccbd: Source: Zenbox Tactic Name: Collection Tactic ID: TA0009 Technique Name: Input Capture Technique ID: T1056 Tactic Name: Discovery Tactic ID: TA0007 Technique Name: System Information Discovery Technique ID: T1082 Technique Name: File and Directory Discovery Technique ID: T1083 Technique Name: Virtualization/Sandbox Evasion Technique ID: T1497 Tactic Name: Credential Access Tactic ID: TA0006 Technique Name: Input Capture Technique ID: T1056 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: Timestomp Technique ID: T1070.006 Technique Name: Disable or Modify Tools Technique ID: T1562.001 Technique Name: Masquerading Technique ID: T1036 Technique Name: Virtualization/Sandbox Evasion Technique ID: T1497 Source: Zenbox Linux Tactic Name: Discovery Tactic ID: TA0007 Technique Name: Security Software Discovery Technique ID: T1518.001 Tactic Name: Defense Evasion Tactic ID: TA0005 Technique Name: Hidden Files and Directories Technique ID: T1564.001