compromised-certificate[Nobelium]

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Search for the files that are using a compromised certificate associated with the Nobelium campaign. You can remove the comments to: 1. get the list of devices where there is at least one file signed with the certificate 2. get the list of files signed with the certificate 3. get the list of files signed with the certificate group by Devices

Attribute Value
Type Hunting Query
Solution GitHub Only
ID 8d8a5c56-54b8-4cd9-9a9b-83d0325bf802
Tactics Privilege escalation, Vulnerability
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceFileCertificateInfo ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries