This commit is contained in:
ziv chang 2024-01-12 17:57:14 +08:00
commit 8400bc55d3

@ -1532,3 +1532,6 @@ Published,SHA-1,Filename,Download URL
2022-12-05,9c2e050959ee0d8e7e979b09b0d9674e2277cd15,Message from Recorded Future,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.05.TAG-53_Russia/Message%20from%20Recorded%20Future.pdf
2022-12-06,20abcd71b5293e4c97768dd337b4260a88efcc7c,Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.06.Mustang_Panda/Mustang%20Panda%20Uses%20the%20Russian-Ukrainian%20War%20to%20Attack%20Europe%20and%20Asia%20Pacific%20Targets.pdf
2022-12-07,4d042f2898173264f3791050861eb0b4313213fe,Internet Explorer 0-day exploited by North Korean actor APT37,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.07.APT37_0Day/Internet%20Explorer%200-day%20exploited%20by%20North%20Korean%20actor%20APT37.pdf
2023-01-09,3efdf94296306b558b39d4b2bfab93cb944a0013,INTRINSEC - Emotet returns and deploys loaders,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.09.Emotet_return/INTRINSEC%20-%20Emotet%20returns%20and%20deploys%20loaders.pdf
2023-01-11,4d3fa4294df4b901a26c2f9bdbcae7c3be9f244a,Dark Pink APT unleashes malware for deeper and more sinister intrusions in the Asia-Pacific and Europe _ Group-IB Blog,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.11.Dark_Pink_APT/Dark%20Pink%20APT%20unleashes%20malware%20for%20deeper%20and%20more%20sinister%20intrusions%20in%20the%20Asia-Pacific%20and%20Europe%20_%20Group-IB%20Blog.pdf
2023-01-26,adc02a61be87eeccc1ea3e3c6a5db73e3946f258,Welcome to Goot Camp_ Tracking the Evolution of GOOTLOADER Operations _ Mandiant,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.26.GOOTLOADER_Operations/Welcome%20to%20Goot%20Camp_%20Tracking%20the%20Evolution%20of%20GOOTLOADER%20Operations%20_%20Mandiant.pdf

1 Published SHA-1 Filename Download URL
1532 2022-12-05 9c2e050959ee0d8e7e979b09b0d9674e2277cd15 Message from Recorded Future https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.05.TAG-53_Russia/Message%20from%20Recorded%20Future.pdf
1533 2022-12-06 20abcd71b5293e4c97768dd337b4260a88efcc7c Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.06.Mustang_Panda/Mustang%20Panda%20Uses%20the%20Russian-Ukrainian%20War%20to%20Attack%20Europe%20and%20Asia%20Pacific%20Targets.pdf
1534 2022-12-07 4d042f2898173264f3791050861eb0b4313213fe Internet Explorer 0-day exploited by North Korean actor APT37 https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.07.APT37_0Day/Internet%20Explorer%200-day%20exploited%20by%20North%20Korean%20actor%20APT37.pdf
1535 2023-01-09 3efdf94296306b558b39d4b2bfab93cb944a0013 INTRINSEC - Emotet returns and deploys loaders https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.09.Emotet_return/INTRINSEC%20-%20Emotet%20returns%20and%20deploys%20loaders.pdf
1536 2023-01-11 4d3fa4294df4b901a26c2f9bdbcae7c3be9f244a Dark Pink APT unleashes malware for deeper and more sinister intrusions in the Asia-Pacific and Europe _ Group-IB Blog https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.11.Dark_Pink_APT/Dark%20Pink%20APT%20unleashes%20malware%20for%20deeper%20and%20more%20sinister%20intrusions%20in%20the%20Asia-Pacific%20and%20Europe%20_%20Group-IB%20Blog.pdf
1537 2023-01-26 adc02a61be87eeccc1ea3e3c6a5db73e3946f258 Welcome to Goot Camp_ Tracking the Evolution of GOOTLOADER Operations _ Mandiant https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.26.GOOTLOADER_Operations/Welcome%20to%20Goot%20Camp_%20Tracking%20the%20Evolution%20of%20GOOTLOADER%20Operations%20_%20Mandiant.pdf