Attackers often attempt to drop resources on vulnerable servers,
by forcing the target to download some files from a remote,
attacker-controlled server. These are often executable files, or even
compressed archives that contain a second exploit stage.
Honerix automatically fetches and collects such dropped files. The following table lists the latest 20 dropped resources we observed.
|File hash||Size||Type||Last seen||Download URL||Toolbox|