Aug. 3, 2023, 3:25 p.m. | /u/No-Wind3267

cybersecurity www.reddit.com

when I am monitoring in CrowdStrike EDR I had an alert which had this as command line.

"C:\\\\Windows\\System32\\cmd.exe" /RtyPe QJM.bMp|CmD

Tactic & Technique was Execution via Command and Scripting interpreter. IOA description was "A process is using the command line interface to run commands". Parent process is explorer.exe. so I have no idea which program this command line code belongs. But I have found out that this is related to Raspberry Robin malware. What I need is to understand the …

alert amp code command command line crowdstrike cybersecurity edr explorer interface ioa monitoring process run scripting tactic understand windows

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts