tag:blogger.com,1999:blog-7885177434994542510.post1192601609824516604..comments2020-10-07T22:36:00.256-04:00Comments on contagio: DDE Command Execution malware samples Milahttp://www.blogger.com/profile/09472209631979859691[email protected]Blogger2125tag:blogger.com,1999:blog-7885177434994542510.post-53511974368474027612017-10-18T09:11:10.123-04:002017-10-18T09:11:10.123-04:00thank youthank youMilahttps://www.blogger.com/profile/09472209631979859691[email protected]tag:blogger.com,1999:blog-7885177434994542510.post-57393955181331357472017-10-18T02:56:42.753-04:002017-10-18T02:56:42.753-04:00Some additional resources:
http://blog.inquest.ne...Some additional resources:<br /><br />http://blog.inquest.net/blog/2017/10/13/microsoft-office-dde-macro-less-command-execution-vulnerability<br />http://blog.inquest.net/blog/2017/10/14/01-microsoft-office-dde-sec-omb-approval-lure<br />http://blog.inquest.net/blog/2017/10/14/02-microsoft-office-dde-freddie-mac-targeted-lure<br />http://blog.inquest.net/blog/2017/10/14/03-microsoft-office-dde-poland-ransomware<br />https://github.com/InQuest/yara-rules/blob/master/Microsoft_Office_DDE_Command_Execution.rule<br />https://twitter.com/i/moments/918126999738175489Pedram Aminihttps://www.blogger.com/profile/16880180990980881854[email protected]
文章来源: http://contagiodump.blogspot.com/feeds/1192601609824516604/comments/default
如有侵权请联系:admin#unsafe.sh