Created
November 3, 2022 15:40
-
-
Save albertzsigovits/764683ccafc0c50f7229f13d638bbd94 to your computer and use it in GitHub Desktop.
Malware report template
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Recon | |
Delivery | |
Execution | |
Exec arguments, parameters | |
Command line execution | |
Privilege Escalation | |
Token impersonation | |
Admin escalation | |
Exploits | |
Lateral movement | |
Share enumeration | |
Encryption process | |
Malware configuration | |
Config decoding, extraction | |
Network activity/C2 | |
PCAP captures | |
C2 traffic pattern | |
HTTP(S) requests, response | |
Exploits used and included | |
Persistence mechanisms | |
Mutex | |
Services | |
Registry | |
Scheduled Task | |
Driver | |
Evasion | |
Injections techniques | |
UAC bypasses | |
Hooking | |
AntiAV | |
AntiVM | |
AntiDebug | |
AntiSandbox | |
AntiAnalysis | |
AntiDebugging | |
Exfiltration steps | |
Cleanup | |
Log deletion | |
Deleting clues |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment