Category: Forensics
Description: Q8. What is the Attacker's C2 domain name and port number ? (domain name:port number)
Author : 0xSh3rl0ck
Files: No files.
Tags: No tags.
General summary of 1-7:
Profile: Win7SP1x86_23418
runddl32.exe appears to be a keylogger type program that spawned the notepad.exe that was in the pslist>
Located: C:\Users\0XSH3R~1\AppData\Local\Temp\MSDCSC\runddl32.exe
The relevant API it uses to record keystate is GetKeyState
01:40
I havent had any immidiate luck finding the c2 domain