SEVERITY | DATE | RULE NAME | EVENTID | TYPE | ||
---|---|---|---|---|---|---|
Medium | Dec, 27, 2023, 11:22 AM | ⭐ SOC250 - APT35 HyperScrape Data Exfiltration Tool Detected | 212 | Data Leakage | ||
⭐ As of August 2022, APT35 aka Charming Kitten was observed using a new tool called Hyperscrape to extract emails from their victims’ mailboxes EventID : 212 Event Time : Dec, 27, 2023, 11:22 AM Rule : SOC250 - APT35 HyperScrape Data Exfiltration Tool Detected Level : Security Analyst Hostname : Arthur Ip Address : 172.16.17.72 Process Name : EmailDownloader.exe Process Path : C:\Users\LetsDefend\Downloads\EmailDownloader.exe Parent Process : C:\Windows\Explorer.EXE Command Line : C:\Users\LetsDefend\Downloads\EmailDownloader.exe File Hash : cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Trigger Reason : Unusual or suspicious patterns of behavior linked to the hash have been identified, indicating potential malicious intent. Device Action : Allowed Show Hint |