-Jan 182 min readPart 6-(WMI): Hunting Down Malicious WMI ActivityIn this blog, we delve into effective threat hunting strategies to uncover and counter malicious WMI activity, emphasizing the importance...
-Jan 172 min readPart 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVERThis blog explores the significance of a specific attribute within MOF files – “#PRAGMA AUTORECOVER” – shedding light on its forensic...