An analyst is alerted for a malicious file hash. After analysis, the analyst determined that an internal workstation is communicating over port 80 with an external server and that the file hash is associated with Duqu malware. Which tactics, techniques, and procedures align with this analysis?
Herschel
11 days agoEden
19 days agoVernice
20 days agoCora
22 days agoTimothy
24 days agoLawrence
28 days agoAlfreda
16 days agoLoreta
18 days agoEden
1 months agoFrederic
1 months agoKing
14 days agoClay
20 days agoWade
1 months agoAngelyn
18 days agoTamar
21 days agoAmie
1 months ago