Skip to content
#

ioc-analysis

Here are 11 public repositories matching this topic...

This case study analyzed a stealthy host-based compromise in which the attacker exploited the trusted Windows binary mshta.exe to execute a remotely hosted, obfuscated JavaScript payload. The attacker’s strategy was notable not for brute force or privilege escalation, but for quiet persistence and clever abuse of native system behavior.

  • Updated May 10, 2025
  • Jupyter Notebook

Improve this page

Add a description, image, and links to the ioc-analysis topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the ioc-analysis topic, visit your repo's landing page and select "manage topics."

Learn more