This commit is contained in:
Marc Ruef 2022-03-28 13:51:27 +02:00
parent ef16ee7c43
commit d8bfb92c48
222 changed files with 26980 additions and 7249 deletions

31
actors/ALOSH/README.md Normal file
View File

@ -0,0 +1,31 @@
# ALOSH - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ALOSH](https://vuldb.com/?actor.alosh). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.alosh](https://vuldb.com/?actor.alosh)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of ALOSH.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [172.96.187.2](https://vuldb.com/?ip.172.96.187.2) | nyc008.hawkhost.com | - | High
2 | [181.141.0.30](https://vuldb.com/?ip.181.141.0.30) | hfc-181-141-0-30.une.net.co | - | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://lab52.io/blog/literature-lover-targeting-colombia-with-limerat/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -46,7 +46,7 @@ There are 60 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT1. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT1_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -86,27 +86,27 @@ ID | Type | Indicator | Confidence
8 | File | `/login` | Low
9 | File | `/mgmt/shared/authz/users/` | High
10 | File | `/modules/profile/index.php` | High
11 | File | `/out.php` | Medium
12 | File | `/public/plugins/` | High
13 | File | `/SASWebReportStudio/logonAndRender.do` | High
14 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
15 | File | `/secure/admin/ViewInstrumentation.jspa` | High
16 | File | `/SSOPOST/metaAlias/%realm%/idpv2` | High
17 | File | `/system/proxy` | High
18 | File | `/tmp/phpglibccheck` | High
19 | File | `/uncpath/` | Medium
20 | File | `adclick.php` | Medium
21 | File | `add.php` | Low
22 | File | `addentry.php` | Medium
23 | File | `addressbookprovider.php` | High
24 | File | `admin/pageUploadCSV.php` | High
25 | File | `ajax_udf.php` | Medium
26 | File | `AppCompatCache.exe` | High
27 | File | `application.js.php` | High
28 | File | `apply.cgi` | Medium
29 | File | `arm/lithium-codegen-arm.cc` | High
30 | File | `authenticate.c` | High
31 | File | `base_maintenance.php` | High
11 | File | `/one_church/userregister.php` | High
12 | File | `/out.php` | Medium
13 | File | `/public/plugins/` | High
14 | File | `/SASWebReportStudio/logonAndRender.do` | High
15 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
16 | File | `/secure/admin/ViewInstrumentation.jspa` | High
17 | File | `/SSOPOST/metaAlias/%realm%/idpv2` | High
18 | File | `/system/proxy` | High
19 | File | `/tmp/phpglibccheck` | High
20 | File | `/uncpath/` | Medium
21 | File | `adclick.php` | Medium
22 | File | `add.php` | Low
23 | File | `addentry.php` | Medium
24 | File | `addressbookprovider.php` | High
25 | File | `admin.jcomments.php` | High
26 | File | `admin/pageUploadCSV.php` | High
27 | File | `ajax_udf.php` | Medium
28 | File | `AppCompatCache.exe` | High
29 | File | `application.js.php` | High
30 | File | `apply.cgi` | Medium
31 | File | `arm/lithium-codegen-arm.cc` | High
32 | ... | ... | ...
There are 271 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.

View File

@ -114,29 +114,29 @@ ID | Type | Indicator | Confidence
11 | File | `/NAGErrors` | Medium
12 | File | `/plugins/servlet/audit/resource` | High
13 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
14 | File | `/proc/ioports` | High
15 | File | `/REBOOTSYSTEM` | High
16 | File | `/replication` | Medium
17 | File | `/reports/rwservlet` | High
18 | File | `/RestAPI` | Medium
19 | File | `/tmp` | Low
20 | File | `/tmp/speedtest_urls.xml` | High
21 | File | `/uncpath/` | Medium
22 | File | `/var/log/nginx` | High
23 | File | `/wp-admin/admin.php` | High
24 | File | `/wp-json/wc/v3/webhooks` | High
25 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
26 | File | `admin/app/mediamanager` | High
27 | File | `admin/index.php` | High
28 | File | `admin\model\catalog\download.php` | High
29 | File | `afr.php` | Low
30 | File | `apcupsd.pid` | Medium
31 | File | `api/it-recht-kanzlei/api-it-recht-kanzlei.php` | High
32 | File | `api/sms/send-sms` | High
33 | File | `api/v1/alarms` | High
14 | File | `/REBOOTSYSTEM` | High
15 | File | `/replication` | Medium
16 | File | `/reports/rwservlet` | High
17 | File | `/RestAPI` | Medium
18 | File | `/tmp` | Low
19 | File | `/tmp/speedtest_urls.xml` | High
20 | File | `/uncpath/` | Medium
21 | File | `/var/log/nginx` | High
22 | File | `/wp-admin/admin.php` | High
23 | File | `/wp-json/wc/v3/webhooks` | High
24 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
25 | File | `admin/app/mediamanager` | High
26 | File | `admin/index.php` | High
27 | File | `admin\model\catalog\download.php` | High
28 | File | `afr.php` | Low
29 | File | `apcupsd.pid` | Medium
30 | File | `api/it-recht-kanzlei/api-it-recht-kanzlei.php` | High
31 | File | `api/sms/send-sms` | High
32 | File | `api/v1/alarms` | High
33 | File | `application/controller/InstallerController.php` | High
34 | ... | ... | ...
There are 290 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 289 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -21,10 +21,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
* [FR](https://vuldb.com/?country.fr)
* [ES](https://vuldb.com/?country.es)
* ...
There are 26 more country items available. Please use our online service to access the data.
There are 25 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -77,20 +77,20 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/?module=users&section=cpanel&page=list` | High
2 | File | `/admin/powerline` | High
3 | File | `/admin/produts/controller.php` | High
4 | File | `/admin/syslog` | High
5 | File | `/admin/user/team` | High
6 | File | `/api/upload` | Medium
7 | File | `/cgi-bin` | Medium
8 | File | `/cgi-bin/kerbynet` | High
9 | File | `/cgi-bin/system_mgr.cgi` | High
10 | File | `/common/logViewer/logViewer.jsf` | High
11 | File | `/context/%2e/WEB-INF/web.xml` | High
12 | File | `/crmeb/app/admin/controller/store/CopyTaobao.php` | High
13 | File | `/dcim/sites/add/` | High
14 | File | `/EXCU_SHELL` | Medium
15 | File | `/forum/away.php` | High
2 | File | `/admin/login.php` | High
3 | File | `/admin/powerline` | High
4 | File | `/admin/produts/controller.php` | High
5 | File | `/admin/syslog` | High
6 | File | `/admin/user/team` | High
7 | File | `/api/upload` | Medium
8 | File | `/cgi-bin` | Medium
9 | File | `/cgi-bin/kerbynet` | High
10 | File | `/cgi-bin/system_mgr.cgi` | High
11 | File | `/common/logViewer/logViewer.jsf` | High
12 | File | `/context/%2e/WEB-INF/web.xml` | High
13 | File | `/crmeb/app/admin/controller/store/CopyTaobao.php` | High
14 | File | `/dcim/sites/add/` | High
15 | File | `/EXCU_SHELL` | Medium
16 | File | `/fudforum/adm/hlplist.php` | High
17 | File | `/login` | Low
18 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
@ -115,7 +115,7 @@ ID | Type | Indicator | Confidence
37 | File | `AccountManagerService.java` | High
38 | ... | ... | ...
There are 326 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 328 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -18,7 +18,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [PL](https://vuldb.com/?country.pl)
* [DE](https://vuldb.com/?country.de)
* [FR](https://vuldb.com/?country.fr)
* [ES](https://vuldb.com/?country.es)
* ...
There are 6 more country items available. Please use our online service to access the data.
@ -59,7 +59,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 8 more TTP items available. Please use our online service to access the data.
There are 7 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -67,32 +67,33 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/admin.add` | Medium
2 | File | `/admin/?page=user/manage_user` | High
3 | File | `/admin/admin.php?module=admin_access_group_edit&aagID` | High
4 | File | `/admin/customers.php?page=1&cID` | High
5 | File | `/admin/edit_user.php` | High
6 | File | `/admin/files` | Medium
7 | File | `/administrator/components/menu/` | High
8 | File | `/administrator/components/table_manager/` | High
9 | File | `/api/appInternals/1.0/agent/configuration&amp` | High
10 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
11 | File | `/api/ZRMesh/set_ZRMesh` | High
12 | File | `/cloud_config/router_post/register` | High
13 | File | `/Hospital-Management-System-master/contact.php` | High
14 | File | `/Hospital-Management-System-master/func.php` | High
15 | File | `/jerry-core/ecma/base/ecma-lcache.c` | High
16 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
17 | File | `/jerry-core/jmem/jmem-heap.c` | High
18 | File | `/ManageRoute/postRoute` | High
19 | File | `/ms/cms/content/list.do` | High
20 | File | `/orms/` | Low
21 | File | `/parser/js/js-parser-expr.c` | High
22 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
23 | File | `/thruk/#cgi-bin/extinfo.cgi?type=2` | High
24 | ... | ... | ...
1 | File | `.htaccess` | Medium
2 | File | `/admin.add` | Medium
3 | File | `/admin/?page=user/manage_user` | High
4 | File | `/admin/admin.php?module=admin_access_group_edit&aagID` | High
5 | File | `/admin/customers.php?page=1&cID` | High
6 | File | `/admin/edit_user.php` | High
7 | File | `/admin/files` | Medium
8 | File | `/admin/login.php` | High
9 | File | `/administrator/components/menu/` | High
10 | File | `/administrator/components/table_manager/` | High
11 | File | `/api/appInternals/1.0/agent/configuration&amp` | High
12 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
13 | File | `/api/fetch` | Medium
14 | File | `/api/ZRMesh/set_ZRMesh` | High
15 | File | `/audit/log/log_management.php` | High
16 | File | `/cloud_config/router_post/register` | High
17 | File | `/cwms/admin/?page=articles/view_article/` | High
18 | File | `/Hospital-Management-System-master/contact.php` | High
19 | File | `/Hospital-Management-System-master/func.php` | High
20 | File | `/i/:data/ipa.plist` | High
21 | File | `/jerry-core/ecma/base/ecma-lcache.c` | High
22 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
23 | File | `/jerry-core/jmem/jmem-heap.c` | High
24 | File | `/ManageRoute/postRoute` | High
25 | ... | ... | ...
There are 204 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 214 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -68,30 +68,31 @@ ID | Type | Indicator | Confidence
8 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
9 | File | `/medical/inventories.php` | High
10 | File | `/monitoring` | Medium
11 | File | `/NAGErrors` | Medium
12 | File | `/plugins/servlet/audit/resource` | High
13 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
14 | File | `/replication` | Medium
15 | File | `/RestAPI` | Medium
16 | File | `/SASWebReportStudio/logonAndRender.do` | High
17 | File | `/tmp` | Low
18 | File | `/tmp/speedtest_urls.xml` | High
19 | File | `/uncpath/` | Medium
20 | File | `/var/log/nginx` | High
21 | File | `/wp-content/plugins/updraftplus/admin.php` | High
22 | File | `actions.hsp` | Medium
23 | File | `addentry.php` | Medium
24 | File | `add_edit_user.asp` | High
25 | File | `add_to_cart.php` | High
26 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
27 | File | `admin/config/confmgr.php` | High
28 | File | `admin/system_manage/save.html` | High
29 | File | `admin\model\catalog\download.php` | High
30 | File | `ajax.php` | Medium
31 | File | `apcupsd.pid` | Medium
32 | ... | ... | ...
11 | File | `/plugins/servlet/audit/resource` | High
12 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
13 | File | `/replication` | Medium
14 | File | `/RestAPI` | Medium
15 | File | `/SASWebReportStudio/logonAndRender.do` | High
16 | File | `/tmp` | Low
17 | File | `/tmp/speedtest_urls.xml` | High
18 | File | `/uncpath/` | Medium
19 | File | `/var/log/nginx` | High
20 | File | `/wp-content/plugins/updraftplus/admin.php` | High
21 | File | `actions.hsp` | Medium
22 | File | `addentry.php` | Medium
23 | File | `add_edit_user.asp` | High
24 | File | `add_to_cart.php` | High
25 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
26 | File | `admin/config/confmgr.php` | High
27 | File | `admin/system_manage/save.html` | High
28 | File | `admin\model\catalog\download.php` | High
29 | File | `ajax.php` | Medium
30 | File | `apcupsd.pid` | Medium
31 | File | `api/sms/send-sms` | High
32 | File | `api/v1/alarms` | High
33 | ... | ... | ...
There are 277 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 278 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,63 +1,64 @@
# APT36 - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT36](https://vuldb.com/?actor.apt36). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT36](https://vuldb.com/?actor.apt36). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.apt36](https://vuldb.com/?actor.apt36)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt36](https://vuldb.com/?actor.apt36)
## Campaigns
The following campaigns are known and can be associated with APT36:
The following _campaigns_ are known and can be associated with APT36:
* C-Major
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT36:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT36:
* US
* NL
* RU
* [US](https://vuldb.com/?country.us)
* [NL](https://vuldb.com/?country.nl)
* [RU](https://vuldb.com/?country.ru)
* ...
There are 13 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of APT36.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of APT36.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 5.189.137.8 | vending.softjourn.if.ua | High
2 | 5.189.143.225 | - | High
3 | 5.189.152.147 | ccloud.armax.de | High
4 | 5.189.167.23 | mltx.de | High
5 | 5.189.167.65 | vmi437585.contaboserver.net | High
6 | 23.254.119.11 | - | High
7 | 64.188.12.126 | 64.188.12.126.static.quadranet.com | High
8 | 64.188.25.232 | 64.188.25.232.static.quadranet.com | High
9 | 75.98.175.79 | a2s83.a2hosting.com | High
10 | 75.119.139.169 | server1.immacolata.com | High
11 | 80.240.134.51 | - | High
12 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.189.137.8](https://vuldb.com/?ip.5.189.137.8) | vending.softjourn.if.ua | C-Major | High
2 | [5.189.143.225](https://vuldb.com/?ip.5.189.143.225) | - | C-Major | High
3 | [5.189.152.147](https://vuldb.com/?ip.5.189.152.147) | ccloud.armax.de | C-Major | High
4 | [5.189.167.23](https://vuldb.com/?ip.5.189.167.23) | mltx.de | C-Major | High
5 | [5.189.167.65](https://vuldb.com/?ip.5.189.167.65) | vmi437585.contaboserver.net | C-Major | High
6 | [23.254.119.11](https://vuldb.com/?ip.23.254.119.11) | - | - | High
7 | [64.188.12.126](https://vuldb.com/?ip.64.188.12.126) | 64.188.12.126.static.quadranet.com | - | High
8 | [64.188.25.232](https://vuldb.com/?ip.64.188.25.232) | 64.188.25.232.static.quadranet.com | - | High
9 | [75.98.175.79](https://vuldb.com/?ip.75.98.175.79) | a2s83.a2hosting.com | C-Major | High
10 | [75.119.139.169](https://vuldb.com/?ip.75.119.139.169) | server1.immacolata.com | - | High
11 | [80.240.134.51](https://vuldb.com/?ip.80.240.134.51) | - | C-Major | High
12 | [82.196.13.94](https://vuldb.com/?ip.82.196.13.94) | - | C-Major | High
13 | ... | ... | ... | ...
There are 46 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by APT36. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT36_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 5 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by APT36. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by APT36. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -89,18 +90,19 @@ ID | Type | Indicator | Confidence
26 | File | `comment_add.asp` | High
27 | ... | ... | ...
There are 229 more IOA items available. Please use our online service to access the data.
There are 229 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://vxug.fakedoma.in/archive/APTs/2021/2021.05.13/Transparent%20Tribe.pdf
* https://www.threatminer.org/report.php?q=indian-military-personnel-targeted-by-information-theft-campaign-cmajor.pdf&y=2016
* https://www.trendmicro.com/en_us/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -62,7 +62,7 @@ ID | Type | Indicator | Confidence
7 | File | `/server-status` | High
8 | ... | ... | ...
There are 60 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 61 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -109,7 +109,7 @@ ID | Type | Indicator | Confidence
33 | File | `admin.php/comments/batchdel/` | High
34 | ... | ... | ...
There are 289 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 290 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -10,7 +10,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [US](https://vuldb.com/?country.us)
* [RU](https://vuldb.com/?country.ru)
* [FR](https://vuldb.com/?country.fr)
* [IR](https://vuldb.com/?country.ir)
* ...
There are 16 more country items available. Please use our online service to access the data.

View File

@ -39,7 +39,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1211 | CWE-254 | 7PK Security Features | High
4 | ... | ... | ... | ...
There are 3 more TTP items available. Please use our online service to access the data.
There are 4 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -59,7 +59,7 @@ ID | Type | Indicator | Confidence
10 | File | `admin.asp` | Medium
11 | ... | ... | ...
There are 84 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 85 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,6 +1,6 @@
# Autoit - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Autoit](https://vuldb.com/?actor.autoit). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Autoit](https://vuldb.com/?actor.autoit). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.autoit](https://vuldb.com/?actor.autoit)
@ -8,9 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Autoit:
* DE
* US
* ES
* [DE](https://vuldb.com/?country.de)
* [US](https://vuldb.com/?country.us)
* [ES](https://vuldb.com/?country.es)
* ...
There are 2 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -18,19 +21,19 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 8.248.165.254 | - | - | High
2 | 8.249.217.254 | - | - | High
3 | 8.253.131.121 | - | - | High
4 | 13.56.128.67 | screenconnect.medsphere.com | - | High
5 | 23.3.13.88 | a23-3-13-88.deploy.static.akamaitechnologies.com | - | High
6 | 23.3.13.154 | a23-3-13-154.deploy.static.akamaitechnologies.com | - | High
1 | [8.248.165.254](https://vuldb.com/?ip.8.248.165.254) | - | - | High
2 | [8.249.217.254](https://vuldb.com/?ip.8.249.217.254) | - | - | High
3 | [8.253.131.121](https://vuldb.com/?ip.8.253.131.121) | - | - | High
4 | [13.56.128.67](https://vuldb.com/?ip.13.56.128.67) | screenconnect.medsphere.com | - | High
5 | [23.3.13.88](https://vuldb.com/?ip.23.3.13.88) | a23-3-13-88.deploy.static.akamaitechnologies.com | - | High
6 | [23.3.13.154](https://vuldb.com/?ip.23.3.13.154) | a23-3-13-154.deploy.static.akamaitechnologies.com | - | High
7 | ... | ... | ... | ...
There are 24 more IOC items available. Please use our online service to access the data.
There are 26 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Autoit. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Autoit_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -39,7 +42,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 7 more TTP items available. Please use our online service to access the data.
There are 6 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -60,7 +63,7 @@ ID | Type | Indicator | Confidence
11 | File | `auth.php` | Medium
12 | ... | ... | ...
There are 90 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 91 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -69,6 +72,7 @@ The following list contains _external sources_ which discuss the actor and the a
* https://blog.talosintelligence.com/2021/08/threat-roundup-0730-0806.html
* https://blog.talosintelligence.com/2021/09/threat-roundup-0827-0903.html
* https://blog.talosintelligence.com/2021/09/threat-roundup-0910-0917.html
* https://blog.talosintelligence.com/2022/03/threat-roundup-0318-0325.html
## Literature

View File

@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [SC](https://vuldb.com/?country.sc)
* ...
There are 11 more country items available. Please use our online service to access the data.
There are 9 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -46,7 +46,7 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
@ -60,9 +60,9 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.htaccess` | Medium
2 | File | `/admin-panel1.php` | High
3 | File | `/admin/?page=members/view_member` | High
4 | File | `/admin/doctors/view_doctor.php` | High
5 | File | `/admin/file-manager/` | High
3 | File | `/admin.php/admin/plog/index.html` | High
4 | File | `/admin.php/admin/ulog/index.html` | High
5 | File | `/admin.php/admin/vod/data.html` | High
6 | File | `/admin/files` | Medium
7 | File | `/admin/login.php` | High
8 | File | `/admin/news/news_mod.php` | High
@ -70,19 +70,22 @@ ID | Type | Indicator | Confidence
10 | File | `/admin/options` | High
11 | File | `/admin/page_edit/3` | High
12 | File | `/admin/templates/template_manage.php` | High
13 | File | `/admin_page/all-files-update-ajax.php` | High
14 | File | `/api/servers` | Medium
15 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
16 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
17 | File | `/cloud_config/router_post/upgrade_info` | High
18 | File | `/common/info.cgi` | High
19 | File | `/DataPackageTable` | High
20 | File | `/download/` | Medium
21 | File | `/etc/passwd` | Medium
22 | File | `/goform/SetPptpServerCfg` | High
23 | ... | ... | ...
13 | File | `/cgi-bin/uploadAccessCodePic` | High
14 | File | `/cgi-bin/uploadWeiXinPic` | High
15 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
16 | File | `/cloud_config/router_post/upgrade_info` | High
17 | File | `/common/info.cgi` | High
18 | File | `/config/list` | Medium
19 | File | `/controller/Index.php` | High
20 | File | `/data/sqldata` | High
21 | File | `/DataPackageTable` | High
22 | File | `/download/` | Medium
23 | File | `/etc/passwd` | Medium
24 | File | `/factor/avx-ecm/vecarith52.c` | High
25 | File | `/goform/delAd` | High
26 | ... | ... | ...
There are 189 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 215 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

37
actors/Babadeda/README.md Normal file
View File

@ -0,0 +1,37 @@
# Babadeda - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Babadeda](https://vuldb.com/?actor.babadeda). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.babadeda](https://vuldb.com/?actor.babadeda)
## Campaigns
The following _campaigns_ are known and can be associated with Babadeda:
* Ukraine
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Babadeda.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [45.12.5.62](https://vuldb.com/?ip.45.12.5.62) | galya.gitarova.example.com | Ukraine | High
2 | [185.244.41.109](https://vuldb.com/?ip.185.244.41.109) | - | Ukraine | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://twitter.com/s1ckb017/status/1494047314792665088
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,40 +1,40 @@
# Babar - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Babar](https://vuldb.com/?actor.babar). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Babar](https://vuldb.com/?actor.babar). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.babar](https://vuldb.com/?actor.babar)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.babar](https://vuldb.com/?actor.babar)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Babar:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Babar:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Babar.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Babar.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 64.20.43.107 | vps238561.trouble-free.net | High
2 | 69.25.212.153 | - | High
3 | 83.149.75.58 | reserved.ps-it.nl | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [64.20.43.107](https://vuldb.com/?ip.64.20.43.107) | vps238561.trouble-free.net | - | High
2 | [69.25.212.153](https://vuldb.com/?ip.69.25.212.153) | - | - | High
3 | [83.149.75.58](https://vuldb.com/?ip.83.149.75.58) | reserved.ps-it.nl | - | High
4 | ... | ... | ... | ...
There are 12 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Babar. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Babar_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Babar. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Babar. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -43,17 +43,17 @@ ID | Type | Indicator | Confidence
3 | File | `dc_categorieslist.asp` | High
4 | ... | ... | ...
There are 11 more IOA items available. Please use our online service to access the data.
There are 11 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=Elephantosis.pdf&y=2015
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -29,7 +29,7 @@ There are 30 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Barys_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Barys_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

30
actors/Bashlite/README.md Normal file
View File

@ -0,0 +1,30 @@
# Bashlite - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bashlite](https://vuldb.com/?actor.bashlite). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bashlite](https://vuldb.com/?actor.bashlite)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bashlite.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [185.244.25.213](https://vuldb.com/?ip.185.244.25.213) | - | - | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.trendmicro.co.jp/archives/20879
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,6 +1,6 @@
# BazarLoader - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BazarLoader](https://vuldb.com/?actor.bazarloader). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BazarLoader](https://vuldb.com/?actor.bazarloader). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bazarloader](https://vuldb.com/?actor.bazarloader)
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BazarLoader:
* US
* DE
* DK
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [DK](https://vuldb.com/?country.dk)
* ...
There are 12 more country items available. Please use our online service to access the data.
There are 21 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -21,24 +21,36 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 31.171.251.118 | ch.ns.mon0.li | - | High
2 | 31.214.240.203 | - | - | High
3 | 34.209.40.84 | ec2-34-209-40-84.us-west-2.compute.amazonaws.com | - | Medium
4 | 34.221.188.35 | ec2-34-221-188-35.us-west-2.compute.amazonaws.com | - | Medium
5 | 45.71.112.70 | host-45-71-112-70.nedetel.net | - | High
6 | ... | ... | ... | ...
1 | [13.225.230.232](https://vuldb.com/?ip.13.225.230.232) | server-13-225-230-232.jfk51.r.cloudfront.net | - | High
2 | [13.226.32.216](https://vuldb.com/?ip.13.226.32.216) | server-13-226-32-216.ewr53.r.cloudfront.net | - | High
3 | [18.67.60.164](https://vuldb.com/?ip.18.67.60.164) | server-18-67-60-164.iad89.r.cloudfront.net | - | High
4 | [23.56.10.219](https://vuldb.com/?ip.23.56.10.219) | a23-56-10-219.deploy.static.akamaitechnologies.com | - | High
5 | [23.62.25.178](https://vuldb.com/?ip.23.62.25.178) | a23-62-25-178.deploy.static.akamaitechnologies.com | - | High
6 | [23.95.238.122](https://vuldb.com/?ip.23.95.238.122) | 23-95-238-122-host.colocrossing.com | - | High
7 | [23.106.223.174](https://vuldb.com/?ip.23.106.223.174) | - | - | High
8 | [23.160.193.217](https://vuldb.com/?ip.23.160.193.217) | unknown.ip-xfer.net | - | High
9 | [23.193.217.119](https://vuldb.com/?ip.23.193.217.119) | a23-193-217-119.deploy.static.akamaitechnologies.com | - | High
10 | [31.171.251.118](https://vuldb.com/?ip.31.171.251.118) | ch.ns.mon0.li | - | High
11 | [31.214.240.203](https://vuldb.com/?ip.31.214.240.203) | - | - | High
12 | [34.209.40.84](https://vuldb.com/?ip.34.209.40.84) | ec2-34-209-40-84.us-west-2.compute.amazonaws.com | - | Medium
13 | [34.221.188.35](https://vuldb.com/?ip.34.221.188.35) | ec2-34-221-188-35.us-west-2.compute.amazonaws.com | - | Medium
14 | [34.222.222.126](https://vuldb.com/?ip.34.222.222.126) | ec2-34-222-222-126.us-west-2.compute.amazonaws.com | - | Medium
15 | [40.76.4.15](https://vuldb.com/?ip.40.76.4.15) | - | - | High
16 | [40.112.72.205](https://vuldb.com/?ip.40.112.72.205) | - | - | High
17 | [40.113.200.201](https://vuldb.com/?ip.40.113.200.201) | - | - | High
18 | ... | ... | ... | ...
There are 22 more IOC items available. Please use our online service to access the data.
There are 68 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by BazarLoader. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BazarLoader_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 7 more TTP items available. Please use our online service to access the data.
@ -49,49 +61,74 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `.user` | Low
2 | File | `/.dbus-keyrings` | High
3 | File | `/cgi-bin/system_mgr.cgi` | High
4 | File | `/Content/Template/root/reverse-shell.aspx` | High
5 | File | `/debug/pprof` | Medium
6 | File | `/inc/parser/xhtml.php` | High
7 | File | `/includes/db_adodb.php` | High
8 | File | `/PluXml/core/admin/parametres_edittpl.php` | High
9 | File | `/register.do` | Medium
10 | File | `/rest/project-templates/1.0/createshared` | High
11 | File | `/restoreinfo.cgi` | High
12 | File | `/services` | Medium
13 | File | `/var/passwd` | Medium
14 | File | `/var/run/storage_account_root` | High
15 | File | `/webconsole/APIController` | High
16 | File | `802dot1xclientcert.cgi` | High
17 | File | `account.asp` | Medium
18 | File | `Account.aspx` | Medium
19 | File | `ActionsAndOperations` | High
20 | File | `adclick.php` | Medium
21 | File | `admin/db-backup-security/db-backup-security.php` | High
22 | File | `admin/membersearch.php` | High
23 | File | `agent_links.pl` | High
24 | File | `Ap4StssAtom.cpp` | High
25 | File | `Ap4StszAtom.cpp` | High
26 | File | `apetag.c` | Medium
27 | File | `apply_sec.cgi` | High
28 | File | `article.php` | Medium
29 | File | `asp` | Low
30 | File | `attrs.c` | Low
31 | File | `auth-gss2.c` | Medium
32 | File | `auth.inc.php` | Medium
33 | File | `authuser.php` | Medium
34 | File | `bkr/server/widgets.py` | High
35 | ... | ... | ...
1 | File | `.htaccess` | Medium
2 | File | `.user` | Low
3 | File | `/.dbus-keyrings` | High
4 | File | `/api` | Low
5 | File | `/catalog/admin/categories.php?cPath=&action=new_product` | High
6 | File | `/cgi-bin/system_mgr.cgi` | High
7 | File | `/common/ticket_associated_tickets.php` | High
8 | File | `/common/user_profile.php` | High
9 | File | `/Content/Template/root/reverse-shell.aspx` | High
10 | File | `/debug/pprof` | Medium
11 | File | `/getcfg.php` | Medium
12 | File | `/goform/form2userconfig.cgi` | High
13 | File | `/include/makecvs.php` | High
14 | File | `/includes/db_adodb.php` | High
15 | File | `/objects/pluginSwitch.json.php` | High
16 | File | `/PluXml/core/admin/parametres_edittpl.php` | High
17 | File | `/register.do` | Medium
18 | File | `/rest/api/latest/groupuserpicker` | High
19 | File | `/rest/project-templates/1.0/createshared` | High
20 | File | `/restoreinfo.cgi` | High
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
22 | File | `/see_more_details.php` | High
23 | File | `/sendrcpackage?keyid=-2544&keysymbol=-4081` | High
24 | File | `/services` | Medium
25 | File | `/uncpath/` | Medium
26 | File | `/usr/local/vesta/bin` | High
27 | File | `/usr/sbin/suexec` | High
28 | File | `/v3/credentials` | High
29 | File | `/var/log/monkeyd/master.log` | High
30 | File | `/var/passwd` | Medium
31 | File | `/var/run/storage_account_root` | High
32 | File | `/webconsole/APIController` | High
33 | File | `/websocket` | Medium
34 | File | `802dot1xclientcert.cgi` | High
35 | File | `account.asp` | Medium
36 | File | `Account.aspx` | Medium
37 | File | `ActionsAndOperations` | High
38 | File | `adclick.php` | Medium
39 | File | `add.php` | Low
40 | File | `admin/?n=tags&c=index&a=doSaveTags` | High
41 | File | `admin/admin.shtml` | High
42 | File | `admin/db-backup-security/db-backup-security.php` | High
43 | File | `admin/graph_trend.php` | High
44 | File | `administrator/components/com_media/helpers/media.php` | High
45 | File | `adminquery.php` | High
46 | File | `agent_links.pl` | High
47 | File | `Ap4StssAtom.cpp` | High
48 | File | `Ap4StszAtom.cpp` | High
49 | File | `apetag.c` | Medium
50 | File | `app/system/language/admin/language_general.class.php` | High
51 | File | `apply_sec.cgi` | High
52 | File | `app\contacts\contact_times.php` | High
53 | File | `Archive.java` | Medium
54 | File | `article.php` | Medium
55 | ... | ... | ...
There are 299 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 484 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.talosintelligence.com/2021/05/threat-roundup-0514-0521.html
* https://blog.talosintelligence.com/2022/02/threat-roundup-0211-0218.html
* https://blog.talosintelligence.com/2022/03/threat-roundup-0311-0318.html
* https://isc.sans.edu/forums/diary/April+2021+Forensic+Quiz+Answers+and+Analysis/27308/
* https://isc.sans.edu/forums/diary/Stolen+Images+Evidence+Campaign+Continues+Pushing+BazarLoader+Malware/27816/
* https://isc.sans.edu/forums/diary/TA551+Shathak+continues+pushing+BazarLoader+infections+lead+to+Cobalt+Strike/27738/
* https://twitter.com/_pr4gma/status/1347617681197961225
## Literature

View File

@ -9,11 +9,11 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Black KingDom:
* [US](https://vuldb.com/?country.us)
* [RU](https://vuldb.com/?country.ru)
* [FR](https://vuldb.com/?country.fr)
* [MX](https://vuldb.com/?country.mx)
* ...
There are 5 more country items available. Please use our online service to access the data.
There are 8 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -35,11 +35,11 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 8 more TTP items available. Please use our online service to access the data.
There are 9 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -49,28 +49,32 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.htaccess` | Medium
2 | File | `/admin-panel1.php` | High
3 | File | `/admin/login.php` | High
4 | File | `/admin/templates/template_manage.php` | High
5 | File | `/adminzone/index.php?page=admin-commandr` | High
6 | File | `/api/servers` | Medium
7 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
8 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
9 | File | `/cloud_config/router_post/upgrade_info` | High
10 | File | `/core/admin/comment.php` | High
11 | File | `/DataPackageTable` | High
12 | File | `/download/` | Medium
13 | File | `/etc/passwd` | Medium
14 | File | `/etc/wpa_supplicant.conf` | High
15 | File | `/goform/SetPptpServerCfg` | High
16 | File | `/i/:data/ipa.plist` | High
17 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
18 | File | `/js/js-parser.c` | High
19 | File | `/main?cmd=invalid_browser` | High
20 | File | `/mdiy/dict/listExcludeApp` | High
21 | File | `/ms/file/uploadTemplate.do` | High
22 | ... | ... | ...
3 | File | `/admin.php/admin/ulog/index.html` | High
4 | File | `/admin.php/admin/vod/data.html` | High
5 | File | `/admin/login.php` | High
6 | File | `/admin/templates/template_manage.php` | High
7 | File | `/api/servers` | Medium
8 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
9 | File | `/cgi-bin/uploadAccessCodePic` | High
10 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
11 | File | `/cloud_config/router_post/upgrade_info` | High
12 | File | `/core/admin/comment.php` | High
13 | File | `/data/sqldata` | High
14 | File | `/DataPackageTable` | High
15 | File | `/download/` | Medium
16 | File | `/etc/passwd` | Medium
17 | File | `/etc/wpa_supplicant.conf` | High
18 | File | `/factor/avx-ecm/vecarith52.c` | High
19 | File | `/goform/delAd` | High
20 | File | `/goform/form2Reboot.cgi` | High
21 | File | `/goform/SetLanInfo` | High
22 | File | `/goform/SetPptpServerCfg` | High
23 | File | `/i/:data/ipa.plist` | High
24 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
25 | File | `/js/js-parser.c` | High
26 | ... | ... | ...
There are 180 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 216 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,12 +1,12 @@
# BlackTech - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackTech](https://vuldb.com/?actor.blacktech). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackTech](https://vuldb.com/?actor.blacktech). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.blacktech](https://vuldb.com/?actor.blacktech)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.blacktech](https://vuldb.com/?actor.blacktech)
## Campaigns
The following campaigns are known and can be associated with BlackTech:
The following _campaigns_ are known and can be associated with BlackTech:
* Taiwan Government Agencies
* TSCookie
@ -14,51 +14,60 @@ The following campaigns are known and can be associated with BlackTech:
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackTech:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackTech:
* CN
* MS
* US
* [MS](https://vuldb.com/?country.ms)
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BlackTech.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BlackTech.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 10.0.0.211 | - | High
2 | 43.240.12.81 | mail.terascape.net | High
3 | 45.76.102.145 | 45.76.102.145.vultr.com | Medium
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [10.0.0.211](https://vuldb.com/?ip.10.0.0.211) | - | WaterBear | High
2 | [43.240.12.81](https://vuldb.com/?ip.43.240.12.81) | mail.terascape.net | Taiwan Government Agencies | High
3 | [45.76.102.145](https://vuldb.com/?ip.45.76.102.145) | 45.76.102.145.vultr.com | TSCookie | Medium
4 | ... | ... | ... | ...
There are 7 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by BlackTech. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlackTech_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1600 | Cryptographic Issues | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 3 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackTech. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackTech. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/wp-json/oembed/1.0/embed?url` | High
2 | File | `base/ErrorHandler.php` | High
3 | File | `goto.php` | Medium
4 | ... | ... | ...
1 | File | `/mifs/c/i/reg/reg.html` | High
2 | File | `/server-info` | Medium
3 | File | `/wp-json/oembed/1.0/embed?url` | High
4 | File | `a2billing/customer/iridium_threed.php` | High
5 | File | `admin.php?s=/Channel/add.html` | High
6 | File | `admin/class-bulk-editor-list-table.php` | High
7 | File | `administrator/components/com_media/helpers/media.php` | High
8 | File | `auth.asp` | Medium
9 | File | `base/ErrorHandler.php` | High
10 | ... | ... | ...
There are 8 more IOA items available. Please use our online service to access the data.
There are 72 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blogs.jpcert.or.jp/en/2018/03/malware-tscooki-7aa0.html
* https://www.ithome.com.tw/news/139504
@ -67,7 +76,7 @@ The following list contains external sources which discuss the actor and the ass
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -0,0 +1,62 @@
# BlueNoroff - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlueNoroff](https://vuldb.com/?actor.bluenoroff). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bluenoroff](https://vuldb.com/?actor.bluenoroff)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlueNoroff:
* [US](https://vuldb.com/?country.us)
* [VN](https://vuldb.com/?country.vn)
* [BR](https://vuldb.com/?country.br)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BlueNoroff.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [45.238.25.2](https://vuldb.com/?ip.45.238.25.2) | ip-45-238-25-2.interlink.com.br | - | High
2 | [118.70.116.154](https://vuldb.com/?ip.118.70.116.154) | - | - | High
3 | [163.25.24.44](https://vuldb.com/?ip.163.25.24.44) | - | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlueNoroff_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1211 | CWE-254 | 7PK Security Features | High
2 | T1600 | CWE-310, CWE-311 | Cryptographic Issues | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlueNoroff. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
2 | File | `auth.php` | Medium
3 | File | `class_gw_2checkout.php` | High
4 | ... | ... | ...
There are 19 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,6 +1,6 @@
# Bunse - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bunse](https://vuldb.com/?actor.bunse). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bunse](https://vuldb.com/?actor.bunse). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bunse](https://vuldb.com/?actor.bunse)
@ -14,8 +14,8 @@ The following _campaigns_ are known and can be associated with Bunse:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bunse:
* ES
* US
* [ES](https://vuldb.com/?country.es)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
@ -23,8 +23,8 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 62.171.157.185 | vmi479022.contaboserver.net | Afghanistan and India | High
2 | 95.111.241.233 | vmi698587.contaboserver.net | Afghanistan and India | High
1 | [62.171.157.185](https://vuldb.com/?ip.62.171.157.185) | vmi479022.contaboserver.net | Afghanistan and India | High
2 | [95.111.241.233](https://vuldb.com/?ip.95.111.241.233) | vmi698587.contaboserver.net | Afghanistan and India | High
## IOA - Indicator of Attack

View File

@ -56,39 +56,39 @@ ID | Type | Indicator | Confidence
4 | File | `/Admin/Views/FileEditor/` | High
5 | File | `/article/add` | Medium
6 | File | `/cgi-bin/editBookmark` | High
7 | File | `/computer/(agent-name)/api` | High
8 | File | `/controller/pay.class.php` | High
9 | File | `/dev/block/mmcblk0rpmb` | High
10 | File | `/dev/kmem` | Medium
11 | File | `/dev/shm` | Medium
12 | File | `/dev/snd/seq` | Medium
13 | File | `/device/device=140/tab=wifi/view` | High
14 | File | `/dl/dl_print.php` | High
15 | File | `/getcfg.php` | Medium
16 | File | `/goform/addressNat` | High
17 | File | `/htdocs/admin/dict.php?id=3` | High
18 | File | `/include/menu_v.inc.php` | High
19 | File | `/includes/rrdtool.inc.php` | High
20 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
21 | File | `/jerry-core/ecma/base/ecma-gc.c` | High
22 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
23 | File | `/login` | Low
24 | File | `/module/module_frame/index.php` | High
25 | File | `/notice-edit.php` | High
26 | File | `/nova/bin/sniffer` | High
27 | File | `/proc/pid/syscall` | High
28 | File | `/product_list.php` | High
29 | File | `/rest/api/2/user/picker` | High
30 | File | `/rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application` | High
31 | File | `/services/details.asp` | High
32 | File | `/src/core/controllers/cm.php` | High
33 | File | `/storage/app/media/evil.svg` | High
34 | File | `/transmission/web/` | High
35 | File | `/uapi/doc` | Medium
36 | File | `/uncpath/` | Medium
7 | File | `/cgi-bin/uploadWeiXinPic` | High
8 | File | `/computer/(agent-name)/api` | High
9 | File | `/controller/pay.class.php` | High
10 | File | `/dev/block/mmcblk0rpmb` | High
11 | File | `/dev/kmem` | Medium
12 | File | `/dev/shm` | Medium
13 | File | `/dev/snd/seq` | Medium
14 | File | `/device/device=140/tab=wifi/view` | High
15 | File | `/dl/dl_print.php` | High
16 | File | `/getcfg.php` | Medium
17 | File | `/goform/addressNat` | High
18 | File | `/htdocs/admin/dict.php?id=3` | High
19 | File | `/include/menu_v.inc.php` | High
20 | File | `/includes/rrdtool.inc.php` | High
21 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
22 | File | `/jerry-core/ecma/base/ecma-gc.c` | High
23 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
24 | File | `/login` | Low
25 | File | `/module/module_frame/index.php` | High
26 | File | `/notice-edit.php` | High
27 | File | `/nova/bin/sniffer` | High
28 | File | `/proc/pid/syscall` | High
29 | File | `/product_list.php` | High
30 | File | `/rest/api/2/user/picker` | High
31 | File | `/rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application` | High
32 | File | `/services/details.asp` | High
33 | File | `/src/core/controllers/cm.php` | High
34 | File | `/storage/app/media/evil.svg` | High
35 | File | `/transmission/web/` | High
36 | File | `/uapi/doc` | Medium
37 | ... | ... | ...
There are 313 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 316 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -4,13 +4,19 @@ These _indicators_ were reported, collected, and generated during the [VulDB CTI
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.chafer](https://vuldb.com/?actor.chafer)
## Campaigns
The following _campaigns_ are known and can be associated with Chafer:
* Remexi
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Chafer:
* [US](https://vuldb.com/?country.us)
* [RU](https://vuldb.com/?country.ru)
* [GB](https://vuldb.com/?country.gb)
* [IR](https://vuldb.com/?country.ir)
* ...
There are 18 more country items available. Please use our online service to access the data.
@ -26,7 +32,7 @@ ID | IP address | Hostname | Campaign | Confidence
3 | [89.38.97.115](https://vuldb.com/?ip.89.38.97.115) | 89-38-97-115.hosted-by-worldstream.net | - | High
4 | ... | ... | ... | ...
There are 7 more IOC items available. Please use our online service to access the data.
There are 8 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -50,17 +56,19 @@ ID | Type | Indicator | Confidence
1 | File | `//etc/RT2870STA.dat` | High
2 | File | `/admin/index.php?id=themes&action=edit_template&filename=blog` | High
3 | File | `/cwp_{SESSION_HASH}/admin/loader_ajax.php` | High
4 | File | `/magnoliaPublic/travel/members/login.html` | High
5 | File | `/Main_AdmStatus_Content.asp` | High
6 | File | `/uncpath/` | Medium
7 | ... | ... | ...
4 | File | `/jquery_file_upload/server/php/index.php` | High
5 | File | `/magnoliaPublic/travel/members/login.html` | High
6 | File | `/Main_AdmStatus_Content.asp` | High
7 | File | `/uncpath/` | Medium
8 | ... | ... | ...
There are 50 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 57 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://securelist.com/chafer-used-remexi-malware/89538/
* https://www.threatminer.org/report.php?q=Chafer_LatestAttacksRevealHeightenedAmbitions_SymantecBlogs.pdf&y=2018
* https://www.threatminer.org/_reports/2019/NewPython-BasedPayloadMechaFlounderUsedbyChafer.pdf#viewer.action=download

View File

@ -8,6 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
The following _campaigns_ are known and can be associated with Charming Kitten:
* CVE-2021-34473 / CVE-2021-34523 / CVE-2021-31207
* Log4Shell
## Countries
@ -51,7 +52,7 @@ ID | IP address | Hostname | Campaign | Confidence
22 | [69.30.221.126](https://vuldb.com/?ip.69.30.221.126) | - | - | High
23 | ... | ... | ... | ...
There are 88 more IOC items available. Please use our online service to access the data.
There are 89 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -101,9 +102,10 @@ ID | Type | Indicator | Confidence
27 | File | `actions/CompanyDetailsSave.php` | High
28 | File | `ActiveServices.java` | High
29 | File | `ActivityManagerService.java` | High
30 | ... | ... | ...
30 | File | `admin.php` | Medium
31 | ... | ... | ...
There are 259 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 262 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -111,6 +113,7 @@ The following list contains _external sources_ which discuss the actor and the a
* https://github.com/blackorbird/APT_REPORT/tree/master/Charming%20Kitten
* https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/
* https://thedfirreport.com/2022/03/21/apt35-automates-initial-access-using-proxyshell/
* https://vxug.fakedoma.in/archive/APTs/2021/2021.01.08/Charming%20Kitten.pdf
* https://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf

View File

@ -1,49 +1,78 @@
# China Unknown - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [China Unknown](https://vuldb.com/?actor.china_unknown). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [China Unknown](https://vuldb.com/?actor.china_unknown). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.china_unknown](https://vuldb.com/?actor.china_unknown)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.china_unknown](https://vuldb.com/?actor.china_unknown)
## Campaigns
The following campaigns are known and can be associated with China Unknown:
The following _campaigns_ are known and can be associated with China Unknown:
* Dragon Castling
* RedXOR
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with China Unknown:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with China Unknown:
* CN
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [GB](https://vuldb.com/?country.gb)
* ...
There are 2 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of China Unknown.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of China Unknown.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 34.92.228.216 | 216.228.92.34.bc.googleusercontent.com | Medium
2 | 158.247.208.230 | 158.247.208.230.vultr.com | Medium
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [23.106.123.196](https://vuldb.com/?ip.23.106.123.196) | - | Dragon Castling | High
2 | [23.106.124.136](https://vuldb.com/?ip.23.106.124.136) | - | Dragon Castling | High
3 | [34.92.228.216](https://vuldb.com/?ip.34.92.228.216) | 216.228.92.34.bc.googleusercontent.com | RedXOR | Medium
4 | ... | ... | ... | ...
There are 3 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _China Unknown_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 2 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by China Unknown. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by China Unknown. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `index.php` | Medium
2 | File | `wp-includes/class-wp-query.php` | High
3 | Argument | `tid` | Low
1 | File | `/public/plugins/` | High
2 | File | `/rom-0` | Low
3 | File | `/uncpath/` | Medium
4 | File | `actions/ChangeConfiguration.html` | High
5 | File | `ajaxfilemanager.php` | High
6 | ... | ... | ...
There are 42 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://github.com/avast/ioc/tree/master/OperationDragonCastling
* https://vxug.fakedoma.in/archive/APTs/2021/2021.03.10(1)/RedXOR.pdf
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,57 +1,57 @@
# Cleaver - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cleaver](https://vuldb.com/?actor.cleaver). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cleaver](https://vuldb.com/?actor.cleaver). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cleaver](https://vuldb.com/?actor.cleaver)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cleaver](https://vuldb.com/?actor.cleaver)
## Campaigns
The following campaigns are known and can be associated with Cleaver:
The following _campaigns_ are known and can be associated with Cleaver:
* Cleaver
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cleaver:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cleaver:
* US
* CA
* NL
* [US](https://vuldb.com/?country.us)
* [CA](https://vuldb.com/?country.ca)
* [NL](https://vuldb.com/?country.nl)
* ...
There are 6 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Cleaver.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Cleaver.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 23.238.17.181 | s1.regulatorfix.com | High
2 | 50.23.164.161 | a1.a4.1732.ip4.static.sl-reverse.com | High
3 | 64.120.128.154 | - | High
4 | 64.120.208.74 | - | High
5 | 64.120.208.75 | - | High
6 | 64.120.208.76 | - | High
7 | 64.120.208.78 | - | High
8 | 66.96.252.198 | host-66-96-252-198.myrepublic.co.id | High
9 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [23.238.17.181](https://vuldb.com/?ip.23.238.17.181) | s1.regulatorfix.com | Cleaver | High
2 | [50.23.164.161](https://vuldb.com/?ip.50.23.164.161) | a1.a4.1732.ip4.static.sl-reverse.com | Cleaver | High
3 | [64.120.128.154](https://vuldb.com/?ip.64.120.128.154) | - | Cleaver | High
4 | [64.120.208.74](https://vuldb.com/?ip.64.120.208.74) | - | Cleaver | High
5 | [64.120.208.75](https://vuldb.com/?ip.64.120.208.75) | - | Cleaver | High
6 | [64.120.208.76](https://vuldb.com/?ip.64.120.208.76) | - | Cleaver | High
7 | [64.120.208.78](https://vuldb.com/?ip.64.120.208.78) | - | Cleaver | High
8 | [66.96.252.198](https://vuldb.com/?ip.66.96.252.198) | host-66-96-252-198.myrepublic.co.id | Cleaver | High
9 | ... | ... | ... | ...
There are 32 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Cleaver. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cleaver_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1587.003 | Improper Certificate Validation | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1587.003 | CWE-295 | Improper Certificate Validation | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cleaver. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cleaver. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -60,18 +60,18 @@ ID | Type | Indicator | Confidence
3 | File | `adclick.php` | Medium
4 | ... | ... | ...
There are 24 more IOA items available. Please use our online service to access the data.
There are 25 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.cylance.com/content/dam/cylance/pages/operation-cleaver/Cylance_Operation_Cleaver_Report.pdf
* https://www.threatminer.org/report.php?q=Cylance_Operation_Cleaver_Report.pdf&y=2014
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Group:
* [IT](https://vuldb.com/?country.it)
* [DE](https://vuldb.com/?country.de)
* [ES](https://vuldb.com/?country.es)
* [IT](https://vuldb.com/?country.it)
* [SV](https://vuldb.com/?country.sv)
* ...
There are 5 more country items available. Please use our online service to access the data.
There are 6 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -31,7 +31,7 @@ There are 16 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Cobalt Group_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cobalt Group_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -51,28 +51,28 @@ ID | Type | Indicator | Confidence
1 | File | `/account/login` | High
2 | File | `/admin.back` | Medium
3 | File | `/admin.html?do=user&act=add` | High
4 | File | `/administrator/components/menu/` | High
5 | File | `/controller/CommentAdminController.java` | High
6 | File | `/event-management/index.php` | High
7 | File | `/goform/change_password_process` | High
8 | File | `/goform/edit_opt` | High
9 | File | `/goform/SetPptpServerCfg` | High
10 | File | `/hdf5/src/H5Fint.c` | High
11 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
12 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
13 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
14 | File | `/jerry-core/ecma/operations/ecma-objects.c` | High
15 | File | `/secure/admin/ImporterFinishedPage.jspa` | High
16 | File | `/src/njs_object.c` | High
17 | File | `/template/unzip.do` | High
18 | File | `/wp-json/wc/v3/webhooks` | High
19 | File | `AccountManagerService.java` | High
20 | File | `account_sponsor_page.php` | High
21 | File | `act.php` | Low
22 | File | `adduser.do` | Medium
4 | File | `/admin/customers.php?page=1&cID` | High
5 | File | `/admin/link/link_ok.php` | High
6 | File | `/administrator/components/menu/` | High
7 | File | `/controller/CommentAdminController.java` | High
8 | File | `/event-management/index.php` | High
9 | File | `/goform/change_password_process` | High
10 | File | `/goform/edit_opt` | High
11 | File | `/goform/SetPptpServerCfg` | High
12 | File | `/hdf5/src/H5Fint.c` | High
13 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
14 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
15 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
16 | File | `/jerry-core/ecma/operations/ecma-objects.c` | High
17 | File | `/src/njs_object.c` | High
18 | File | `/template/unzip.do` | High
19 | File | `/wp-json/wc/v3/webhooks` | High
20 | File | `AccountManagerService.java` | High
21 | File | `account_sponsor_page.php` | High
22 | File | `act.php` | Low
23 | ... | ... | ...
There are 196 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 193 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,69 +1,124 @@
# Cobalt Strike - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cobalt Strike](https://vuldb.com/?actor.cobalt_strike). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cobalt Strike](https://vuldb.com/?actor.cobalt_strike). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cobalt_strike](https://vuldb.com/?actor.cobalt_strike)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cobalt_strike](https://vuldb.com/?actor.cobalt_strike)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Strike:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Strike:
* US
* CN
* IT
* [SV](https://vuldb.com/?country.sv)
* [US](https://vuldb.com/?country.us)
* [PL](https://vuldb.com/?country.pl)
* ...
There are 3 more country items available. Please use our online service to access the data.
There are 11 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Cobalt Strike.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Cobalt Strike.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 23.108.57.108 | - | High
2 | 62.128.111.176 | - | High
3 | 82.118.21.221 | vds-887334.hosted-by-itldc.com | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [23.82.140.91](https://vuldb.com/?ip.23.82.140.91) | - | - | High
2 | [23.108.57.108](https://vuldb.com/?ip.23.108.57.108) | - | - | High
3 | [62.128.111.176](https://vuldb.com/?ip.62.128.111.176) | - | - | High
4 | ... | ... | ... | ...
There are 5 more IOC items available. Please use our online service to access the data.
There are 9 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Cobalt Strike. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cobalt Strike_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1499 | Resource Consumption | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1222 | CWE-275 | Permission Issues | High
4 | ... | ... | ... | ...
There are 3 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cobalt Strike. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cobalt Strike. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/admin/success_story.php` | High
2 | File | `/etc/tomcat8/Catalina/attack` | High
3 | File | `/movie-portal-script/movie.php` | High
4 | File | `/notice-edit.php` | High
5 | File | `/wp-content/plugins/updraftplus/admin.php` | High
6 | File | `admin/images.php` | High
7 | File | `admin/preview.php` | High
8 | File | `archive_read_support_format_rar5.c` | High
9 | File | `blanko.preview.php` | High
10 | File | `burl.c` | Low
11 | File | `CFM File Handler` | High
12 | File | `cgi-bin/awstats.pl` | High
13 | ... | ... | ...
1 | File | `/.ssh/authorized_keys` | High
2 | File | `/?admin/user.html` | High
3 | File | `/admin/success_story.php` | High
4 | File | `/configuration/httpListenerEdit.jsf` | High
5 | File | `/etc/tomcat8/Catalina/attack` | High
6 | File | `/movie-portal-script/movie.php` | High
7 | File | `/notice-edit.php` | High
8 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
9 | File | `/tmp` | Low
10 | File | `/wp-content/plugins/updraftplus/admin.php` | High
11 | File | `4.2.0.CP08` | Medium
12 | File | `account.asp` | Medium
13 | File | `acerctrl.ocx` | Medium
14 | File | `activate.php` | Medium
15 | File | `add.php` | Low
16 | File | `addressbook/csv_import.php` | High
17 | File | `adm/krgourl.php` | High
18 | File | `admin.php` | Medium
19 | File | `admin/admin.php` | High
20 | File | `admin/adminaddeditdetails.php` | High
21 | File | `admin/ajaxsave.php` | High
22 | File | `admin/auth.php` | High
23 | File | `admin/config.php` | High
24 | File | `admin/images.php` | High
25 | File | `ADMIN/loginaction.php` | High
26 | File | `admin/member_details.php` | High
27 | File | `admin/preview.php` | High
28 | File | `ajax/addComment.php` | High
29 | File | `App_Data/sb.mdb` | High
30 | File | `archive_read_support_format_rar5.c` | High
31 | File | `article.php` | Medium
32 | File | `asp:.jpg` | Medium
33 | File | `auth-options.c` | High
34 | File | `auth2-gss.c` | Medium
35 | File | `aviso.php` | Medium
36 | File | `backup.php` | Medium
37 | File | `bios.php` | Medium
38 | File | `blanko.preview.php` | High
39 | File | `blocks.php` | Medium
40 | File | `breadcrumbs_create.php` | High
41 | File | `browse.php` | Medium
42 | File | `browse_ladies.php` | High
43 | File | `burl.c` | Low
44 | File | `cadena_ofertas_ext.php` | High
45 | File | `cal_popup.php` | High
46 | File | `category-delete.php` | High
47 | File | `category.php` | Medium
48 | File | `CFM File Handler` | High
49 | File | `cgi-bin/awstats.pl` | High
50 | File | `Change-password.php` | High
51 | File | `charts.php` | Medium
52 | File | `classified.php` | High
53 | File | `client.c` | Medium
54 | File | `cmd.php` | Low
55 | File | `comment.php` | Medium
56 | File | `comments.php` | Medium
57 | File | `config.php` | Medium
58 | File | `controller/fetchpwd.php` | High
59 | File | `core/stack/l2cap/l2cap_sm.c` | High
60 | File | `country_escorts.php` | High
61 | File | `cource.php` | Medium
62 | ... | ... | ...
There are 98 more IOA items available. Please use our online service to access the data.
There are 547 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://isc.sans.edu/forums/diary/Example+of+Cobalt+Strike+from+Emotet+infection/28318/
* https://isc.sans.edu/forums/diary/Qakbot+infection+with+Cobalt+Strike+and+VNC+activity/28448/
* https://research.checkpoint.com/2019/cobalt-group-returns-to-kazakhstan/
* https://twitter.com/malware_traffic/status/1400876426497253379
* https://twitter.com/malware_traffic/status/1415740795622248452
* https://twitter.com/Unit42_Intel/status/1392174941181812737
@ -72,7 +127,7 @@ The following list contains external sources which discuss the actor and the ass
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -29,19 +29,19 @@ ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.39.23.192](https://vuldb.com/?ip.5.39.23.192) | ip192.ip-5-39-23.eu | - | High
2 | [5.135.85.16](https://vuldb.com/?ip.5.135.85.16) | flotweb-o20.bestonthenet.fr | - | High
3 | [46.165.207.98](https://vuldb.com/?ip.46.165.207.98) | - | - | High
4 | [46.165.207.99](https://vuldb.com/?ip.46.165.207.99) | - | - | High
5 | [46.165.207.108](https://vuldb.com/?ip.46.165.207.108) | - | - | High
6 | [46.165.207.109](https://vuldb.com/?ip.46.165.207.109) | - | - | High
7 | [46.165.207.112](https://vuldb.com/?ip.46.165.207.112) | - | - | High
8 | [46.165.207.113](https://vuldb.com/?ip.46.165.207.113) | - | - | High
3 | [23.81.246.170](https://vuldb.com/?ip.23.81.246.170) | - | - | High
4 | [46.165.207.98](https://vuldb.com/?ip.46.165.207.98) | - | - | High
5 | [46.165.207.99](https://vuldb.com/?ip.46.165.207.99) | - | - | High
6 | [46.165.207.108](https://vuldb.com/?ip.46.165.207.108) | - | - | High
7 | [46.165.207.109](https://vuldb.com/?ip.46.165.207.109) | - | - | High
8 | [46.165.207.112](https://vuldb.com/?ip.46.165.207.112) | - | - | High
9 | ... | ... | ... | ...
There are 33 more IOC items available. Please use our online service to access the data.
There are 34 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Confucius_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Confucius_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -60,8 +60,8 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `$SPLUNK_HOME/etc/splunk-launch.conf` | High
2 | File | `/+CSCOE+/logon.html` | High
3 | File | `/admin/index.php` | High
4 | File | `/assets/ctx` | Medium
3 | File | `/assets/ctx` | Medium
4 | File | `/cloud_config/router_post/check_reg_verify_code` | High
5 | File | `/concat?/%2557EB-INF/web.xml` | High
6 | File | `/config/getuser` | High
7 | File | `/debug/pprof` | Medium
@ -75,58 +75,56 @@ ID | Type | Indicator | Confidence
15 | File | `/osm/REGISTER.cmd` | High
16 | File | `/product_list.php` | High
17 | File | `/replication` | Medium
18 | File | `/see_more_details.php` | High
19 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
20 | File | `/supervisor/procesa_carga.php` | High
21 | File | `/type.php` | Medium
22 | File | `/uncpath/` | Medium
23 | File | `/usr/bin/pkexec` | High
24 | File | `/zm/index.php` | High
25 | File | `4.2.0.CP09` | Medium
26 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
27 | File | `802dot1xclientcert.cgi` | High
28 | File | `add.exe` | Low
29 | File | `addentry.php` | Medium
30 | File | `admin-ajax.php` | High
31 | File | `admin.color.php` | High
32 | File | `admin.cropcanvas.php` | High
33 | File | `admin.joomlaradiov5.php` | High
34 | File | `admin.php` | Medium
35 | File | `admin.php?m=Food&a=addsave` | High
36 | File | `admin/category.inc.php` | High
37 | File | `admin/conf_users_edit.php` | High
38 | File | `admin/index.php` | High
39 | File | `admin/user.php` | High
40 | File | `admin/write-post.php` | High
41 | File | `administrator/components/com_media/helpers/media.php` | High
42 | File | `admin_events.php` | High
43 | File | `ajax_new_account.php` | High
44 | File | `akocomments.php` | High
45 | File | `allopass-error.php` | High
46 | File | `announcement.php` | High
47 | File | `app.php` | Low
48 | File | `apply.cgi` | Medium
49 | File | `archiver\index.php` | High
50 | File | `artlinks.dispnew.php` | High
51 | File | `auth.inc.php` | Medium
52 | File | `authorization.do` | High
53 | File | `awstats.pl` | Medium
54 | File | `backoffice/login.asp` | High
55 | File | `bb_usage_stats.php` | High
56 | File | `binder.c` | Medium
57 | File | `bl-kernel/ajax/upload-images.php` | High
58 | File | `books.php` | Medium
59 | File | `C:\Python27` | Medium
60 | File | `C:\Windows\System32\config\SAM` | High
61 | ... | ... | ...
18 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
19 | File | `/supervisor/procesa_carga.php` | High
20 | File | `/type.php` | Medium
21 | File | `/uncpath/` | Medium
22 | File | `/usr/bin/pkexec` | High
23 | File | `/zm/index.php` | High
24 | File | `4.2.0.CP09` | Medium
25 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
26 | File | `802dot1xclientcert.cgi` | High
27 | File | `add.exe` | Low
28 | File | `addentry.php` | Medium
29 | File | `admin-ajax.php` | High
30 | File | `admin.color.php` | High
31 | File | `admin.cropcanvas.php` | High
32 | File | `admin.joomlaradiov5.php` | High
33 | File | `admin.php` | Medium
34 | File | `admin.php?m=Food&a=addsave` | High
35 | File | `admin/conf_users_edit.php` | High
36 | File | `admin/index.php` | High
37 | File | `admin/user.php` | High
38 | File | `admin/write-post.php` | High
39 | File | `administrator/components/com_media/helpers/media.php` | High
40 | File | `admin_events.php` | High
41 | File | `ajax_new_account.php` | High
42 | File | `akocomments.php` | High
43 | File | `allopass-error.php` | High
44 | File | `announcement.php` | High
45 | File | `app.php` | Low
46 | File | `apply.cgi` | Medium
47 | File | `archiver\index.php` | High
48 | File | `artlinks.dispnew.php` | High
49 | File | `auth.inc.php` | Medium
50 | File | `authorization.do` | High
51 | File | `awstats.pl` | Medium
52 | File | `backoffice/login.asp` | High
53 | File | `bb_usage_stats.php` | High
54 | File | `binder.c` | Medium
55 | File | `books.php` | Medium
56 | File | `C:\Python27` | Medium
57 | File | `C:\Windows\System32\config\SAM` | High
58 | ... | ... | ...
There are 529 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 510 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://github.com/blackorbird/APT_REPORT/blob/master/Confucius/OperationTibbar-A-retaliatory-targeted-attack-from-SouthAsian-APT-Group-Confucius.pdf
* https://twitter.com/ShadowChasing1/status/1449172597816455170
* https://www.threatminer.org/report.php?q=Confucius%C2%A0Says%E2%80%A6Malware%C2%A0Families%C2%A0Get%C2%A0Further-PaloAltoNetworks.pdf&y=2016
## Literature

View File

@ -19,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [GB](https://vuldb.com/?country.gb)
* ...
There are 33 more country items available. Please use our online service to access the data.
There are 32 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -100,49 +100,50 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/+CSCOE+/logon.html` | High
2 | File | `/../../conf/template/uhttpd.json` | High
3 | File | `/bin/boa` | Medium
4 | File | `/context/%2e/WEB-INF/web.xml` | High
5 | File | `/etc/sudoers` | Medium
6 | File | `/export` | Low
7 | File | `/iissamples` | Medium
8 | File | `/login` | Low
9 | File | `/modules/profile/index.php` | High
10 | File | `/monitoring` | Medium
11 | File | `/new` | Low
12 | File | `/proc/<pid>/status` | High
13 | File | `/public/plugins/` | High
14 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
15 | File | `/secure/QueryComponent!Default.jspa` | High
16 | File | `/show_news.php` | High
17 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
18 | File | `/tmp` | Low
19 | File | `/uncpath/` | Medium
20 | File | `/usr/bin/pkexec` | High
21 | File | `/usr/sbin/suexec` | High
22 | File | `/WEB-INF/web.xml` | High
23 | File | `/wp-json/wc/v3/webhooks` | High
24 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
25 | File | `AccountManagerService.java` | High
26 | File | `actions/CompanyDetailsSave.php` | High
27 | File | `ActivityManagerService.java` | High
28 | File | `adclick.php` | Medium
29 | File | `admin.php` | Medium
30 | File | `admin.php?page=languages` | High
31 | File | `admin/add-glossary.php` | High
32 | File | `admin/admin.php` | High
33 | File | `admin/conf_users_edit.php` | High
34 | File | `admin/edit-comments.php` | High
35 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
36 | File | `admin\db\DoSql.php` | High
37 | File | `adverts/assets/plugins/ultimate/content/downloader.php` | High
38 | File | `advsearch.asp` | High
39 | File | `AjaxApplication.java` | High
40 | File | `AllowBindAppWidgetActivity.java` | High
41 | ... | ... | ...
1 | File | `%PROGRAMDATA%\Razer\Synapse3\Service\bin` | High
2 | File | `/+CSCOE+/logon.html` | High
3 | File | `/../../conf/template/uhttpd.json` | High
4 | File | `/admin/modules/system/custom_field.php` | High
5 | File | `/bin/boa` | Medium
6 | File | `/cgi-bin/wapopen` | High
7 | File | `/context/%2e/WEB-INF/web.xml` | High
8 | File | `/etc/sudoers` | Medium
9 | File | `/export` | Low
10 | File | `/iissamples` | Medium
11 | File | `/login` | Low
12 | File | `/modules/profile/index.php` | High
13 | File | `/monitoring` | Medium
14 | File | `/new` | Low
15 | File | `/proc/<pid>/status` | High
16 | File | `/public/plugins/` | High
17 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
18 | File | `/secure/QueryComponent!Default.jspa` | High
19 | File | `/show_news.php` | High
20 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
21 | File | `/tmp` | Low
22 | File | `/uncpath/` | Medium
23 | File | `/usr/bin/pkexec` | High
24 | File | `/usr/sbin/suexec` | High
25 | File | `/WEB-INF/web.xml` | High
26 | File | `/wp-admin/admin-ajax.php` | High
27 | File | `/wp-json/wc/v3/webhooks` | High
28 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
29 | File | `AccountManagerService.java` | High
30 | File | `actions/CompanyDetailsSave.php` | High
31 | File | `ActivityManagerService.java` | High
32 | File | `adclick.php` | Medium
33 | File | `admin.php` | Medium
34 | File | `admin.php?page=languages` | High
35 | File | `admin/add-glossary.php` | High
36 | File | `admin/admin.php` | High
37 | File | `admin/conf_users_edit.php` | High
38 | File | `admin/edit-comments.php` | High
39 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
40 | File | `admin\db\DoSql.php` | High
41 | File | `adverts/assets/plugins/ultimate/content/downloader.php` | High
42 | ... | ... | ...
There are 351 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 360 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,31 +1,31 @@
# Crouching Yeti - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crouching Yeti](https://vuldb.com/?actor.crouching_yeti). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crouching Yeti](https://vuldb.com/?actor.crouching_yeti). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.crouching_yeti](https://vuldb.com/?actor.crouching_yeti)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.crouching_yeti](https://vuldb.com/?actor.crouching_yeti)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crouching Yeti:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crouching Yeti:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Crouching Yeti.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Crouching Yeti.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 1.0.154.36 | node-55w.pool-1-0.dynamic.totinternet.net | High
2 | 3.3.6.1 | - | High
3 | 6.0.472.59 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [1.0.154.36](https://vuldb.com/?ip.1.0.154.36) | node-55w.pool-1-0.dynamic.totinternet.net | - | High
2 | [3.3.6.1](https://vuldb.com/?ip.3.3.6.1) | - | - | High
3 | [6.0.472.59](https://vuldb.com/?ip.6.0.472.59) | - | - | High
4 | ... | ... | ... | ...
There are 6 more IOC items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crouching Yeti. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crouching Yeti. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -34,13 +34,13 @@ ID | Type | Indicator | Confidence
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.threatminer.org/report.php?q=Kaspersky_Lab_crouching_yeti_appendixes_eng_final.pdf&y=2014
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -0,0 +1,68 @@
# DNSpionage - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DNSpionage](https://vuldb.com/?actor.dnspionage). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.dnspionage](https://vuldb.com/?actor.dnspionage)
## Campaigns
The following _campaigns_ are known and can be associated with DNSpionage:
* Middle East
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with DNSpionage:
* [US](https://vuldb.com/?country.us)
* [UA](https://vuldb.com/?country.ua)
* [FR](https://vuldb.com/?country.fr)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DNSpionage.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [185.20.184.138](https://vuldb.com/?ip.185.20.184.138) | 185.20.184.138.deltahost-ptr | Middle East | High
2 | [185.20.187.8](https://vuldb.com/?ip.185.20.187.8) | 185.20.187.8.deltahost-ptr | Middle East | High
3 | [185.161.211.72](https://vuldb.com/?ip.185.161.211.72) | 185.161.211.72.deltahost-ptr | Middle East | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _DNSpionage_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-284 | Execution with Unnecessary Privileges | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by DNSpionage. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `data/gbconfiguration.dat` | High
2 | File | `index.php` | Medium
3 | File | `wp-login.php` | Medium
4 | ... | ... | ...
There are 8 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://gblogs.cisco.com/jp/2018/12/talos-dnspionage-campaign-targets-middle-east/)
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,6 +1,6 @@
# DanaBot - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DanaBot](https://vuldb.com/?actor.danabot). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DanaBot](https://vuldb.com/?actor.danabot). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.danabot](https://vuldb.com/?actor.danabot)
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with DanaBot:
* US
* CN
* AT
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [AT](https://vuldb.com/?country.at)
* ...
There are 5 more country items available. Please use our online service to access the data.
There are 7 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -21,17 +21,20 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 5.8.55.205 | carpbaboon.com | - | High
2 | 31.214.157.12 | mail.private-mail.nl | - | High
3 | 47.74.130.165 | - | - | High
4 | 84.54.37.102 | - | - | High
5 | ... | ... | ... | ...
1 | [5.8.55.205](https://vuldb.com/?ip.5.8.55.205) | carpbaboon.com | - | High
2 | [23.254.226.52](https://vuldb.com/?ip.23.254.226.52) | client-23-254-226-52.hostwindsdns.com | - | High
3 | [31.214.157.12](https://vuldb.com/?ip.31.214.157.12) | mail.private-mail.nl | - | High
4 | [45.147.231.79](https://vuldb.com/?ip.45.147.231.79) | - | - | High
5 | [46.173.218.13](https://vuldb.com/?ip.46.173.218.13) | - | - | High
6 | [47.74.130.165](https://vuldb.com/?ip.47.74.130.165) | - | - | High
7 | [84.54.37.102](https://vuldb.com/?ip.84.54.37.102) | - | - | High
8 | ... | ... | ... | ...
There are 18 more IOC items available. Please use our online service to access the data.
There are 27 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by DanaBot. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _DanaBot_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -40,7 +43,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1211 | CWE-358 | 7PK Security Features | High
4 | ... | ... | ... | ...
There are 4 more TTP items available. Please use our online service to access the data.
There are 3 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -53,22 +56,27 @@ ID | Type | Indicator | Confidence
3 | File | `/addnews.html` | High
4 | File | `/cm/delete` | Medium
5 | File | `/download` | Medium
6 | File | `/redpass.cgi` | Medium
7 | File | `/uncpath/` | Medium
8 | File | `add-category.php` | High
9 | File | `add_comment.php` | High
10 | File | `admin.php` | Medium
11 | File | `admin/admin.shtml` | High
12 | File | `admin/user.php?form=update_f&user_name` | High
13 | ... | ... | ...
6 | File | `/GetSimpleCMS-3.3.15/admin/log.php` | High
7 | File | `/lms/admin.php` | High
8 | File | `/redpass.cgi` | Medium
9 | File | `/uncpath/` | Medium
10 | File | `add-category.php` | High
11 | File | `add_comment.php` | High
12 | File | `admin.php` | Medium
13 | File | `admin/admin.shtml` | High
14 | File | `admin/content.php` | High
15 | File | `admin/user.php?form=update_f&user_name` | High
16 | ... | ... | ...
There are 102 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 130 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blogs.blackberry.com/en/2021/11/threat-thursday-danabot-malware-as-a-service
* https://github.com/eset/malware-ioc/tree/master/danabot
* https://isc.sans.edu/forums/diary/Example+of+Danabot+distributed+through+malspam/27744/
* https://research.checkpoint.com/2019/danabot-demands-a-ransom-payment/
## Literature

View File

@ -0,0 +1,30 @@
# DarkHotel - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkHotel](https://vuldb.com/?actor.darkhotel). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.darkhotel](https://vuldb.com/?actor.darkhotel)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DarkHotel.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [23.111.184.119](https://vuldb.com/?ip.23.111.184.119) | zeus.hosterbox.com | - | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.zscaler.com/blogs/security-research/new-darkhotel-apt-attack-chain-identified
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,47 +1,46 @@
# DarkHydrus - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkHydrus](https://vuldb.com/?actor.darkhydrus). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkHydrus](https://vuldb.com/?actor.darkhydrus). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.darkhydrus](https://vuldb.com/?actor.darkhydrus)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.darkhydrus](https://vuldb.com/?actor.darkhydrus)
## Campaigns
The following campaigns are known and can be associated with DarkHydrus:
The following _campaigns_ are known and can be associated with DarkHydrus:
* DarkHydrus
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with DarkHydrus:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with DarkHydrus:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of DarkHydrus.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DarkHydrus.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 94.130.88.9 | cm16.debounce.io | High
2 | 107.175.75.123 | 107-175-75-123-host.colocrossing.com | High
3 | 107.175.150.113 | 107-175-150-113-host.colocrossing.com | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [94.130.88.9](https://vuldb.com/?ip.94.130.88.9) | cm16.debounce.io | - | High
2 | [107.175.75.123](https://vuldb.com/?ip.107.175.75.123) | 107-175-75-123-host.colocrossing.com | - | High
3 | [107.175.150.113](https://vuldb.com/?ip.107.175.150.113) | 107-175-150-113-host.colocrossing.com | - | High
4 | ... | ... | ... | ...
There are 2 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by DarkHydrus. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _DarkHydrus_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1499 | Resource Consumption | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by DarkHydrus. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by DarkHydrus. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -53,11 +52,11 @@ ID | Type | Indicator | Confidence
6 | File | `add_comment.php` | High
7 | ... | ... | ...
There are 46 more IOA items available. Please use our online service to access the data.
There are 46 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications/
* https://unit42.paloaltonetworks.com/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/
@ -66,7 +65,7 @@ The following list contains external sources which discuss the actor and the ass
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,29 +1,29 @@
# DarkSide - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkSide](https://vuldb.com/?actor.darkside). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkSide](https://vuldb.com/?actor.darkside). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.darkside](https://vuldb.com/?actor.darkside)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.darkside](https://vuldb.com/?actor.darkside)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of DarkSide.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DarkSide.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 99.83.154.118 | a51062ecadbb5a26e.awsglobalaccelerator.com | High
2 | 176.103.62.217 | - | High
3 | 185.243.214.107 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [99.83.154.118](https://vuldb.com/?ip.99.83.154.118) | a51062ecadbb5a26e.awsglobalaccelerator.com | - | High
2 | [176.103.62.217](https://vuldb.com/?ip.176.103.62.217) | - | - | High
3 | [185.243.214.107](https://vuldb.com/?ip.185.243.214.107) | - | - | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://us-cert.cisa.gov/ncas/analysis-reports/ar21-189a
* https://us-cert.cisa.gov/sites/default/files/publications/AA21-131A.stix.xml
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -20,7 +20,7 @@ ID | IP address | Hostname | Campaign | Confidence
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _DazzleSpy_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _DazzleSpy_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -1,37 +1,39 @@
# DeputyDog - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DeputyDog](https://vuldb.com/?actor.deputydog). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DeputyDog](https://vuldb.com/?actor.deputydog). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.deputydog](https://vuldb.com/?actor.deputydog)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.deputydog](https://vuldb.com/?actor.deputydog)
## Campaigns
The following campaigns are known and can be associated with DeputyDog:
The following _campaigns_ are known and can be associated with DeputyDog:
* SnowMan
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of DeputyDog.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DeputyDog.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 58.64.199.22 | - | High
2 | 58.64.199.25 | - | High
3 | 58.64.199.27 | - | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [58.64.199.22](https://vuldb.com/?ip.58.64.199.22) | - | SnowMan | High
2 | [58.64.199.25](https://vuldb.com/?ip.58.64.199.25) | - | SnowMan | High
3 | [58.64.199.27](https://vuldb.com/?ip.58.64.199.27) | - | SnowMan | High
4 | ... | ... | ... | ...
There are 3 more IOC items available. Please use our online service to access the data.
There are 7 more IOC items available. Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://ioc.hatenablog.com/entry/2013/09/21/000000
* https://ioc.hatenablog.com/entry/2013/09/30/000000
* https://www.threatminer.org/report.php?q=Op_SnowMan_DeputyDog.pdf&y=2014
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# Domestic Kitten - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Domestic Kitten](https://vuldb.com/?actor.domestic_kitten). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Domestic Kitten](https://vuldb.com/?actor.domestic_kitten). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.domestic_kitten](https://vuldb.com/?actor.domestic_kitten)
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Domestic Kitten:
* NL
* US
* ME
* [NL](https://vuldb.com/?country.nl)
* [US](https://vuldb.com/?country.us)
* [IR](https://vuldb.com/?country.ir)
* ...
There are 1 more country items available. Please use our online service to access the data.
There are 5 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -21,25 +21,25 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 89.38.98.49 | 89-38-98-49.hosted-by-worldstream.net | - | High
2 | 162.248.247.172 | - | - | High
3 | 190.2.144.140 | 190-2-144-140.hosted-by-worldstream.net | - | High
1 | [46.4.143.130](https://vuldb.com/?ip.46.4.143.130) | dns.belogy.de | - | High
2 | [62.112.8.37](https://vuldb.com/?ip.62.112.8.37) | customer.worldstream.nl | - | High
3 | [62.112.8.174](https://vuldb.com/?ip.62.112.8.174) | customer.worldstream.nl | - | High
4 | ... | ... | ... | ...
There are 1 more IOC items available. Please use our online service to access the data.
There are 14 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Domestic Kitten. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Domestic Kitten_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 2 more TTP items available. Please use our online service to access the data.
There are 7 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -47,21 +47,50 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/hub/api/user` | High
2 | File | `/uncpath/` | Medium
3 | File | `/wp-content/plugins/forum-server/feed.php` | High
4 | File | `app/controllers/application_controller.rb` | High
5 | File | `BKFSim_vhfd.exe` | High
6 | File | `Cgi/private.py` | High
7 | File | `cmd.php` | Low
8 | ... | ... | ...
1 | File | `.travis.yml` | Medium
2 | File | `/.env` | Low
3 | File | `/admin.php` | Medium
4 | File | `/admin/config.php?display=disa&view=form` | High
5 | File | `/appliance/users?action=edit` | High
6 | File | `/category_view.php` | High
7 | File | `/connectors/index.php` | High
8 | File | `/core/model/modx/modmanagerrequest.class.php` | High
9 | File | `/dev/kmem` | Medium
10 | File | `/file?action=download&file` | High
11 | File | `/forum/away.php` | High
12 | File | `/hub/api/user` | High
13 | File | `/medical/inventories.php` | High
14 | File | `/monitoring` | Medium
15 | File | `/NAGErrors` | Medium
16 | File | `/plugins/servlet/audit/resource` | High
17 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
18 | File | `/proc/ioports` | High
19 | File | `/replication` | Medium
20 | File | `/RestAPI` | Medium
21 | File | `/rom-0` | Low
22 | File | `/tmp` | Low
23 | File | `/tmp/speedtest_urls.xml` | High
24 | File | `/uncpath/` | Medium
25 | File | `/var/log/nginx` | High
26 | File | `/WEB-INF/web.xml` | High
27 | File | `/wp-admin/admin.php` | High
28 | File | `account.asp` | Medium
29 | File | `addentry.php` | Medium
30 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
31 | File | `admin/index.php` | High
32 | File | `admin/login.php` | High
33 | File | `admins.js` | Medium
34 | File | `admin\model\catalog\download.php` | High
35 | File | `apcupsd.pid` | Medium
36 | ... | ... | ...
There are 59 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 311 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blogs.blackberry.com/en/2019/10/mobile-malware-and-apt-espionage-prolific-pervasive-and-cross-platform
* https://research.checkpoint.com/2018/domestic-kitten-an-iranian-surveillance-operation/
## Literature

View File

@ -37,7 +37,8 @@ ID | IP address | Hostname | Campaign | Confidence
7 | [37.139.28.208](https://vuldb.com/?ip.37.139.28.208) | - | - | High
8 | [45.33.29.133](https://vuldb.com/?ip.45.33.29.133) | li1046-133.members.linode.com | - | High
9 | [46.101.204.168](https://vuldb.com/?ip.46.101.204.168) | - | - | High
10 | ... | ... | ... | ...
10 | [46.105.40.12](https://vuldb.com/?ip.46.105.40.12) | ip12.ip-46-105-40.eu | - | High
11 | ... | ... | ... | ...
There are 38 more IOC items available. Please use our online service to access the data.
@ -96,13 +97,14 @@ ID | Type | Indicator | Confidence
34 | File | `announcements.php` | High
35 | ... | ... | ...
There are 295 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 298 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://github.com/faisalusuf/ThreatIntelligence/blob/main/APT%20DONOT%20TEAM/Tracking-DONOT-IOCs.csv
* https://twitter.com/ShadowChasing1/status/1497125743125413892
* https://www.welivesecurity.com/2022/01/18/donot-go-do-not-respawn/
## Literature

View File

@ -58,7 +58,7 @@ ID | Type | Indicator | Confidence
7 | File | `bbcode.php` | Medium
8 | ... | ... | ...
There are 56 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 57 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,6 +1,6 @@
# Dyre - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Dyre](https://vuldb.com/?actor.dyre). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Dyre](https://vuldb.com/?actor.dyre). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.dyre](https://vuldb.com/?actor.dyre)
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Dyre:
* RU
* US
* DE
* [RU](https://vuldb.com/?country.ru)
* [US](https://vuldb.com/?country.us)
* [DE](https://vuldb.com/?country.de)
* ...
There are 5 more country items available. Please use our online service to access the data.
@ -21,19 +21,19 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 37.59.2.42 | ns399064.ip-37-59-2.eu | - | High
2 | 64.70.19.202 | mailrelay.202.website.ws | - | High
3 | 69.195.129.75 | - | - | High
4 | 80.248.224.75 | - | - | High
5 | 85.25.134.53 | delta526.dedicatedpanel.com | - | High
6 | 85.25.138.12 | echo389.startdedicated.de | - | High
1 | [37.59.2.42](https://vuldb.com/?ip.37.59.2.42) | ns399064.ip-37-59-2.eu | - | High
2 | [64.70.19.202](https://vuldb.com/?ip.64.70.19.202) | mailrelay.202.website.ws | - | High
3 | [69.195.129.75](https://vuldb.com/?ip.69.195.129.75) | - | - | High
4 | [80.248.224.75](https://vuldb.com/?ip.80.248.224.75) | - | - | High
5 | [85.25.134.53](https://vuldb.com/?ip.85.25.134.53) | delta526.dedicatedpanel.com | - | High
6 | [85.25.138.12](https://vuldb.com/?ip.85.25.138.12) | echo389.startdedicated.de | - | High
7 | ... | ... | ... | ...
There are 24 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Dyre. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Dyre_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -42,7 +42,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1211 | CWE-254 | 7PK Security Features | High
4 | ... | ... | ... | ...
There are 3 more TTP items available. Please use our online service to access the data.
There are 2 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack

View File

@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [VN](https://vuldb.com/?country.vn)
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [ES](https://vuldb.com/?country.es)
* ...
There are 1 more country items available. Please use our online service to access the data.
There are 2 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -23,165 +23,191 @@ ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [1.186.249.82](https://vuldb.com/?ip.1.186.249.82) | 1.186.249.82.dvois.com | - | High
2 | [1.226.84.243](https://vuldb.com/?ip.1.226.84.243) | - | - | High
3 | [2.58.16.86](https://vuldb.com/?ip.2.58.16.86) | - | - | High
4 | [2.58.16.89](https://vuldb.com/?ip.2.58.16.89) | - | - | High
5 | [2.82.75.215](https://vuldb.com/?ip.2.82.75.215) | bl21-75-215.dsl.telepac.pt | - | High
6 | [5.2.84.232](https://vuldb.com/?ip.5.2.84.232) | momos.alastyr.com | - | High
7 | [5.2.136.90](https://vuldb.com/?ip.5.2.136.90) | static-5-2-136-90.rdsnet.ro | - | High
8 | [5.2.182.7](https://vuldb.com/?ip.5.2.182.7) | static-5-2-182-7.rdsnet.ro | - | High
9 | [5.2.212.254](https://vuldb.com/?ip.5.2.212.254) | static-5-2-212-254.rdsnet.ro | - | High
10 | [5.9.189.24](https://vuldb.com/?ip.5.9.189.24) | static.24.189.9.5.clients.your-server.de | - | High
11 | [5.12.246.155](https://vuldb.com/?ip.5.12.246.155) | 5-12-246-155.residential.rdsnet.ro | - | High
12 | [5.35.249.46](https://vuldb.com/?ip.5.35.249.46) | rs250366.rs.hosteurope.de | - | High
13 | [5.39.91.110](https://vuldb.com/?ip.5.39.91.110) | ns3278366.ip-5-39-91.eu | - | High
14 | [5.79.70.250](https://vuldb.com/?ip.5.79.70.250) | - | - | High
15 | [5.89.33.136](https://vuldb.com/?ip.5.89.33.136) | net-5-89-33-136.cust.vodafonedsl.it | - | High
16 | [5.159.57.195](https://vuldb.com/?ip.5.159.57.195) | www-riedle.transfermarkt.de | - | High
17 | [5.196.35.138](https://vuldb.com/?ip.5.196.35.138) | vps10.open-techno.net | - | High
18 | [5.230.193.41](https://vuldb.com/?ip.5.230.193.41) | casagarcia-web.sys.netzfabrik.eu | - | High
19 | [8.4.9.137](https://vuldb.com/?ip.8.4.9.137) | onlinehorizons.net | - | High
20 | [8.247.6.134](https://vuldb.com/?ip.8.247.6.134) | - | - | High
21 | [12.32.68.154](https://vuldb.com/?ip.12.32.68.154) | mail.sealscoinc.com | - | High
22 | [12.149.72.170](https://vuldb.com/?ip.12.149.72.170) | - | - | High
23 | [12.162.84.2](https://vuldb.com/?ip.12.162.84.2) | - | - | High
24 | [12.163.208.58](https://vuldb.com/?ip.12.163.208.58) | - | - | High
25 | [12.182.146.226](https://vuldb.com/?ip.12.182.146.226) | - | - | High
26 | [12.184.217.101](https://vuldb.com/?ip.12.184.217.101) | - | - | High
27 | [23.6.65.194](https://vuldb.com/?ip.23.6.65.194) | a23-6-65-194.deploy.static.akamaitechnologies.com | - | High
28 | [23.36.85.183](https://vuldb.com/?ip.23.36.85.183) | a23-36-85-183.deploy.static.akamaitechnologies.com | - | High
29 | [23.199.63.11](https://vuldb.com/?ip.23.199.63.11) | a23-199-63-11.deploy.static.akamaitechnologies.com | - | High
30 | [23.199.71.185](https://vuldb.com/?ip.23.199.71.185) | a23-199-71-185.deploy.static.akamaitechnologies.com | - | High
31 | [23.239.2.11](https://vuldb.com/?ip.23.239.2.11) | li683-11.members.linode.com | - | High
32 | [24.43.99.75](https://vuldb.com/?ip.24.43.99.75) | rrcs-24-43-99-75.west.biz.rr.com | - | High
33 | [24.101.229.82](https://vuldb.com/?ip.24.101.229.82) | dynamic-acs-24-101-229-82.zoominternet.net | - | High
34 | [24.119.116.230](https://vuldb.com/?ip.24.119.116.230) | 24-119-116-230.cpe.sparklight.net | - | High
35 | [24.121.176.48](https://vuldb.com/?ip.24.121.176.48) | 24-121-176-48.prkrcmtc01.com.sta.suddenlink.net | - | High
36 | [24.137.76.62](https://vuldb.com/?ip.24.137.76.62) | host-24-137-76-62.public.eastlink.ca | - | High
37 | [24.178.90.49](https://vuldb.com/?ip.24.178.90.49) | 024-178-090-049.res.spectrum.com | - | High
38 | [24.179.13.119](https://vuldb.com/?ip.24.179.13.119) | 024-179-013-119.res.spectrum.com | - | High
39 | [24.217.117.217](https://vuldb.com/?ip.24.217.117.217) | 024-217-117-217.res.spectrum.com | - | High
40 | [24.232.228.233](https://vuldb.com/?ip.24.232.228.233) | OL233-228.fibertel.com.ar | - | High
41 | [24.244.177.40](https://vuldb.com/?ip.24.244.177.40) | - | - | High
42 | [27.78.27.110](https://vuldb.com/?ip.27.78.27.110) | localhost | - | High
43 | [27.82.13.10](https://vuldb.com/?ip.27.82.13.10) | KD027082013010.ppp-bb.dion.ne.jp | - | High
44 | [27.109.24.214](https://vuldb.com/?ip.27.109.24.214) | - | - | High
45 | [27.114.9.93](https://vuldb.com/?ip.27.114.9.93) | i27-114-9-93.s41.a011.ap.plala.or.jp | - | High
46 | [35.190.87.116](https://vuldb.com/?ip.35.190.87.116) | 116.87.190.35.bc.googleusercontent.com | - | Medium
47 | [36.91.44.183](https://vuldb.com/?ip.36.91.44.183) | - | - | High
48 | [37.46.129.215](https://vuldb.com/?ip.37.46.129.215) | we-too.ru | - | High
49 | [37.97.135.82](https://vuldb.com/?ip.37.97.135.82) | 37-97-135-82.colo.transip.net | - | High
50 | [37.139.21.175](https://vuldb.com/?ip.37.139.21.175) | 37.139.21.175-e2-8080-keep-up | - | High
51 | [37.179.204.33](https://vuldb.com/?ip.37.179.204.33) | - | - | High
52 | [37.187.4.178](https://vuldb.com/?ip.37.187.4.178) | ks2.kku.io | - | High
53 | [37.187.57.57](https://vuldb.com/?ip.37.187.57.57) | ns3357940.ovh.net | - | High
54 | [37.187.72.193](https://vuldb.com/?ip.37.187.72.193) | ns3362285.ip-37-187-72.eu | - | High
55 | [37.187.161.206](https://vuldb.com/?ip.37.187.161.206) | toolbox.alabs.io | - | High
56 | [37.205.9.252](https://vuldb.com/?ip.37.205.9.252) | s1.ithelp24.eu | - | High
57 | [37.221.70.250](https://vuldb.com/?ip.37.221.70.250) | b2b-customer.inftele.net | - | High
58 | [41.76.108.46](https://vuldb.com/?ip.41.76.108.46) | - | - | High
59 | [41.169.36.237](https://vuldb.com/?ip.41.169.36.237) | - | - | High
60 | [41.185.28.84](https://vuldb.com/?ip.41.185.28.84) | brf01-nix01.wadns.net | - | High
61 | [41.185.29.128](https://vuldb.com/?ip.41.185.29.128) | abp79-nix01.wadns.net | - | High
62 | [41.231.225.139](https://vuldb.com/?ip.41.231.225.139) | - | - | High
63 | [42.62.40.103](https://vuldb.com/?ip.42.62.40.103) | - | - | High
64 | [45.16.226.117](https://vuldb.com/?ip.45.16.226.117) | 45-16-226-117.lightspeed.sndgca.sbcglobal.net | - | High
65 | [45.33.77.42](https://vuldb.com/?ip.45.33.77.42) | li1023-42.members.linode.com | - | High
66 | [45.46.37.97](https://vuldb.com/?ip.45.46.37.97) | cpe-45-46-37-97.maine.res.rr.com | - | High
67 | [45.55.36.51](https://vuldb.com/?ip.45.55.36.51) | - | - | High
68 | [45.55.219.163](https://vuldb.com/?ip.45.55.219.163) | - | - | High
69 | [45.79.95.107](https://vuldb.com/?ip.45.79.95.107) | li1194-107.members.linode.com | - | High
70 | [45.80.148.200](https://vuldb.com/?ip.45.80.148.200) | - | - | High
71 | [45.118.115.99](https://vuldb.com/?ip.45.118.115.99) | - | - | High
72 | [45.118.135.203](https://vuldb.com/?ip.45.118.135.203) | 45-118-135-203.ip.linodeusercontent.com | - | High
73 | [45.142.114.231](https://vuldb.com/?ip.45.142.114.231) | mail.dounutmail.de | - | High
74 | [45.230.45.171](https://vuldb.com/?ip.45.230.45.171) | - | - | High
75 | [46.4.100.178](https://vuldb.com/?ip.46.4.100.178) | support.wizard-shopservice.de | - | High
76 | [46.4.192.185](https://vuldb.com/?ip.46.4.192.185) | static.185.192.4.46.clients.your-server.de | - | High
77 | [46.28.111.142](https://vuldb.com/?ip.46.28.111.142) | enkindu.jsuchy.net | - | High
78 | [46.32.229.152](https://vuldb.com/?ip.46.32.229.152) | 094882.vps-10.com | - | High
79 | [46.32.233.226](https://vuldb.com/?ip.46.32.233.226) | yetitoolusa.com | - | High
80 | [46.38.238.8](https://vuldb.com/?ip.46.38.238.8) | v2202109122001163131.happysrv.de | - | High
81 | [46.43.2.95](https://vuldb.com/?ip.46.43.2.95) | chris.default.cjenkinson.uk0.bigv.io | - | High
82 | [46.55.222.11](https://vuldb.com/?ip.46.55.222.11) | - | - | High
83 | [46.101.58.37](https://vuldb.com/?ip.46.101.58.37) | 46.101.58.37-e1-8080 | - | High
84 | [46.105.81.76](https://vuldb.com/?ip.46.105.81.76) | myu0.cylipo.sbs | - | High
85 | [46.105.114.137](https://vuldb.com/?ip.46.105.114.137) | ns3188253.ip-46-105-114.eu | - | High
86 | [46.105.131.68](https://vuldb.com/?ip.46.105.131.68) | http.adven.fr | - | High
87 | [46.105.131.79](https://vuldb.com/?ip.46.105.131.79) | relay.adven.fr | - | High
88 | [46.105.131.87](https://vuldb.com/?ip.46.105.131.87) | pop.adven.fr | - | High
89 | [46.105.236.18](https://vuldb.com/?ip.46.105.236.18) | - | - | High
90 | [46.165.254.206](https://vuldb.com/?ip.46.165.254.206) | - | - | High
91 | [46.214.107.142](https://vuldb.com/?ip.46.214.107.142) | 46-214-107-142.next-gen.ro | - | High
92 | [47.36.140.164](https://vuldb.com/?ip.47.36.140.164) | 047-036-140-164.res.spectrum.com | - | High
93 | [47.146.39.147](https://vuldb.com/?ip.47.146.39.147) | - | - | High
94 | [47.188.131.94](https://vuldb.com/?ip.47.188.131.94) | - | - | High
95 | [47.246.24.225](https://vuldb.com/?ip.47.246.24.225) | - | - | High
96 | [47.246.24.226](https://vuldb.com/?ip.47.246.24.226) | - | - | High
97 | [47.246.24.230](https://vuldb.com/?ip.47.246.24.230) | - | - | High
98 | [47.246.24.232](https://vuldb.com/?ip.47.246.24.232) | - | - | High
99 | [49.12.121.47](https://vuldb.com/?ip.49.12.121.47) | filezilla-project.org | - | High
100 | [49.50.209.131](https://vuldb.com/?ip.49.50.209.131) | 131.host-49-50-209.euba.megatel.co.nz | - | High
101 | [49.212.135.76](https://vuldb.com/?ip.49.212.135.76) | os3-321-50322.vs.sakura.ne.jp | - | High
102 | [49.212.155.94](https://vuldb.com/?ip.49.212.155.94) | os3-325-52340.vs.sakura.ne.jp | - | High
103 | [50.28.51.143](https://vuldb.com/?ip.50.28.51.143) | - | - | High
104 | [50.31.146.101](https://vuldb.com/?ip.50.31.146.101) | mail.brillinjurylaw.com | - | High
105 | [50.56.135.44](https://vuldb.com/?ip.50.56.135.44) | - | - | High
106 | [50.91.114.38](https://vuldb.com/?ip.50.91.114.38) | 050-091-114-038.res.spectrum.com | - | High
107 | [50.116.78.109](https://vuldb.com/?ip.50.116.78.109) | intersearchmedia.com | - | High
108 | [50.245.107.73](https://vuldb.com/?ip.50.245.107.73) | 50-245-107-73-static.hfc.comcastbusiness.net | - | High
109 | [51.15.4.22](https://vuldb.com/?ip.51.15.4.22) | 51-15-4-22.rev.poneytelecom.eu | - | High
110 | [51.15.7.145](https://vuldb.com/?ip.51.15.7.145) | 51-15-7-145.rev.poneytelecom.eu | - | High
111 | [51.75.33.127](https://vuldb.com/?ip.51.75.33.127) | ip127.ip-51-75-33.eu | - | High
112 | [51.89.36.180](https://vuldb.com/?ip.51.89.36.180) | ip180.ip-51-89-36.eu | - | High
113 | [51.89.199.141](https://vuldb.com/?ip.51.89.199.141) | ip141.ip-51-89-199.eu | - | High
114 | [51.255.165.160](https://vuldb.com/?ip.51.255.165.160) | 160.ip-51-255-165.eu | - | High
115 | [54.38.143.245](https://vuldb.com/?ip.54.38.143.245) | tools.inovato.me | - | High
116 | [58.27.215.3](https://vuldb.com/?ip.58.27.215.3) | 58-27-215-3.wateen.net | - | High
117 | [58.94.58.13](https://vuldb.com/?ip.58.94.58.13) | i58-94-58-13.s41.a014.ap.plala.or.jp | - | High
118 | [58.216.16.130](https://vuldb.com/?ip.58.216.16.130) | - | - | High
119 | [58.227.42.236](https://vuldb.com/?ip.58.227.42.236) | - | - | High
120 | [59.148.253.194](https://vuldb.com/?ip.59.148.253.194) | 059148253194.ctinets.com | - | High
121 | [60.93.23.51](https://vuldb.com/?ip.60.93.23.51) | softbank060093023051.bbtec.net | - | High
122 | [60.108.128.186](https://vuldb.com/?ip.60.108.128.186) | softbank060108128186.bbtec.net | - | High
123 | [60.125.114.64](https://vuldb.com/?ip.60.125.114.64) | softbank060125114064.bbtec.net | - | High
124 | [60.249.78.226](https://vuldb.com/?ip.60.249.78.226) | 60-249-78-226.hinet-ip.hinet.net | - | High
125 | [61.19.246.238](https://vuldb.com/?ip.61.19.246.238) | - | - | High
126 | [62.30.7.67](https://vuldb.com/?ip.62.30.7.67) | 67.7-30-62.static.virginmediabusiness.co.uk | - | High
127 | [62.75.141.82](https://vuldb.com/?ip.62.75.141.82) | static-ip-62-75-141-82.inaddr.ip-pool.com | - | High
128 | [62.84.75.50](https://vuldb.com/?ip.62.84.75.50) | mail.saadegrp.com.lb | - | High
129 | [62.171.142.179](https://vuldb.com/?ip.62.171.142.179) | vmi499457.contaboserver.net | - | High
130 | [62.212.34.102](https://vuldb.com/?ip.62.212.34.102) | - | - | High
131 | [64.190.63.136](https://vuldb.com/?ip.64.190.63.136) | - | - | High
132 | [64.207.182.168](https://vuldb.com/?ip.64.207.182.168) | - | - | High
133 | [66.54.51.172](https://vuldb.com/?ip.66.54.51.172) | - | - | High
134 | [66.76.26.33](https://vuldb.com/?ip.66.76.26.33) | 66-76-26-33.hdsncmta01.com.sta.suddenlink.net | - | High
135 | [66.228.61.248](https://vuldb.com/?ip.66.228.61.248) | li318-248.members.linode.com | - | High
136 | [67.19.105.107](https://vuldb.com/?ip.67.19.105.107) | ns2.datatrust.com.br | - | High
137 | [67.170.250.203](https://vuldb.com/?ip.67.170.250.203) | c-67-170-250-203.hsd1.ca.comcast.net | - | High
138 | [67.225.218.50](https://vuldb.com/?ip.67.225.218.50) | lb01.parklogic.com | - | High
139 | [68.2.97.91](https://vuldb.com/?ip.68.2.97.91) | ip68-2-97-91.ph.ph.cox.net | - | High
140 | [68.183.170.114](https://vuldb.com/?ip.68.183.170.114) | 68.183.170.114-e1-8080-keep-up | - | High
141 | [68.183.190.199](https://vuldb.com/?ip.68.183.190.199) | 68.183.190.199-e1-8080-keep-up | - | High
142 | [69.17.170.58](https://vuldb.com/?ip.69.17.170.58) | unallocated-static.rogers.com | - | High
143 | [69.43.168.200](https://vuldb.com/?ip.69.43.168.200) | ns0.imunplugged.com | - | High
144 | [69.45.19.251](https://vuldb.com/?ip.69.45.19.251) | coastinet.com | - | High
145 | [69.167.152.111](https://vuldb.com/?ip.69.167.152.111) | - | - | High
146 | [69.198.17.49](https://vuldb.com/?ip.69.198.17.49) | 69-198-17-49.customerip.birch.net | - | High
147 | [70.32.84.74](https://vuldb.com/?ip.70.32.84.74) | - | - | High
148 | [70.32.89.105](https://vuldb.com/?ip.70.32.89.105) | parties-at-sea.com | - | High
149 | [70.32.92.133](https://vuldb.com/?ip.70.32.92.133) | popdesigngroup.com | - | High
150 | [70.32.115.157](https://vuldb.com/?ip.70.32.115.157) | harpotripofalifetime.com | - | High
151 | [70.168.7.6](https://vuldb.com/?ip.70.168.7.6) | wsip-70-168-7-6.ri.ri.cox.net | - | High
152 | [70.182.77.184](https://vuldb.com/?ip.70.182.77.184) | wsip-70-182-77-184.ok.ok.cox.net | - | High
153 | [70.184.125.132](https://vuldb.com/?ip.70.184.125.132) | wsip-70-184-125-132.ph.ph.cox.net | - | High
154 | [71.15.245.148](https://vuldb.com/?ip.71.15.245.148) | 071-015-245-148.res.spectrum.com | - | High
155 | [71.197.211.156](https://vuldb.com/?ip.71.197.211.156) | c-71-197-211-156.hsd1.wa.comcast.net | - | High
156 | [71.244.60.231](https://vuldb.com/?ip.71.244.60.231) | static-71-244-60-231.dllstx.fios.frontiernet.net | - | High
157 | [72.10.49.117](https://vuldb.com/?ip.72.10.49.117) | rtw7-rfpn.accessdomain.com | - | High
158 | [72.18.204.17](https://vuldb.com/?ip.72.18.204.17) | lasvegas-nv-datacenter.com | - | High
159 | ... | ... | ... | ...
3 | [1.234.2.232](https://vuldb.com/?ip.1.234.2.232) | - | - | High
4 | [1.234.21.73](https://vuldb.com/?ip.1.234.21.73) | - | - | High
5 | [2.47.112.152](https://vuldb.com/?ip.2.47.112.152) | net-2-47-112-152.cust.vodafonedsl.it | - | High
6 | [2.58.16.86](https://vuldb.com/?ip.2.58.16.86) | - | - | High
7 | [2.58.16.89](https://vuldb.com/?ip.2.58.16.89) | - | - | High
8 | [2.82.75.215](https://vuldb.com/?ip.2.82.75.215) | bl21-75-215.dsl.telepac.pt | - | High
9 | [5.2.84.232](https://vuldb.com/?ip.5.2.84.232) | momos.alastyr.com | - | High
10 | [5.2.136.90](https://vuldb.com/?ip.5.2.136.90) | static-5-2-136-90.rdsnet.ro | - | High
11 | [5.2.182.7](https://vuldb.com/?ip.5.2.182.7) | static-5-2-182-7.rdsnet.ro | - | High
12 | [5.2.212.254](https://vuldb.com/?ip.5.2.212.254) | static-5-2-212-254.rdsnet.ro | - | High
13 | [5.9.116.246](https://vuldb.com/?ip.5.9.116.246) | static.246.116.9.5.clients.your-server.de | - | High
14 | [5.9.128.163](https://vuldb.com/?ip.5.9.128.163) | static.163.128.9.5.clients.your-server.de | - | High
15 | [5.9.189.24](https://vuldb.com/?ip.5.9.189.24) | static.24.189.9.5.clients.your-server.de | - | High
16 | [5.12.246.155](https://vuldb.com/?ip.5.12.246.155) | 5-12-246-155.residential.rdsnet.ro | - | High
17 | [5.35.249.46](https://vuldb.com/?ip.5.35.249.46) | rs250366.rs.hosteurope.de | - | High
18 | [5.39.84.48](https://vuldb.com/?ip.5.39.84.48) | ns3126815.ip-5-39-84.eu | - | High
19 | [5.39.91.110](https://vuldb.com/?ip.5.39.91.110) | ns3278366.ip-5-39-91.eu | - | High
20 | [5.79.70.250](https://vuldb.com/?ip.5.79.70.250) | - | - | High
21 | [5.89.33.136](https://vuldb.com/?ip.5.89.33.136) | net-5-89-33-136.cust.vodafonedsl.it | - | High
22 | [5.159.57.195](https://vuldb.com/?ip.5.159.57.195) | www-riedle.transfermarkt.de | - | High
23 | [5.196.35.138](https://vuldb.com/?ip.5.196.35.138) | vps10.open-techno.net | - | High
24 | [5.196.73.150](https://vuldb.com/?ip.5.196.73.150) | ns3000085.ip-5-196-73.eu | - | High
25 | [5.230.193.41](https://vuldb.com/?ip.5.230.193.41) | casagarcia-web.sys.netzfabrik.eu | - | High
26 | [8.4.9.137](https://vuldb.com/?ip.8.4.9.137) | onlinehorizons.net | - | High
27 | [8.247.6.134](https://vuldb.com/?ip.8.247.6.134) | - | - | High
28 | [12.6.183.21](https://vuldb.com/?ip.12.6.183.21) | - | - | High
29 | [12.32.68.154](https://vuldb.com/?ip.12.32.68.154) | mail.sealscoinc.com | - | High
30 | [12.149.72.170](https://vuldb.com/?ip.12.149.72.170) | - | - | High
31 | [12.162.84.2](https://vuldb.com/?ip.12.162.84.2) | - | - | High
32 | [12.163.208.58](https://vuldb.com/?ip.12.163.208.58) | - | - | High
33 | [12.182.146.226](https://vuldb.com/?ip.12.182.146.226) | - | - | High
34 | [12.184.217.101](https://vuldb.com/?ip.12.184.217.101) | - | - | High
35 | [23.6.65.194](https://vuldb.com/?ip.23.6.65.194) | a23-6-65-194.deploy.static.akamaitechnologies.com | - | High
36 | [23.36.85.183](https://vuldb.com/?ip.23.36.85.183) | a23-36-85-183.deploy.static.akamaitechnologies.com | - | High
37 | [23.199.63.11](https://vuldb.com/?ip.23.199.63.11) | a23-199-63-11.deploy.static.akamaitechnologies.com | - | High
38 | [23.199.71.185](https://vuldb.com/?ip.23.199.71.185) | a23-199-71-185.deploy.static.akamaitechnologies.com | - | High
39 | [23.239.2.11](https://vuldb.com/?ip.23.239.2.11) | li683-11.members.linode.com | - | High
40 | [23.254.203.51](https://vuldb.com/?ip.23.254.203.51) | hwsrv-779084.hostwindsdns.com | - | High
41 | [24.43.99.75](https://vuldb.com/?ip.24.43.99.75) | rrcs-24-43-99-75.west.biz.rr.com | - | High
42 | [24.101.229.82](https://vuldb.com/?ip.24.101.229.82) | dynamic-acs-24-101-229-82.zoominternet.net | - | High
43 | [24.119.116.230](https://vuldb.com/?ip.24.119.116.230) | 24-119-116-230.cpe.sparklight.net | - | High
44 | [24.121.176.48](https://vuldb.com/?ip.24.121.176.48) | 24-121-176-48.prkrcmtc01.com.sta.suddenlink.net | - | High
45 | [24.137.76.62](https://vuldb.com/?ip.24.137.76.62) | host-24-137-76-62.public.eastlink.ca | - | High
46 | [24.178.90.49](https://vuldb.com/?ip.24.178.90.49) | 024-178-090-049.res.spectrum.com | - | High
47 | [24.179.13.119](https://vuldb.com/?ip.24.179.13.119) | 024-179-013-119.res.spectrum.com | - | High
48 | [24.217.117.217](https://vuldb.com/?ip.24.217.117.217) | 024-217-117-217.res.spectrum.com | - | High
49 | [24.232.228.233](https://vuldb.com/?ip.24.232.228.233) | OL233-228.fibertel.com.ar | - | High
50 | [24.244.177.40](https://vuldb.com/?ip.24.244.177.40) | - | - | High
51 | [27.78.27.110](https://vuldb.com/?ip.27.78.27.110) | localhost | - | High
52 | [27.82.13.10](https://vuldb.com/?ip.27.82.13.10) | KD027082013010.ppp-bb.dion.ne.jp | - | High
53 | [27.109.24.214](https://vuldb.com/?ip.27.109.24.214) | - | - | High
54 | [27.114.9.93](https://vuldb.com/?ip.27.114.9.93) | i27-114-9-93.s41.a011.ap.plala.or.jp | - | High
55 | [31.24.158.56](https://vuldb.com/?ip.31.24.158.56) | bm.servidoresdedicados.com | - | High
56 | [35.190.87.116](https://vuldb.com/?ip.35.190.87.116) | 116.87.190.35.bc.googleusercontent.com | - | Medium
57 | [36.91.44.183](https://vuldb.com/?ip.36.91.44.183) | - | - | High
58 | [37.46.129.215](https://vuldb.com/?ip.37.46.129.215) | we-too.ru | - | High
59 | [37.97.135.82](https://vuldb.com/?ip.37.97.135.82) | 37-97-135-82.colo.transip.net | - | High
60 | [37.139.21.175](https://vuldb.com/?ip.37.139.21.175) | 37.139.21.175-e2-8080-keep-up | - | High
61 | [37.179.204.33](https://vuldb.com/?ip.37.179.204.33) | - | - | High
62 | [37.187.4.178](https://vuldb.com/?ip.37.187.4.178) | ks2.kku.io | - | High
63 | [37.187.57.57](https://vuldb.com/?ip.37.187.57.57) | ns3357940.ovh.net | - | High
64 | [37.187.72.193](https://vuldb.com/?ip.37.187.72.193) | ns3362285.ip-37-187-72.eu | - | High
65 | [37.187.161.206](https://vuldb.com/?ip.37.187.161.206) | toolbox.alabs.io | - | High
66 | [37.205.9.252](https://vuldb.com/?ip.37.205.9.252) | s1.ithelp24.eu | - | High
67 | [37.221.70.250](https://vuldb.com/?ip.37.221.70.250) | b2b-customer.inftele.net | - | High
68 | [41.76.108.46](https://vuldb.com/?ip.41.76.108.46) | - | - | High
69 | [41.169.36.237](https://vuldb.com/?ip.41.169.36.237) | - | - | High
70 | [41.185.28.84](https://vuldb.com/?ip.41.185.28.84) | brf01-nix01.wadns.net | - | High
71 | [41.185.29.128](https://vuldb.com/?ip.41.185.29.128) | abp79-nix01.wadns.net | - | High
72 | [41.231.225.139](https://vuldb.com/?ip.41.231.225.139) | - | - | High
73 | [42.62.40.103](https://vuldb.com/?ip.42.62.40.103) | - | - | High
74 | [45.16.226.117](https://vuldb.com/?ip.45.16.226.117) | 45-16-226-117.lightspeed.sndgca.sbcglobal.net | - | High
75 | [45.33.77.42](https://vuldb.com/?ip.45.33.77.42) | li1023-42.members.linode.com | - | High
76 | [45.46.37.97](https://vuldb.com/?ip.45.46.37.97) | cpe-45-46-37-97.maine.res.rr.com | - | High
77 | [45.55.36.51](https://vuldb.com/?ip.45.55.36.51) | - | - | High
78 | [45.55.219.163](https://vuldb.com/?ip.45.55.219.163) | - | - | High
79 | [45.79.95.107](https://vuldb.com/?ip.45.79.95.107) | li1194-107.members.linode.com | - | High
80 | [45.80.148.200](https://vuldb.com/?ip.45.80.148.200) | - | - | High
81 | [45.118.115.99](https://vuldb.com/?ip.45.118.115.99) | - | - | High
82 | [45.118.135.203](https://vuldb.com/?ip.45.118.135.203) | 45-118-135-203.ip.linodeusercontent.com | - | High
83 | [45.142.114.231](https://vuldb.com/?ip.45.142.114.231) | mail.dounutmail.de | - | High
84 | [45.176.232.124](https://vuldb.com/?ip.45.176.232.124) | - | - | High
85 | [45.230.45.171](https://vuldb.com/?ip.45.230.45.171) | - | - | High
86 | [46.4.100.178](https://vuldb.com/?ip.46.4.100.178) | support.wizard-shopservice.de | - | High
87 | [46.4.192.185](https://vuldb.com/?ip.46.4.192.185) | static.185.192.4.46.clients.your-server.de | - | High
88 | [46.28.111.142](https://vuldb.com/?ip.46.28.111.142) | enkindu.jsuchy.net | - | High
89 | [46.32.229.152](https://vuldb.com/?ip.46.32.229.152) | 094882.vps-10.com | - | High
90 | [46.32.233.226](https://vuldb.com/?ip.46.32.233.226) | yetitoolusa.com | - | High
91 | [46.38.238.8](https://vuldb.com/?ip.46.38.238.8) | v2202109122001163131.happysrv.de | - | High
92 | [46.43.2.95](https://vuldb.com/?ip.46.43.2.95) | chris.default.cjenkinson.uk0.bigv.io | - | High
93 | [46.55.222.11](https://vuldb.com/?ip.46.55.222.11) | - | - | High
94 | [46.101.58.37](https://vuldb.com/?ip.46.101.58.37) | 46.101.58.37-e1-8080 | - | High
95 | [46.105.81.76](https://vuldb.com/?ip.46.105.81.76) | myu0.cylipo.sbs | - | High
96 | [46.105.114.137](https://vuldb.com/?ip.46.105.114.137) | ns3188253.ip-46-105-114.eu | - | High
97 | [46.105.131.68](https://vuldb.com/?ip.46.105.131.68) | http.adven.fr | - | High
98 | [46.105.131.79](https://vuldb.com/?ip.46.105.131.79) | relay.adven.fr | - | High
99 | [46.105.131.87](https://vuldb.com/?ip.46.105.131.87) | pop.adven.fr | - | High
100 | [46.105.236.18](https://vuldb.com/?ip.46.105.236.18) | - | - | High
101 | [46.165.212.76](https://vuldb.com/?ip.46.165.212.76) | - | - | High
102 | [46.165.254.206](https://vuldb.com/?ip.46.165.254.206) | - | - | High
103 | [46.214.107.142](https://vuldb.com/?ip.46.214.107.142) | 46-214-107-142.next-gen.ro | - | High
104 | [47.36.140.164](https://vuldb.com/?ip.47.36.140.164) | 047-036-140-164.res.spectrum.com | - | High
105 | [47.146.39.147](https://vuldb.com/?ip.47.146.39.147) | - | - | High
106 | [47.188.131.94](https://vuldb.com/?ip.47.188.131.94) | - | - | High
107 | [47.246.24.225](https://vuldb.com/?ip.47.246.24.225) | - | - | High
108 | [47.246.24.226](https://vuldb.com/?ip.47.246.24.226) | - | - | High
109 | [47.246.24.230](https://vuldb.com/?ip.47.246.24.230) | - | - | High
110 | [47.246.24.232](https://vuldb.com/?ip.47.246.24.232) | - | - | High
111 | [49.12.121.47](https://vuldb.com/?ip.49.12.121.47) | filezilla-project.org | - | High
112 | [49.50.209.131](https://vuldb.com/?ip.49.50.209.131) | 131.host-49-50-209.euba.megatel.co.nz | - | High
113 | [49.212.135.76](https://vuldb.com/?ip.49.212.135.76) | os3-321-50322.vs.sakura.ne.jp | - | High
114 | [49.212.155.94](https://vuldb.com/?ip.49.212.155.94) | os3-325-52340.vs.sakura.ne.jp | - | High
115 | [50.28.51.143](https://vuldb.com/?ip.50.28.51.143) | - | - | High
116 | [50.30.40.196](https://vuldb.com/?ip.50.30.40.196) | usve255301.serverprofi24.com | - | High
117 | [50.31.146.101](https://vuldb.com/?ip.50.31.146.101) | mail.brillinjurylaw.com | - | High
118 | [50.56.135.44](https://vuldb.com/?ip.50.56.135.44) | - | - | High
119 | [50.91.114.38](https://vuldb.com/?ip.50.91.114.38) | 050-091-114-038.res.spectrum.com | - | High
120 | [50.116.54.215](https://vuldb.com/?ip.50.116.54.215) | li440-215.members.linode.com | - | High
121 | [50.116.78.109](https://vuldb.com/?ip.50.116.78.109) | intersearchmedia.com | - | High
122 | [50.245.107.73](https://vuldb.com/?ip.50.245.107.73) | 50-245-107-73-static.hfc.comcastbusiness.net | - | High
123 | [51.15.4.22](https://vuldb.com/?ip.51.15.4.22) | 51-15-4-22.rev.poneytelecom.eu | - | High
124 | [51.15.7.145](https://vuldb.com/?ip.51.15.7.145) | 51-15-7-145.rev.poneytelecom.eu | - | High
125 | [51.38.201.19](https://vuldb.com/?ip.51.38.201.19) | ip19.ip-51-38-201.eu | - | High
126 | [51.75.33.120](https://vuldb.com/?ip.51.75.33.120) | ip120.ip-51-75-33.eu | - | High
127 | [51.75.33.127](https://vuldb.com/?ip.51.75.33.127) | ip127.ip-51-75-33.eu | - | High
128 | [51.89.36.180](https://vuldb.com/?ip.51.89.36.180) | ip180.ip-51-89-36.eu | - | High
129 | [51.89.199.141](https://vuldb.com/?ip.51.89.199.141) | ip141.ip-51-89-199.eu | - | High
130 | [51.91.7.5](https://vuldb.com/?ip.51.91.7.5) | ns3147667.ip-51-91-7.eu | - | High
131 | [51.91.76.89](https://vuldb.com/?ip.51.91.76.89) | 89.ip-51-91-76.eu | - | High
132 | [51.159.35.157](https://vuldb.com/?ip.51.159.35.157) | 51-159-35-157.rev.poneytelecom.eu | - | High
133 | [51.254.140.238](https://vuldb.com/?ip.51.254.140.238) | 238.ip-51-254-140.eu | - | High
134 | [51.255.50.164](https://vuldb.com/?ip.51.255.50.164) | vps-b6cfe010.vps.ovh.net | - | High
135 | [51.255.165.160](https://vuldb.com/?ip.51.255.165.160) | 160.ip-51-255-165.eu | - | High
136 | [52.66.202.63](https://vuldb.com/?ip.52.66.202.63) | ec2-52-66-202-63.ap-south-1.compute.amazonaws.com | - | Medium
137 | [54.38.143.245](https://vuldb.com/?ip.54.38.143.245) | tools.inovato.me | - | High
138 | [58.27.215.3](https://vuldb.com/?ip.58.27.215.3) | 58-27-215-3.wateen.net | - | High
139 | [58.94.58.13](https://vuldb.com/?ip.58.94.58.13) | i58-94-58-13.s41.a014.ap.plala.or.jp | - | High
140 | [58.216.16.130](https://vuldb.com/?ip.58.216.16.130) | - | - | High
141 | [58.227.42.236](https://vuldb.com/?ip.58.227.42.236) | - | - | High
142 | [59.148.253.194](https://vuldb.com/?ip.59.148.253.194) | 059148253194.ctinets.com | - | High
143 | [60.93.23.51](https://vuldb.com/?ip.60.93.23.51) | softbank060093023051.bbtec.net | - | High
144 | [60.108.128.186](https://vuldb.com/?ip.60.108.128.186) | softbank060108128186.bbtec.net | - | High
145 | [60.125.114.64](https://vuldb.com/?ip.60.125.114.64) | softbank060125114064.bbtec.net | - | High
146 | [60.249.78.226](https://vuldb.com/?ip.60.249.78.226) | 60-249-78-226.hinet-ip.hinet.net | - | High
147 | [61.19.246.238](https://vuldb.com/?ip.61.19.246.238) | - | - | High
148 | [62.30.7.67](https://vuldb.com/?ip.62.30.7.67) | 67.7-30-62.static.virginmediabusiness.co.uk | - | High
149 | [62.75.141.82](https://vuldb.com/?ip.62.75.141.82) | static-ip-62-75-141-82.inaddr.ip-pool.com | - | High
150 | [62.84.75.50](https://vuldb.com/?ip.62.84.75.50) | mail.saadegrp.com.lb | - | High
151 | [62.171.142.179](https://vuldb.com/?ip.62.171.142.179) | vmi499457.contaboserver.net | - | High
152 | [62.212.34.102](https://vuldb.com/?ip.62.212.34.102) | - | - | High
153 | [64.190.63.136](https://vuldb.com/?ip.64.190.63.136) | - | - | High
154 | [64.207.182.168](https://vuldb.com/?ip.64.207.182.168) | - | - | High
155 | [66.54.51.172](https://vuldb.com/?ip.66.54.51.172) | - | - | High
156 | [66.76.26.33](https://vuldb.com/?ip.66.76.26.33) | 66-76-26-33.hdsncmta01.com.sta.suddenlink.net | - | High
157 | [66.209.69.165](https://vuldb.com/?ip.66.209.69.165) | - | - | High
158 | [66.228.61.248](https://vuldb.com/?ip.66.228.61.248) | li318-248.members.linode.com | - | High
159 | [67.19.105.107](https://vuldb.com/?ip.67.19.105.107) | ns2.datatrust.com.br | - | High
160 | [67.170.250.203](https://vuldb.com/?ip.67.170.250.203) | c-67-170-250-203.hsd1.ca.comcast.net | - | High
161 | [67.225.218.50](https://vuldb.com/?ip.67.225.218.50) | lb01.parklogic.com | - | High
162 | [68.2.97.91](https://vuldb.com/?ip.68.2.97.91) | ip68-2-97-91.ph.ph.cox.net | - | High
163 | [68.183.170.114](https://vuldb.com/?ip.68.183.170.114) | 68.183.170.114-e1-8080-keep-up | - | High
164 | [68.183.190.199](https://vuldb.com/?ip.68.183.190.199) | 68.183.190.199-e1-8080-keep-up | - | High
165 | [69.17.170.58](https://vuldb.com/?ip.69.17.170.58) | unallocated-static.rogers.com | - | High
166 | [69.43.168.200](https://vuldb.com/?ip.69.43.168.200) | ns0.imunplugged.com | - | High
167 | [69.45.19.251](https://vuldb.com/?ip.69.45.19.251) | coastinet.com | - | High
168 | [69.163.33.82](https://vuldb.com/?ip.69.163.33.82) | - | - | High
169 | [69.167.152.111](https://vuldb.com/?ip.69.167.152.111) | - | - | High
170 | [69.198.17.49](https://vuldb.com/?ip.69.198.17.49) | 69-198-17-49.customerip.birch.net | - | High
171 | [70.32.84.74](https://vuldb.com/?ip.70.32.84.74) | - | - | High
172 | [70.32.89.105](https://vuldb.com/?ip.70.32.89.105) | parties-at-sea.com | - | High
173 | [70.32.92.133](https://vuldb.com/?ip.70.32.92.133) | popdesigngroup.com | - | High
174 | [70.32.115.157](https://vuldb.com/?ip.70.32.115.157) | harpotripofalifetime.com | - | High
175 | [70.36.102.35](https://vuldb.com/?ip.70.36.102.35) | - | - | High
176 | [70.168.7.6](https://vuldb.com/?ip.70.168.7.6) | wsip-70-168-7-6.ri.ri.cox.net | - | High
177 | [70.182.77.184](https://vuldb.com/?ip.70.182.77.184) | wsip-70-182-77-184.ok.ok.cox.net | - | High
178 | [70.184.125.132](https://vuldb.com/?ip.70.184.125.132) | wsip-70-184-125-132.ph.ph.cox.net | - | High
179 | [71.15.245.148](https://vuldb.com/?ip.71.15.245.148) | 071-015-245-148.res.spectrum.com | - | High
180 | [71.40.213.82](https://vuldb.com/?ip.71.40.213.82) | rrcs-71-40-213-82.sw.biz.rr.com | - | High
181 | [71.197.211.156](https://vuldb.com/?ip.71.197.211.156) | c-71-197-211-156.hsd1.wa.comcast.net | - | High
182 | [71.244.60.231](https://vuldb.com/?ip.71.244.60.231) | static-71-244-60-231.dllstx.fios.frontiernet.net | - | High
183 | [72.10.49.117](https://vuldb.com/?ip.72.10.49.117) | rtw7-rfpn.accessdomain.com | - | High
184 | [72.15.201.15](https://vuldb.com/?ip.72.15.201.15) | - | - | High
185 | ... | ... | ... | ...
There are 630 more IOC items available. Please use our online service to access the data.
There are 735 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -189,9 +215,9 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
1 | T1008 | CWE-757 | Algorithm Downgrade | High
2 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
@ -202,20 +228,29 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.htaccess` | Medium
2 | File | `/admin/ajax/avatar.php` | High
3 | File | `/admin/uploads.php` | High
4 | File | `/alerts/alertConfigField.php` | High
5 | File | `/alerts/alertLightbox.php` | High
6 | File | `/aqpg/users/login.php` | High
7 | File | `/classes/ajax/Functions.php` | High
8 | File | `/cwms/admin/?page=articles/view_article/` | High
9 | File | `/cwms/classes/Master.php?f=save_contact` | High
10 | File | `/i/:data/ipa.plist` | High
11 | File | `/jquery_file_upload/server/php/index.php` | High
12 | ... | ... | ...
1 | File | `.htaccess` | Medium
2 | File | `/admin.php/admin/plog/index.html` | High
3 | File | `/admin.php/admin/ulog/index.html` | High
4 | File | `/admin.php/admin/vod/data.html` | High
5 | File | `/admin.php/admin/website/data.html` | High
6 | File | `/admin/contenttemp` | High
7 | File | `/admin/show.php` | High
8 | File | `/api/crontab` | Medium
9 | File | `/api/fetch` | Medium
10 | File | `/cgi-bin/uploadAccessCodePic` | High
11 | File | `/cgi-bin/uploadWeiXinPic` | High
12 | File | `/config/list` | Medium
13 | File | `/controller/Index.php` | High
14 | File | `/core/conditions/AbstractWrapper.java` | High
15 | File | `/data/sqldata` | High
16 | File | `/DataHandler/HandlerEnergyType.ashx` | High
17 | File | `/factor/avx-ecm/vecarith52.c` | High
18 | File | `/goform/delAd` | High
19 | File | `/goform/exeCommand` | High
20 | File | `/goform/setAdInfoDetail` | High
21 | ... | ... | ...
There are 95 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 169 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -234,11 +269,17 @@ The following list contains _external sources_ which discuss the actor and the a
* https://blog.talosintelligence.com/2022/02/threat-roundup-0128-0204.html
* https://blog.talosintelligence.com/2022/02/threat-roundup-0211-0218.html
* https://blog.talosintelligence.com/2022/03/threat-roundup-0225-0304.html
* https://blog.talosintelligence.com/2022/03/threat-roundup-0311-0318.html
* https://blogs.blackberry.com/en/2017/12/threat-spotlight-emotet-infostealer-malware
* https://community.blueliv.com/#!/s/5fb2ee2482df413eaf344b29
* https://ddanchev.blogspot.com/2022/01/profiling-emotet-botnet-c.html
* https://github.com/pr0xylife/Emotet/blob/main/e4_emotet_24.03.2022.txt
* https://isc.sans.edu/forums/diary/Emotet+Returns/28044/
* https://isc.sans.edu/forums/diary/Emotet+Stops+Using+0000+in+Spambot+Traffic/28270/
* https://lawiet47.github.io/malware_writeups/Emotet/
* https://pastebin.com/uPn1zM6b
* https://unit42.paloaltonetworks.com/emotet-command-and-control/
* https://www.cert.pl/en/posts/2017/05/analysis-of-emotet-v4/
* https://www.trendmicro.com/en_us/research/22/a/emotet-spam-abuses-unconventional-ip-address-formats-spread-malware.html
## Literature

View File

@ -36,7 +36,7 @@ There are 10 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Exchange Marauder_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Exchange Marauder_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -0,0 +1,51 @@
# Exotic Lily - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Exotic Lily](https://vuldb.com/?actor.exotic_lily). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.exotic_lily](https://vuldb.com/?actor.exotic_lily)
## Campaigns
The following _campaigns_ are known and can be associated with Exotic Lily:
* BumbleBee
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Exotic Lily:
* [US](https://vuldb.com/?country.us)
* [GB](https://vuldb.com/?country.gb)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Exotic Lily.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [23.81.246.187](https://vuldb.com/?ip.23.81.246.187) | - | BumbleBee | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Exotic Lily_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -31,12 +31,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 4 more TTP items available. Please use our online service to access the data.
There are 5 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack

View File

@ -9,6 +9,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
The following _campaigns_ are known and can be associated with FIN6:
* MAZE
* Point of Sale Thin Clients
## Countries
@ -19,7 +20,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [RU](https://vuldb.com/?country.ru)
* ...
There are 12 more country items available. Please use our online service to access the data.
There are 14 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -27,25 +28,28 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [5.199.167.188](https://vuldb.com/?ip.5.199.167.188) | - | MAZE | High
2 | [31.220.45.151](https://vuldb.com/?ip.31.220.45.151) | - | - | High
3 | [37.1.213.9](https://vuldb.com/?ip.37.1.213.9) | - | MAZE | High
4 | [37.1.221.212](https://vuldb.com/?ip.37.1.221.212) | adspect.net | - | High
5 | [37.252.7.142](https://vuldb.com/?ip.37.252.7.142) | - | MAZE | High
6 | [46.4.113.237](https://vuldb.com/?ip.46.4.113.237) | static.237.113.4.46.clients.your-server.de | - | High
7 | [46.166.173.109](https://vuldb.com/?ip.46.166.173.109) | - | - | High
8 | [54.39.233.188](https://vuldb.com/?ip.54.39.233.188) | mail.ov120.slpmt.net | MAZE | High
9 | [62.210.136.65](https://vuldb.com/?ip.62.210.136.65) | 62-210-136-65.rev.poneytelecom.eu | - | High
10 | [89.105.194.236](https://vuldb.com/?ip.89.105.194.236) | - | - | High
11 | [91.208.184.174](https://vuldb.com/?ip.91.208.184.174) | sell.mybeststore.club | MAZE | High
12 | [91.218.114.4](https://vuldb.com/?ip.91.218.114.4) | - | MAZE | High
13 | ... | ... | ... | ...
1 | [2.72.0.200](https://vuldb.com/?ip.2.72.0.200) | 2-72-0-200.kcell.kz | Point of Sale Thin Clients | High
2 | [5.39.219.15](https://vuldb.com/?ip.5.39.219.15) | - | Point of Sale Thin Clients | High
3 | [5.199.167.188](https://vuldb.com/?ip.5.199.167.188) | - | MAZE | High
4 | [31.220.45.151](https://vuldb.com/?ip.31.220.45.151) | - | - | High
5 | [34.245.88.113](https://vuldb.com/?ip.34.245.88.113) | ec2-34-245-88-113.eu-west-1.compute.amazonaws.com | Point of Sale Thin Clients | Medium
6 | [35.182.31.181](https://vuldb.com/?ip.35.182.31.181) | ec2-35-182-31-181.ca-central-1.compute.amazonaws.com | Point of Sale Thin Clients | Medium
7 | [37.1.213.9](https://vuldb.com/?ip.37.1.213.9) | - | MAZE | High
8 | [37.1.221.212](https://vuldb.com/?ip.37.1.221.212) | adspect.net | - | High
9 | [37.139.21.20](https://vuldb.com/?ip.37.139.21.20) | - | Point of Sale Thin Clients | High
10 | [37.252.7.142](https://vuldb.com/?ip.37.252.7.142) | - | MAZE | High
11 | [45.247.22.27](https://vuldb.com/?ip.45.247.22.27) | - | Point of Sale Thin Clients | High
12 | [46.4.113.237](https://vuldb.com/?ip.46.4.113.237) | static.237.113.4.46.clients.your-server.de | - | High
13 | [46.166.173.109](https://vuldb.com/?ip.46.166.173.109) | - | - | High
14 | [47.75.151.154](https://vuldb.com/?ip.47.75.151.154) | - | Point of Sale Thin Clients | High
15 | [54.39.233.188](https://vuldb.com/?ip.54.39.233.188) | mail.ov120.slpmt.net | MAZE | High
16 | ... | ... | ... | ...
There are 48 more IOC items available. Please use our online service to access the data.
There are 61 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by FIN6. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _FIN6_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -54,7 +58,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 5 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -62,66 +66,68 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/accountancy/admin/accountmodel.php` | High
2 | File | `/admin/setup` | Medium
3 | File | `/advance_push/public/login` | High
4 | File | `/ajax-files/postComment.php` | High
5 | File | `/anony/mjpg.cgi` | High
6 | File | `/bin/sh` | Low
7 | File | `/catalog` | Medium
8 | File | `/cgi-bin/ExportSettings.sh` | High
9 | File | `/cgi-bin/login_action.cgi` | High
10 | File | `/cgi-bin/webproc` | High
11 | File | `/checkLogin.cgi` | High
12 | File | `/classes/profile.class.php` | High
13 | File | `/common/run_report.php` | High
14 | File | `/data/inc/images.php` | High
15 | File | `/data/syslog.filter.json` | High
16 | File | `/data/wps.setup.json` | High
17 | File | `/docs/captcha_(number).jpeg` | High
18 | File | `/etc/config/rpcd` | High
19 | File | `/etc/hosts` | Medium
20 | File | `/forum/` | Low
21 | File | `/goform/net\_Web\_get_value` | High
22 | File | `/index.php` | Medium
23 | File | `/index.php/weblinks-categories` | High
24 | File | `/j_security_check` | High
25 | File | `/login.html` | Medium
26 | File | `/menu.html` | Medium
27 | File | `/mics/j_spring_security_check` | High
28 | File | `/mnt/sdcard/$PRO_NAME/upgrade.sh` | High
29 | File | `/mnt/skyeye/mode_switch.sh` | High
30 | File | `/mybb_1806/Upload/admin/index.php` | High
31 | File | `/oauth/token` | Medium
32 | File | `/plain` | Low
33 | File | `/romfile.cfg` | Medium
34 | File | `/scp/directory.php` | High
35 | File | `/setSystemAdmin` | High
36 | File | `/system/WCore/WHelper.php` | High
37 | File | `/tmp/connlicj.bin` | High
38 | File | `/uncpath/` | Medium
39 | File | `/upload` | Low
40 | File | `/userfs/bin/tcapi` | High
41 | File | `/var/www/xms/application/config/config.php` | High
42 | File | `/var/www/xms/application/controllers/gatherLogs.php` | High
43 | File | `/var/www/xms/application/controllers/verifyLogin.php` | High
44 | File | `/var/www/xms/cleanzip.sh` | High
45 | File | `/vendor/phpdocumentor/reflection-docblock/tests/phpDocumentor/Reflection/DocBlock/Tag/LinkTagTeet.php` | High
46 | File | `/websocket/exec` | High
47 | File | `/workspaceCleanup` | High
48 | File | `/wp-admin/admin-ajax.php?action=get_wdtable&table_id=1` | High
49 | File | `account/gallery.php` | High
50 | File | `add_edit_cat.asp` | High
51 | File | `admin.htm` | Medium
52 | File | `admin.php` | Medium
53 | ... | ... | ...
1 | File | `//` | Low
2 | File | `/accountancy/admin/accountmodel.php` | High
3 | File | `/admin/index.php?n=system&c=filept&a=doGetFileList` | High
4 | File | `/admin/setup` | Medium
5 | File | `/advance_push/public/login` | High
6 | File | `/ajax-files/postComment.php` | High
7 | File | `/anony/mjpg.cgi` | High
8 | File | `/bin/sh` | Low
9 | File | `/catalog` | Medium
10 | File | `/cgi-bin/ExportSettings.sh` | High
11 | File | `/cgi-bin/login_action.cgi` | High
12 | File | `/cgi-bin/webproc` | High
13 | File | `/checkLogin.cgi` | High
14 | File | `/classes/profile.class.php` | High
15 | File | `/common/run_report.php` | High
16 | File | `/data/inc/images.php` | High
17 | File | `/data/syslog.filter.json` | High
18 | File | `/data/wps.setup.json` | High
19 | File | `/docs/captcha_(number).jpeg` | High
20 | File | `/etc/config/rpcd` | High
21 | File | `/etc/hosts` | Medium
22 | File | `/forum/` | Low
23 | File | `/goform/net\_Web\_get_value` | High
24 | File | `/index.php` | Medium
25 | File | `/index.php/weblinks-categories` | High
26 | File | `/j_security_check` | High
27 | File | `/login.html` | Medium
28 | File | `/menu.html` | Medium
29 | File | `/mics/j_spring_security_check` | High
30 | File | `/mnt/sdcard/$PRO_NAME/upgrade.sh` | High
31 | File | `/mnt/skyeye/mode_switch.sh` | High
32 | File | `/mybb_1806/Upload/admin/index.php` | High
33 | File | `/oauth/token` | Medium
34 | File | `/plain` | Low
35 | File | `/public/login.htm` | High
36 | File | `/romfile.cfg` | Medium
37 | File | `/scp/directory.php` | High
38 | File | `/setSystemAdmin` | High
39 | File | `/system/WCore/WHelper.php` | High
40 | File | `/tmp/connlicj.bin` | High
41 | File | `/uncpath/` | Medium
42 | File | `/upload` | Low
43 | File | `/userfs/bin/tcapi` | High
44 | File | `/var/www/xms/application/config/config.php` | High
45 | File | `/var/www/xms/application/controllers/gatherLogs.php` | High
46 | File | `/var/www/xms/application/controllers/verifyLogin.php` | High
47 | File | `/var/www/xms/cleanzip.sh` | High
48 | File | `/vendor/phpdocumentor/reflection-docblock/tests/phpDocumentor/Reflection/DocBlock/Tag/LinkTagTeet.php` | High
49 | File | `/websocket/exec` | High
50 | File | `/workspaceCleanup` | High
51 | File | `/wp-admin/admin-ajax.php?action=get_wdtable&table_id=1` | High
52 | File | `account/gallery.php` | High
53 | File | `add_edit_cat.asp` | High
54 | ... | ... | ...
There are 462 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 467 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* http://blog.morphisec.com/new-global-attack-on-point-of-sale-systems
* https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/
* https://usa.visa.com/dam/VCOM/global/support-legal/documents/fin6-cybercrime-group-expands-threat-To-ecommerce-merchants.pdf
* https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html

View File

@ -137,17 +137,17 @@ ID | Type | Indicator | Confidence
41 | File | `admin/write-post.php` | High
42 | File | `administrator/components/com_media/helpers/media.php` | High
43 | File | `admin_events.php` | High
44 | File | `AjaxApplication.java` | High
45 | File | `akocomments.php` | High
46 | File | `allopass-error.php` | High
47 | File | `AllowBindAppWidgetActivity.java` | High
48 | File | `android/webkit/SearchBoxImpl.java` | High
49 | File | `AndroidManifest.xml` | High
50 | File | `api/settings/values` | High
51 | File | `app/topic/action/admin/topic.php` | High
44 | File | `aidl_const_expressions.cpp` | High
45 | File | `ajax/include.php` | High
46 | File | `AjaxApplication.java` | High
47 | File | `akocomments.php` | High
48 | File | `allopass-error.php` | High
49 | File | `AllowBindAppWidgetActivity.java` | High
50 | File | `android/webkit/SearchBoxImpl.java` | High
51 | File | `AndroidManifest.xml` | High
52 | ... | ... | ...
There are 449 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 455 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -45,7 +45,7 @@ ID | Type | Indicator | Confidence
4 | File | `/var/log/nginx` | High
5 | ... | ... | ...
There are 26 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 27 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -0,0 +1,36 @@
# FinFisher - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [FinFisher](https://vuldb.com/?actor.finfisher). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.finfisher](https://vuldb.com/?actor.finfisher)
## Campaigns
The following _campaigns_ are known and can be associated with FinFisher:
* Turkey March for Justice
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of FinFisher.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [178.32.214.175](https://vuldb.com/?ip.178.32.214.175) | reverse.bilgi-islem.com | Turkey March for Justice | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.accessnow.org/cms/assets/uploads/2018/05/FinFisher-changes-tactics-to-hook-critics-AN.pdf
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with FritzFrog:
* [VN](https://vuldb.com/?country.vn)
* [CN](https://vuldb.com/?country.cn)
* [VN](https://vuldb.com/?country.vn)
* [ES](https://vuldb.com/?country.es)
* ...
There are 13 more country items available. Please use our online service to access the data.
There are 10 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -327,16 +327,16 @@ There are 1200 more IOC items available. Please use our online service to access
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _FritzFrog_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _FritzFrog_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 7 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -344,54 +344,46 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `%PROGRAMDATA%\ASUS\GamingCenterLib` | High
2 | File | `/administrator/components/menu/` | High
3 | File | `/apply_noauth.cgi` | High
4 | File | `/cgi-bin/login` | High
5 | File | `/CMD_ACCOUNT_ADMIN` | High
6 | File | `/config/getuser` | High
7 | File | `/core/admin/categories.php` | High
8 | File | `/debug/pprof` | Medium
9 | File | `/dev/cpu/*/msr` | High
10 | File | `/filemanager/php/connector.php` | High
11 | File | `/forum/away.php` | High
12 | File | `/front/document.form.php` | High
13 | File | `/ghost/preview` | High
14 | File | `/horde/util/go.php` | High
15 | File | `/include/chart_generator.php` | High
16 | File | `/index.php` | Medium
17 | File | `/member/index/login.html` | High
18 | File | `/modx/manager/index.php` | High
19 | File | `/MTFWU` | Low
20 | File | `/my_photo_gallery/image.php` | High
21 | File | `/products/details.asp` | High
22 | File | `/public/admin.php` | High
23 | File | `/public/login.htm?errormsg=&loginurl=%22%3E%3Csvg%20onload=prompt%28/XSS/%29%3E` | High
24 | File | `/public/plugins/` | High
25 | File | `/rest/api/1.0/render` | High
26 | File | `/s/` | Low
27 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
28 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
29 | File | `/uncpath/` | Medium
30 | File | `/user-utils/users/md5.json` | High
31 | File | `/usr/bin/pkexec` | High
32 | File | `/webhooks/aws` | High
33 | File | `/x_program_center/jaxrs/invoke` | High
34 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
35 | File | `add.exe` | Low
36 | File | `admin.php?m=Food&a=addsave` | High
37 | File | `admin.remository.php` | High
38 | File | `admin/conf_users_edit.php` | High
39 | File | `admin/index.php` | High
40 | File | `admin/login.asp` | High
41 | File | `adminpanel/modules/pro/inc/ajax.php` | High
42 | File | `admin\db\DoSql.php` | High
43 | File | `affich.php` | Medium
44 | File | `ajax/kanban.php` | High
45 | File | `ajax_calls.php` | High
46 | ... | ... | ...
1 | File | `%PROGRAMDATA%\checkmk\agent\local` | High
2 | File | `.htaccess` | Medium
3 | File | `/../conf/config.properties` | High
4 | File | `//` | Low
5 | File | `/admin.php?action=themeinstall` | High
6 | File | `/admin/login.php` | High
7 | File | `/api/crontab` | Medium
8 | File | `/apply_noauth.cgi` | High
9 | File | `/as/authorization.oauth2` | High
10 | File | `/audit/log/log_management.php` | High
11 | File | `/bin/login` | Medium
12 | File | `/cgi-bin/delete_CA` | High
13 | File | `/cgi-bin/login` | High
14 | File | `/classes/profile.class.php` | High
15 | File | `/cloud_config/router_post/check_reg_verify_code` | High
16 | File | `/config/getuser` | High
17 | File | `/dev/tty` | Medium
18 | File | `/export` | Low
19 | File | `/ghost/preview` | High
20 | File | `/index.php` | Medium
21 | File | `/member/index/login.html` | High
22 | File | `/products/details.asp` | High
23 | File | `/ptms/classes/Users.php` | High
24 | File | `/public/login.htm` | High
25 | File | `/ScadaBR/login.htm` | High
26 | File | `/system/tool/ping.php` | High
27 | File | `/uncpath/` | Medium
28 | File | `/uploads/dede` | High
29 | File | `/usr/bin/at` | Medium
30 | File | `/usr/bin/pkexec` | High
31 | File | `/wp-admin/admin-ajax.php` | High
32 | File | `/_matrix/client/r0/auth/m.login.recaptcha` | High
33 | File | `?location=search` | High
34 | File | `account/login.php` | High
35 | File | `accountrecoveryendpoint/recoverpassword.do` | High
36 | File | `acrord32.exe` | Medium
37 | File | `admin.php` | Medium
38 | ... | ... | ...
There are 399 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 329 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -0,0 +1,30 @@
# Gh0stCringe - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Gh0stCringe](https://vuldb.com/?actor.gh0stcringe). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.gh0stcringe](https://vuldb.com/?actor.gh0stcringe)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Gh0stCringe.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [172.86.127.224](https://vuldb.com/?ip.172.86.127.224) | - | - | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.malwarebytes.com/trojans/2022/03/gh0stcringe-rat-makes-database-servers-squeal-for-protection/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -60,7 +60,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 7 more TTP items available. Please use our online service to access the data.
There are 8 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -69,40 +69,40 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/+CSCOE+/logon.html` | High
2 | File | `/.env` | Low
3 | File | `/.ssh/authorized_keys` | High
4 | File | `/admin.php?&m=Public&a=login` | High
5 | File | `/ajax/networking/get_netcfg.php` | High
6 | File | `/car.php` | Medium
7 | File | `/CMD_ACCOUNT_ADMIN` | High
8 | File | `/concat?/%2557EB-INF/web.xml` | High
9 | File | `/core/admin/categories.php` | High
10 | File | `/dashboards/#` | High
11 | File | `/data/remove` | Medium
12 | File | `/etc/controller-agent/agent.conf` | High
13 | File | `/etc/sudoers` | Medium
14 | File | `/etc/tomcat8/Catalina/attack` | High
15 | File | `/filemanager/php/connector.php` | High
16 | File | `/forum/away.php` | High
17 | File | `/fudforum/adm/hlplist.php` | High
18 | File | `/GponForm/fsetup_Form` | High
19 | File | `/log_download.cgi` | High
20 | File | `/modules/profile/index.php` | High
21 | File | `/MTFWU` | Low
22 | File | `/navigate/navigate_download.php` | High
23 | File | `/out.php` | Medium
24 | File | `/password.html` | High
25 | File | `/property-list/property_view.php` | High
26 | File | `/public/plugins/` | High
27 | File | `/rest/api/2/search` | High
28 | File | `/s/` | Low
29 | File | `/scripts/cpan_config` | High
30 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
31 | File | `/secure/QueryComponent!Default.jspa` | High
32 | File | `/server-info` | Medium
33 | File | `/tmp` | Low
34 | File | `/tmp/app/.env` | High
35 | File | `/tmp/kamailio_ctl` | High
2 | File | `/.ssh/authorized_keys` | High
3 | File | `/admin.php?&m=Public&a=login` | High
4 | File | `/ajax/networking/get_netcfg.php` | High
5 | File | `/car.php` | Medium
6 | File | `/CMD_ACCOUNT_ADMIN` | High
7 | File | `/concat?/%2557EB-INF/web.xml` | High
8 | File | `/core/admin/categories.php` | High
9 | File | `/dashboards/#` | High
10 | File | `/data/remove` | Medium
11 | File | `/etc/controller-agent/agent.conf` | High
12 | File | `/etc/sudoers` | Medium
13 | File | `/filemanager/php/connector.php` | High
14 | File | `/forum/away.php` | High
15 | File | `/fudforum/adm/hlplist.php` | High
16 | File | `/GponForm/fsetup_Form` | High
17 | File | `/log_download.cgi` | High
18 | File | `/modules/profile/index.php` | High
19 | File | `/MTFWU` | Low
20 | File | `/navigate/navigate_download.php` | High
21 | File | `/out.php` | Medium
22 | File | `/password.html` | High
23 | File | `/property-list/property_view.php` | High
24 | File | `/ptms/classes/Users.php` | High
25 | File | `/public/plugins/` | High
26 | File | `/rest/api/2/search` | High
27 | File | `/s/` | Low
28 | File | `/scripts/cpan_config` | High
29 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
30 | File | `/secure/QueryComponent!Default.jspa` | High
31 | File | `/server-info` | Medium
32 | File | `/tmp` | Low
33 | File | `/tmp/kamailio_ctl` | High
34 | File | `/tmp/kamailio_fifo` | High
35 | File | `/ucms/index.php?do=list_edit` | High
36 | ... | ... | ...
There are 307 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.

View File

@ -0,0 +1,75 @@
# GhostEmperor - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [GhostEmperor](https://vuldb.com/?actor.ghostemperor). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.ghostemperor](https://vuldb.com/?actor.ghostemperor)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with GhostEmperor:
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
* [GB](https://vuldb.com/?country.gb)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of GhostEmperor.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [27.102.113.57](https://vuldb.com/?ip.27.102.113.57) | yukonpick.net | - | High
2 | [27.102.113.240](https://vuldb.com/?ip.27.102.113.240) | power.playtimeins.net | - | High
3 | [27.102.114.55](https://vuldb.com/?ip.27.102.114.55) | - | - | High
4 | ... | ... | ... | ...
There are 4 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _GhostEmperor_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 4 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by GhostEmperor. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.env` | Low
2 | File | `/admin/index.php` | High
3 | File | `/login.html` | Medium
4 | File | `/new` | Low
5 | File | `/system?action=ServiceAdmin` | High
6 | File | `/tlogin.cgi` | Medium
7 | File | `/userRpm/popupSiteSurveyRpm.html` | High
8 | File | `/var/log/nginx` | High
9 | File | `add_vhost.php` | High
10 | ... | ... | ...
There are 79 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://securelist.com/ghostemperor-from-proxylogon-to-kernel-mode/104407/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -0,0 +1,60 @@
# GoldBrute - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [GoldBrute](https://vuldb.com/?actor.goldbrute). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.goldbrute](https://vuldb.com/?actor.goldbrute)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with GoldBrute:
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of GoldBrute.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [104.156.249.231](https://vuldb.com/?ip.104.156.249.231) | 104.156.249.231.vultrusercontent.com | - | High
2 | [104.248.167.144](https://vuldb.com/?ip.104.248.167.144) | - | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _GoldBrute_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by GoldBrute. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/cgi-bin/login_action.cgi` | High
2 | File | `administrator/components/com_media/helpers/media.php` | High
3 | File | `cgi-bin/mft/wireless_mft.cgi` | High
4 | ... | ... | ...
There are 11 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://morphuslabs.com/goldbrute-botnet-brute-forcing-1-5-million-rdp-servers-371f219ec37d
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -49,44 +49,44 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/?module=users&section=cpanel&page=list` | High
2 | File | `/admin/powerline` | High
3 | File | `/admin/syslog` | High
4 | File | `/api/upload` | Medium
5 | File | `/cgi-bin` | Medium
6 | File | `/cgi-bin/kerbynet` | High
7 | File | `/context/%2e/WEB-INF/web.xml` | High
8 | File | `/fudforum/adm/hlplist.php` | High
9 | File | `/login` | Low
10 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
11 | File | `/monitoring` | Medium
12 | File | `/new` | Low
13 | File | `/proc/<pid>/status` | High
14 | File | `/public/plugins/` | High
15 | File | `/REBOOTSYSTEM` | High
16 | File | `/rom` | Low
17 | File | `/scripts/killpvhost` | High
18 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
19 | File | `/secure/QueryComponent!Default.jspa` | High
20 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
21 | File | `/tmp` | Low
22 | File | `/tmp/redis.ds` | High
23 | File | `/uncpath/` | Medium
24 | File | `/wp-admin` | Medium
25 | File | `/wp-json/wc/v3/webhooks` | High
26 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
27 | File | `AccountManagerService.java` | High
28 | File | `actions/CompanyDetailsSave.php` | High
29 | File | `ActiveServices.java` | High
30 | File | `ActivityManagerService.java` | High
31 | File | `admin.php` | Medium
32 | File | `admin/?n=user&c=admin_user&a=doGetUserInfo` | High
33 | File | `admin/add-glossary.php` | High
34 | File | `admin/conf_users_edit.php` | High
35 | File | `admin/edit-comments.php` | High
1 | File | `//` | Low
2 | File | `/?module=users&section=cpanel&page=list` | High
3 | File | `/admin/powerline` | High
4 | File | `/admin/syslog` | High
5 | File | `/api/upload` | Medium
6 | File | `/cgi-bin` | Medium
7 | File | `/cgi-bin/kerbynet` | High
8 | File | `/context/%2e/WEB-INF/web.xml` | High
9 | File | `/fudforum/adm/hlplist.php` | High
10 | File | `/login` | Low
11 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
12 | File | `/monitoring` | Medium
13 | File | `/new` | Low
14 | File | `/proc/<pid>/status` | High
15 | File | `/public/plugins/` | High
16 | File | `/REBOOTSYSTEM` | High
17 | File | `/rom` | Low
18 | File | `/scripts/killpvhost` | High
19 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
20 | File | `/secure/QueryComponent!Default.jspa` | High
21 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
22 | File | `/tmp` | Low
23 | File | `/tmp/redis.ds` | High
24 | File | `/uncpath/` | Medium
25 | File | `/wp-admin` | Medium
26 | File | `/wp-json/wc/v3/webhooks` | High
27 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
28 | File | `AccountManagerService.java` | High
29 | File | `actions/CompanyDetailsSave.php` | High
30 | File | `ActiveServices.java` | High
31 | File | `ActivityManagerService.java` | High
32 | File | `admin.php` | Medium
33 | File | `admin/?n=user&c=admin_user&a=doGetUserInfo` | High
34 | File | `admin/add-glossary.php` | High
35 | File | `admin/conf_users_edit.php` | High
36 | ... | ... | ...
There are 306 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 312 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [RU](https://vuldb.com/?country.ru)
* [CN](https://vuldb.com/?country.cn)
* [GB](https://vuldb.com/?country.gb)
* [US](https://vuldb.com/?country.us)
* ...
There are 17 more country items available. Please use our online service to access the data.
There are 18 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -169,38 +169,40 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.env` | Low
2 | File | `/admin-panel1.php` | High
3 | File | `/admin/configure.php` | High
4 | File | `/admin/doctors/view_doctor.php` | High
5 | File | `/admin/index.php?lfj=mysql&action=del` | High
6 | File | `/cgi-bin/luci/rc` | High
7 | File | `/cms/ajax.php` | High
8 | File | `/context/%2e/WEB-INF/web.xml` | High
9 | File | `/dev/dri/card1` | High
10 | File | `/domain/service/.ewell-known/caldav` | High
11 | File | `/download` | Medium
12 | File | `/file?action=download&file` | High
13 | File | `/formWlanSetup` | High
2 | File | `//` | Low
3 | File | `/admin-panel1.php` | High
4 | File | `/admin.php/admin/ulog/index.html` | High
5 | File | `/admin/configure.php` | High
6 | File | `/admin/doctors/view_doctor.php` | High
7 | File | `/admin/index.php?lfj=mysql&action=del` | High
8 | File | `/cgi-bin/uploadAccessCodePic` | High
9 | File | `/cms/ajax.php` | High
10 | File | `/context/%2e/WEB-INF/web.xml` | High
11 | File | `/dev/dri/card1` | High
12 | File | `/download` | Medium
13 | File | `/file?action=download&file` | High
14 | File | `/goform/setIPv6Status` | High
15 | File | `/images` | Low
16 | File | `/include/chart_generator.php` | High
17 | File | `/InternalPages/ExecuteTask.aspx` | High
18 | File | `/modules/profile/index.php` | High
19 | File | `/music/ajax.php` | High
20 | File | `/pandora_console/ajax.php` | High
21 | File | `/plugins/servlet/audit/resource` | High
22 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
23 | File | `/proc/<pid>/status` | High
24 | File | `/public/plugins/` | High
25 | File | `/rest/api/1.0/render` | High
26 | File | `/RestAPI` | Medium
27 | File | `/SASWebReportStudio/logonAndRender.do` | High
28 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
29 | File | `/secure/QueryComponent!Default.jspa` | High
30 | File | `/tmp` | Low
31 | ... | ... | ...
18 | File | `/music/ajax.php` | High
19 | File | `/pandora_console/ajax.php` | High
20 | File | `/principals` | Medium
21 | File | `/public/plugins/` | High
22 | File | `/SASWebReportStudio/logonAndRender.do` | High
23 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
24 | File | `/secure/QueryComponent!Default.jspa` | High
25 | File | `/system/bin/osi_bin` | High
26 | File | `/tmp` | Low
27 | File | `/TMS/admin/setting/mail/createorupdate` | High
28 | File | `/uncpath/` | Medium
29 | File | `/var/log/nginx` | High
30 | File | `/web/MCmsAction.java` | High
31 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
32 | File | `account.php` | Medium
33 | ... | ... | ...
There are 267 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 285 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

104
actors/Hancitor/README.md Normal file
View File

@ -0,0 +1,104 @@
# Hancitor - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Hancitor](https://vuldb.com/?actor.hancitor). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.hancitor](https://vuldb.com/?actor.hancitor)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Hancitor:
* [US](https://vuldb.com/?country.us)
* [RU](https://vuldb.com/?country.ru)
* [DE](https://vuldb.com/?country.de)
* ...
There are 8 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Hancitor.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [8.209.119.208](https://vuldb.com/?ip.8.209.119.208) | - | - | High
2 | [8.211.241.0](https://vuldb.com/?ip.8.211.241.0) | - | - | High
3 | [23.236.75.32](https://vuldb.com/?ip.23.236.75.32) | - | - | High
4 | ... | ... | ... | ...
There are 14 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Hancitor_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 4 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Hancitor. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `.htpasswd` | Medium
2 | File | `/../conf/config.properties` | High
3 | File | `/drivers/infiniband/core/cm.c` | High
4 | File | `/forum/away.php` | High
5 | File | `/horde/util/go.php` | High
6 | File | `/images/` | Medium
7 | File | `/inc/parser/xhtml.php` | High
8 | File | `/login` | Low
9 | File | `/mgmt/shared/authz/users/` | High
10 | File | `/modules/profile/index.php` | High
11 | File | `/objects/getImageMP4.php` | High
12 | File | `/one_church/userregister.php` | High
13 | File | `/out.php` | Medium
14 | File | `/public/plugins/` | High
15 | File | `/SASWebReportStudio/logonAndRender.do` | High
16 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
17 | File | `/secure/admin/ViewInstrumentation.jspa` | High
18 | File | `/SSOPOST/metaAlias/%realm%/idpv2` | High
19 | File | `/system/proxy` | High
20 | File | `/tmp/phpglibccheck` | High
21 | File | `/uncpath/` | Medium
22 | File | `adclick.php` | Medium
23 | File | `add.php` | Low
24 | File | `addentry.php` | Medium
25 | File | `addressbookprovider.php` | High
26 | File | `admin.jcomments.php` | High
27 | File | `admin.php` | Medium
28 | File | `admin/pageUploadCSV.php` | High
29 | File | `ajax_udf.php` | Medium
30 | File | `AppCompatCache.exe` | High
31 | File | `application.js.php` | High
32 | File | `arm/lithium-codegen-arm.cc` | High
33 | File | `authenticate.c` | High
34 | ... | ... | ...
There are 288 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://isc.sans.edu/forums/diary/Hancitor+activity+resumes+after+a+hoilday+break/26980/
* https://isc.sans.edu/forums/diary/Hancitor+tries+XLL+as+initial+malware+file/27618/
* https://isc.sans.edu/forums/diary/June+2021+Forensic+Contest+Answers+and+Analysis/27582/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -0,0 +1,54 @@
# HiddenWasp - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [HiddenWasp](https://vuldb.com/?actor.hiddenwasp). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.hiddenwasp](https://vuldb.com/?actor.hiddenwasp)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with HiddenWasp:
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of HiddenWasp.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [103.206.122.245](https://vuldb.com/?ip.103.206.122.245) | thinkdream.com | - | High
2 | [103.206.123.13](https://vuldb.com/?ip.103.206.123.13) | thinkdream.com | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _HiddenWasp_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by HiddenWasp. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `data/gbconfiguration.dat` | High
2 | File | `index.html` | Medium
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.intezer.com/blog/malware-analysis/hiddenwasp-malware-targeting-linux-systems/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,6 +1,6 @@
# IcedID - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [IcedID](https://vuldb.com/?actor.icedid). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [IcedID](https://vuldb.com/?actor.icedid). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.icedid](https://vuldb.com/?actor.icedid)
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with IcedID:
* US
* SC
* PW
* [US](https://vuldb.com/?country.us)
* [SC](https://vuldb.com/?country.sc)
* [PW](https://vuldb.com/?country.pw)
* ...
There are 12 more country items available. Please use our online service to access the data.
There are 16 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -21,23 +21,24 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 5.149.252.179 | hnh7.arenal.xyz | - | High
2 | 31.24.228.170 | 31.24.228.170.static.midphase.com | - | High
3 | 31.184.199.11 | dalesmanager.com | - | High
4 | 45.129.99.241 | 354851-vds-mamozw.gmhost.pp.ua | - | High
5 | 45.138.172.179 | - | - | High
6 | 45.147.228.198 | - | - | High
7 | 45.147.230.82 | - | - | High
8 | 45.147.230.88 | mailnode7.bulletproof-mail.biz | - | High
9 | 45.147.231.113 | - | - | High
10 | 45.153.240.135 | - | - | High
11 | ... | ... | ... | ...
1 | [5.149.252.179](https://vuldb.com/?ip.5.149.252.179) | hnh7.arenal.xyz | - | High
2 | [31.24.228.170](https://vuldb.com/?ip.31.24.228.170) | 31.24.228.170.static.midphase.com | - | High
3 | [31.184.199.11](https://vuldb.com/?ip.31.184.199.11) | dalesmanager.com | - | High
4 | [45.129.99.241](https://vuldb.com/?ip.45.129.99.241) | 354851-vds-mamozw.gmhost.pp.ua | - | High
5 | [45.138.172.179](https://vuldb.com/?ip.45.138.172.179) | - | - | High
6 | [45.147.228.198](https://vuldb.com/?ip.45.147.228.198) | - | - | High
7 | [45.147.230.82](https://vuldb.com/?ip.45.147.230.82) | - | - | High
8 | [45.147.230.88](https://vuldb.com/?ip.45.147.230.88) | mailnode7.bulletproof-mail.biz | - | High
9 | [45.147.231.113](https://vuldb.com/?ip.45.147.231.113) | - | - | High
10 | [45.153.240.135](https://vuldb.com/?ip.45.153.240.135) | - | - | High
11 | [45.153.241.115](https://vuldb.com/?ip.45.153.241.115) | - | - | High
12 | ... | ... | ... | ...
There are 42 more IOC items available. Please use our online service to access the data.
There are 46 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by IcedID. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _IcedID_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -55,31 +56,35 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.vnc/sesman_${username}_passwd` | High
2 | File | `/anony/mjpg.cgi` | High
3 | File | `/cgi-bin` | Medium
4 | File | `/cgi-bin/editBookmark` | High
5 | File | `/EXCU_SHELL` | Medium
6 | File | `/export` | Low
7 | File | `/GetSimpleCMS-3.3.15/admin/log.php` | High
8 | File | `/goform/addressNat` | High
9 | File | `/include/menu_v.inc.php` | High
10 | File | `/lms/admin.php` | High
11 | File | `/mc` | Low
12 | File | `/opt/IBM/es/lib/libffq.cryptionjni.so` | High
13 | File | `/out.php` | Medium
14 | File | `/proc/pid/syscall` | High
15 | File | `/uncpath/` | Medium
16 | File | `/var/log/pcp/configs.sh` | High
17 | File | `/webconsole/APIController` | High
18 | File | `admin/adminsignin.html` | High
19 | ... | ... | ...
2 | File | `/admin/index.php` | High
3 | File | `/anony/mjpg.cgi` | High
4 | File | `/cgi-bin` | Medium
5 | File | `/cgi-bin/editBookmark` | High
6 | File | `/etc/shadow` | Medium
7 | File | `/EXCU_SHELL` | Medium
8 | File | `/export` | Low
9 | File | `/GetSimpleCMS-3.3.15/admin/log.php` | High
10 | File | `/goform/addressNat` | High
11 | File | `/include/menu_v.inc.php` | High
12 | File | `/lms/admin.php` | High
13 | File | `/mc` | Low
14 | File | `/opt/IBM/es/lib/libffq.cryptionjni.so` | High
15 | File | `/out.php` | Medium
16 | File | `/proc/pid/syscall` | High
17 | File | `/uncpath/` | Medium
18 | File | `/var/log/pcp/configs.sh` | High
19 | File | `/webconsole/APIController` | High
20 | File | `add_comment.php` | High
21 | File | `admin.jcomments.php` | High
22 | ... | ... | ...
There are 155 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 180 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://isc.sans.edu/forums/diary/Analysis+from+March+2021+Traffic+Analysis+Quiz/27232/
* https://research.checkpoint.com/2021/melting-ice-tracking-icedid-servers-with-a-few-simple-steps/
## Literature

View File

@ -19,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [PL](https://vuldb.com/?country.pl)
* ...
There are 4 more country items available. Please use our online service to access the data.
There are 5 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -55,29 +55,31 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/admin/news/news_mod.php` | High
2 | File | `/admin/page_edit/3` | High
3 | File | `/api/notify.php` | High
3 | File | `/cgi-bin/uploadWeiXinPic` | High
4 | File | `/domain/service/.ewell-known/caldav` | High
5 | File | `/formAdvFirewall` | High
6 | File | `/mobile/SelectUsers.jsp` | High
7 | File | `/ProteinArraySignificanceTest.json` | High
8 | File | `/system/bin/osi_bin` | High
9 | File | `/usr/local/bin/mjs` | High
10 | File | `/web` | Low
11 | File | `admin/bad.php` | High
12 | File | `admin/dl_sendmail.php` | High
13 | File | `admin/pages/useredit.php` | High
14 | File | `AdminBaseController.class.php` | High
15 | File | `AlertReceiver.java` | High
16 | File | `alfresco/s/admin/admin-nodebrowser` | High
17 | File | `AndroidFuture.java` | High
18 | File | `AndroidManifest.xml` | High
19 | File | `api/info.php` | Medium
20 | File | `attach.c` | Medium
21 | File | `box_code_apple.c` | High
22 | File | `bug_actiongroup.php` | High
23 | ... | ... | ...
6 | File | `/jquery_file_upload/server/php/index.php` | High
7 | File | `/mobile/SelectUsers.jsp` | High
8 | File | `/ProteinArraySignificanceTest.json` | High
9 | File | `/ptms/classes/Users.php` | High
10 | File | `/system/bin/osi_bin` | High
11 | File | `/usr/local/bin/mjs` | High
12 | File | `admin/bad.php` | High
13 | File | `admin/dl_sendmail.php` | High
14 | File | `admin/pages/useredit.php` | High
15 | File | `AdminBaseController.class.php` | High
16 | File | `AlertReceiver.java` | High
17 | File | `alfresco/s/admin/admin-nodebrowser` | High
18 | File | `anchor/routes/posts.php` | High
19 | File | `AndroidFuture.java` | High
20 | File | `AndroidManifest.xml` | High
21 | File | `api/info.php` | Medium
22 | File | `app/admin/subnets/find_free_section_subnets.php` | High
23 | File | `attach.c` | Medium
24 | File | `blocking.cgi` | Medium
25 | ... | ... | ...
There are 194 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 205 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [VN](https://vuldb.com/?country.vn)
* [NZ](https://vuldb.com/?country.nz)
* [US](https://vuldb.com/?country.us)
* [HK](https://vuldb.com/?country.hk)
* ...
There are 3 more country items available. Please use our online service to access the data.
There are 4 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -292,7 +292,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 8 more TTP items available. Please use our online service to access the data.
There are 4 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -300,17 +300,23 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.htaccess` | Medium
2 | File | `/admin/link/link_ok.php` | High
3 | File | `/admin/upload/upload` | High
4 | File | `/api/appInternals/1.0/agent/configuration` | High
5 | File | `/api/appInternals/1.0/agent/da/pcf` | High
6 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
7 | File | `/api/appInternals/1.0/plugin/pmx` | High
8 | File | `/api/eventinstance` | High
9 | ... | ... | ...
1 | File | `.htaccess` | Medium
2 | File | `/admin/contenttemp` | High
3 | File | `/api/crontab` | Medium
4 | File | `/api/fetch` | Medium
5 | File | `/cgi-bin/uploadAccessCodePic` | High
6 | File | `/cgi-bin/uploadWeiXinPic` | High
7 | File | `/controller/Index.php` | High
8 | File | `/core/conditions/AbstractWrapper.java` | High
9 | File | `/DataHandler/HandlerEnergyType.ashx` | High
10 | File | `/factor/avx-ecm/vecarith52.c` | High
11 | File | `/goform/exeCommand` | High
12 | File | `/goform/SetLanInfo` | High
13 | File | `/goform/setWorkmode` | High
14 | File | `/mims/app/addcustomerHandler.php` | High
15 | ... | ... | ...
There are 61 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 122 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -4,6 +4,12 @@ These _indicators_ were reported, collected, and generated during the [VulDB CTI
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.invisimole](https://vuldb.com/?actor.invisimole)
## Campaigns
The following _campaigns_ are known and can be associated with InvisiMole:
* Ukraine
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with InvisiMole:
@ -13,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [ES](https://vuldb.com/?country.es)
* ...
There are 18 more country items available. Please use our online service to access the data.
There are 19 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -21,16 +27,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [46.165.230.241](https://vuldb.com/?ip.46.165.230.241) | - | - | High
2 | [46.165.231.85](https://vuldb.com/?ip.46.165.231.85) | - | - | High
3 | [46.165.241.129](https://vuldb.com/?ip.46.165.241.129) | - | - | High
1 | [45.95.11.34](https://vuldb.com/?ip.45.95.11.34) | vds2103.zevshost.net | Ukraine | High
2 | [46.165.230.241](https://vuldb.com/?ip.46.165.230.241) | - | - | High
3 | [46.165.231.85](https://vuldb.com/?ip.46.165.231.85) | - | - | High
4 | ... | ... | ... | ...
There are 8 more IOC items available. Please use our online service to access the data.
There are 10 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by InvisiMole. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _InvisiMole_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -39,7 +45,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1068 | CWE-264, CWE-266, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 9 more TTP items available. Please use our online service to access the data.
There are 8 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -79,37 +85,40 @@ ID | Type | Indicator | Confidence
30 | File | `/uncpath/` | Medium
31 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
32 | File | `/usr/local/ssl/openssl.cnf` | High
33 | File | `/var/log/nginx` | High
34 | File | `/wp-admin` | Medium
35 | File | `/xampp/guestbook-en.pl` | High
36 | File | `abook_database.php` | High
37 | File | `AccountStatus.jsp` | High
38 | File | `action/usermanager.htm` | High
39 | File | `add.php` | Low
40 | File | `add_comment.php` | High
41 | File | `admin.cgi?action=config_restore` | High
42 | File | `admin.php3` | Medium
43 | File | `admin/add-news.php` | High
44 | File | `admin/ajax/op_kandidat.php` | High
45 | File | `admin/gv_mail.php` | High
46 | File | `admin/manage-articles.php` | High
47 | File | `admin/manage-departments.php` | High
48 | File | `admin/systemOutOfBand.do` | High
49 | File | `ajax.php` | Medium
50 | File | `and/or` | Low
51 | File | `Annot.cc` | Medium
52 | File | `aoutx.h` | Low
53 | File | `app/application.cpp` | High
54 | File | `apply.cgi` | Medium
55 | ... | ... | ...
33 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
34 | File | `/var/log/nginx` | High
35 | File | `/wp-admin` | Medium
36 | File | `/xampp/guestbook-en.pl` | High
37 | File | `abook_database.php` | High
38 | File | `AccountStatus.jsp` | High
39 | File | `action/usermanager.htm` | High
40 | File | `add.php` | Low
41 | File | `add_comment.php` | High
42 | File | `admin.cgi?action=config_restore` | High
43 | File | `admin.php3` | Medium
44 | File | `admin/add-news.php` | High
45 | File | `admin/ajax/op_kandidat.php` | High
46 | File | `admin/gv_mail.php` | High
47 | File | `admin/manage-articles.php` | High
48 | File | `admin/manage-departments.php` | High
49 | File | `admin/systemOutOfBand.do` | High
50 | File | `ajax.php` | Medium
51 | File | `and/or` | Low
52 | File | `Annot.cc` | Medium
53 | File | `aoutx.h` | Low
54 | File | `app/application.cpp` | High
55 | File | `apply.cgi` | Medium
56 | ... | ... | ...
There are 483 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 484 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://cert.gov.ua/article/37829
* https://github.com/eset/malware-ioc/tree/master/invisimole
* https://github.com/eset/malware-ioc/tree/master/quarterly_reports/2020_Q4
## Literature

View File

@ -1,46 +1,46 @@
# Iron - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Iron](https://vuldb.com/?actor.iron). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Iron](https://vuldb.com/?actor.iron). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.iron](https://vuldb.com/?actor.iron)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.iron](https://vuldb.com/?actor.iron)
## Campaigns
The following campaigns are known and can be associated with Iron:
The following _campaigns_ are known and can be associated with Iron:
* XBash
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Iron:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Iron:
* ES
* [ES](https://vuldb.com/?country.es)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Iron.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Iron.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 142.44.215.177 | ns554604.ip-142-44-215.net | High
2 | 144.217.61.147 | ip147.ip-144-217-61.net | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [142.44.215.177](https://vuldb.com/?ip.142.44.215.177) | ns554604.ip-142-44-215.net | XBash | High
2 | [144.217.61.147](https://vuldb.com/?ip.144.217.61.147) | ip147.ip-144-217-61.net | XBash | High
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Iron. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Iron_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1008 | Algorithm Downgrade | High
2 | T1040 | Authentication Bypass by Capture-replay | High
3 | T1059.007 | Cross Site Scripting | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1008 | CWE-757 | Algorithm Downgrade | High
2 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
4 | ... | ... | ... | ...
There are 11 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Iron. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Iron. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -53,42 +53,42 @@ ID | Type | Indicator | Confidence
7 | File | `/cgi-bin/cgiServer.exx` | High
8 | File | `/cgi?1&5` | Medium
9 | File | `/clients/editclient.php` | High
10 | File | `/device/device=140/tab=wifi/view` | High
11 | File | `/dl/dl_sendmail.php` | High
12 | File | `/downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language` | High
13 | File | `/formStaticDHCP` | High
14 | File | `/formVirtualApp` | High
15 | File | `/formVirtualServ` | High
16 | File | `/jsonrpc` | Medium
17 | File | `/magnoliaAuthor/.magnolia/` | High
18 | File | `/master/core/PostHandler.php` | High
19 | File | `/medianet/sgcontentset.aspx` | High
20 | File | `/Nodes-Traffic.php` | High
21 | File | `/proc` | Low
22 | File | `/proc/pid/syscall` | High
23 | File | `/restapi/v1/certificates/FFM-SSLInspect` | High
24 | File | `/rss.xml` | Medium
25 | File | `/send_join` | Medium
26 | File | `/settings/profile` | High
27 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/charger_ic/oppo_mp2650.c` | High
28 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_charger.c` | High
29 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_vooc.c` | High
30 | File | `/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c` | High
31 | File | `/sysworkflow/en/neoclassic/reportTables/reportTables_Ajax` | High
32 | File | `/tools/network-trace` | High
10 | File | `/dl/dl_sendmail.php` | High
11 | File | `/downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language` | High
12 | File | `/formStaticDHCP` | High
13 | File | `/formVirtualApp` | High
14 | File | `/formVirtualServ` | High
15 | File | `/jsonrpc` | Medium
16 | File | `/magnoliaAuthor/.magnolia/` | High
17 | File | `/master/core/PostHandler.php` | High
18 | File | `/medianet/sgcontentset.aspx` | High
19 | File | `/Nodes-Traffic.php` | High
20 | File | `/proc` | Low
21 | File | `/proc/pid/syscall` | High
22 | File | `/restapi/v1/certificates/FFM-SSLInspect` | High
23 | File | `/rss.xml` | Medium
24 | File | `/send_join` | Medium
25 | File | `/settings/profile` | High
26 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/charger_ic/oppo_mp2650.c` | High
27 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_charger.c` | High
28 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_vooc.c` | High
29 | File | `/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c` | High
30 | File | `/sysworkflow/en/neoclassic/reportTables/reportTables_Ajax` | High
31 | File | `/tools/network-trace` | High
32 | File | `/user/release.html` | High
33 | ... | ... | ...
There are 277 more IOA items available. Please use our online service to access the data.
There are 283 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,32 +1,32 @@
# KRBanker - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [KRBanker](https://vuldb.com/?actor.krbanker). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [KRBanker](https://vuldb.com/?actor.krbanker). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.krbanker](https://vuldb.com/?actor.krbanker)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.krbanker](https://vuldb.com/?actor.krbanker)
## Campaigns
The following campaigns are known and can be associated with KRBanker:
The following _campaigns_ are known and can be associated with KRBanker:
* KaiXin/NEWSPOT
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of KRBanker.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of KRBanker.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 23.107.204.38 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [23.107.204.38](https://vuldb.com/?ip.23.107.204.38) | - | KaiXin/NEWSPOT | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/unit42-krbanker-targets-south-korea-through-adware-and-exploit-kits-2/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,27 +1,27 @@
# KasperAgent - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [KasperAgent](https://vuldb.com/?actor.kasperagent). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [KasperAgent](https://vuldb.com/?actor.kasperagent). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.kasperagent](https://vuldb.com/?actor.kasperagent)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.kasperagent](https://vuldb.com/?actor.kasperagent)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with KasperAgent:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with KasperAgent:
* DE
* [DE](https://vuldb.com/?country.de)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of KasperAgent.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of KasperAgent.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 148.251.135.117 | server.pogled.ba | High
2 | 195.154.110.237 | 195-154-110-237.rev.poneytelecom.eu | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [148.251.135.117](https://vuldb.com/?ip.148.251.135.117) | server.pogled.ba | - | High
2 | [195.154.110.237](https://vuldb.com/?ip.195.154.110.237) | 195-154-110-237.rev.poneytelecom.eu | - | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by KasperAgent. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by KasperAgent. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -30,14 +30,14 @@ ID | Type | Indicator | Confidence
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/unit42-badpatch/
* https://www.threatminer.org/report.php?q=KASPERAGENTMalwareCampaignresurfacesinMayElection-ThreatConnect.pdf&y=2017
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -9,6 +9,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
The following _campaigns_ are known and can be associated with Kimsuky:
* AppleSeed
* PebbleDash
## Countries
@ -16,10 +17,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
* [JP](https://vuldb.com/?country.jp)
* [MN](https://vuldb.com/?country.mn)
* ...
There are 1 more country items available. Please use our online service to access the data.
There are 4 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -27,12 +28,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [27.102.107.63](https://vuldb.com/?ip.27.102.107.63) | - | AppleSeed | High
2 | [27.102.114.89](https://vuldb.com/?ip.27.102.114.89) | - | AppleSeed | High
3 | [45.13.135.103](https://vuldb.com/?ip.45.13.135.103) | - | AppleSeed | High
4 | ... | ... | ... | ...
1 | [23.106.122.239](https://vuldb.com/?ip.23.106.122.239) | - | - | High
2 | [27.102.102.70](https://vuldb.com/?ip.27.102.102.70) | - | - | High
3 | [27.102.107.63](https://vuldb.com/?ip.27.102.107.63) | - | AppleSeed | High
4 | [27.102.112.44](https://vuldb.com/?ip.27.102.112.44) | - | - | High
5 | [27.102.112.58](https://vuldb.com/?ip.27.102.112.58) | - | - | High
6 | [27.102.114.63](https://vuldb.com/?ip.27.102.114.63) | - | - | High
7 | [27.102.114.79](https://vuldb.com/?ip.27.102.114.79) | - | - | High
8 | ... | ... | ... | ...
There are 6 more IOC items available. Please use our online service to access the data.
There are 28 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -45,7 +50,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 5 more TTP items available. Please use our online service to access the data.
There are 6 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -55,26 +60,40 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.env` | Low
2 | File | `/?/admin/snippet/add` | High
3 | File | `/bin/false` | Medium
4 | File | `/cgi-bin/webproc` | High
5 | File | `/expert_wizard.php` | High
6 | File | `/images/browserslide.jpg` | High
7 | File | `/includes/lib/get.php` | High
8 | File | `/main?cmd=invalid_browser` | High
9 | File | `/manager?action=getlogcat` | High
10 | File | `/mc` | Low
11 | File | `/rest/jpo/1.0/hierarchyConfiguration` | High
12 | File | `/SASWebReportStudio/logonAndRender.do` | High
13 | ... | ... | ...
3 | File | `/assets/something/services/AppModule.class` | High
4 | File | `/bin/false` | Medium
5 | File | `/cgi-bin/webproc` | High
6 | File | `/editsettings` | High
7 | File | `/expert_wizard.php` | High
8 | File | `/forum/away.php` | High
9 | File | `/images/browserslide.jpg` | High
10 | File | `/includes/lib/get.php` | High
11 | File | `/login` | Low
12 | File | `/main?cmd=invalid_browser` | High
13 | File | `/manager?action=getlogcat` | High
14 | File | `/mc` | Low
15 | File | `/plugins/Dashboard/Controller.php` | High
16 | File | `/public/plugins/` | High
17 | File | `/rest/jpo/1.0/hierarchyConfiguration` | High
18 | File | `/SASWebReportStudio/logonAndRender.do` | High
19 | File | `/tlogin.cgi` | Medium
20 | File | `/tmp/scfgdndf` | High
21 | File | `/uncpath/` | Medium
22 | File | `/upload` | Low
23 | File | `/usr/ucb/mail` | High
24 | ... | ... | ...
There are 99 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 201 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://asec.ahnlab.com/en/30532/
* https://blog.alyac.co.kr/2234
* https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/
* https://twitter.com/shadowchasing1/status/1500778382966939653
* https://twitter.com/souiten/status/1473862308132651011
## Literature

View File

@ -43,7 +43,7 @@ There are 42 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Kinsing_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Kinsing_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -93,11 +93,12 @@ ID | Type | Indicator | Confidence
31 | File | `application/modules/admin/views/ecommerce/products.php` | High
32 | File | `ArchiveNews.aspx` | High
33 | File | `ashnews.php/ashheadlines.php` | High
34 | File | `blog.php` | Medium
35 | File | `board.php` | Medium
36 | ... | ... | ...
34 | File | `base/ErrorHandler.php` | High
35 | File | `blog.php` | Medium
36 | File | `board.php` | Medium
37 | ... | ... | ...
There are 310 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 314 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -20,11 +20,11 @@ There are 5 more campaign items available. Please use our online service to acce
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Lazarus:
* [VN](https://vuldb.com/?country.vn)
* [US](https://vuldb.com/?country.us)
* [FR](https://vuldb.com/?country.fr)
* [IN](https://vuldb.com/?country.in)
* ...
There are 1 more country items available. Please use our online service to access the data.
There are 3 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -222,12 +222,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
2 | T1059.007 | CWE-79 | Cross Site Scripting | High
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
There are 5 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -235,18 +235,23 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.htaccess` | Medium
2 | File | `/admin/link/link_ok.php` | High
3 | File | `/alerts/alertConfigField.php` | High
4 | File | `/alerts/alertLightbox.php` | High
5 | File | `/aqpg/users/login.php` | High
6 | File | `/cwms/admin/?page=articles/view_article/` | High
7 | File | `/cwms/classes/Master.php?f=save_contact` | High
8 | File | `/download/` | Medium
9 | File | `/i/:data/ipa.plist` | High
10 | ... | ... | ...
1 | File | `.htaccess` | Medium
2 | File | `/admin/contenttemp` | High
3 | File | `/admin/maintenance_actions.php` | High
4 | File | `/api/crontab` | Medium
5 | File | `/api/fetch` | Medium
6 | File | `/audit/log/log_management.php` | High
7 | File | `/cgi-bin/uploadAccessCodePic` | High
8 | File | `/cgi-bin/uploadWeiXinPic` | High
9 | File | `/controller/Index.php` | High
10 | File | `/core/conditions/AbstractWrapper.java` | High
11 | File | `/factor/avx-ecm/vecarith52.c` | High
12 | File | `/goform/exeCommand` | High
13 | File | `/goform/SetLanInfo` | High
14 | File | `/goform/setWorkmode` | High
15 | ... | ... | ...
There are 71 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 116 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,46 +1,46 @@
# Lebanese Cedar - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Lebanese Cedar](https://vuldb.com/?actor.lebanese_cedar). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Lebanese Cedar](https://vuldb.com/?actor.lebanese_cedar). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.lebanese_cedar](https://vuldb.com/?actor.lebanese_cedar)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.lebanese_cedar](https://vuldb.com/?actor.lebanese_cedar)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Lebanese Cedar:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Lebanese Cedar:
* US
* FR
* DE
* [US](https://vuldb.com/?country.us)
* [FR](https://vuldb.com/?country.fr)
* [DE](https://vuldb.com/?country.de)
* ...
There are 1 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Lebanese Cedar.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Lebanese Cedar.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 68.65.122.109 | server172-1.web-hosting.com | High
2 | 74.208.73.149 | thevarsity.com | High
3 | 169.50.13.61 | 3d.0d.32a9.ip4.static.sl-reverse.com | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [68.65.122.109](https://vuldb.com/?ip.68.65.122.109) | server172-1.web-hosting.com | - | High
2 | [74.208.73.149](https://vuldb.com/?ip.74.208.73.149) | thevarsity.com | - | High
3 | [169.50.13.61](https://vuldb.com/?ip.169.50.13.61) | 3d.0d.32a9.ip4.static.sl-reverse.com | - | High
4 | ... | ... | ... | ...
There are 2 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Lebanese Cedar. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Lebanese Cedar_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1600 | Cryptographic Issues | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1600 | CWE-310 | Cryptographic Issues | High
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Lebanese Cedar. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Lebanese Cedar. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
@ -49,17 +49,17 @@ ID | Type | Indicator | Confidence
3 | File | `/ajax-files/postComment.php` | High
4 | ... | ... | ...
There are 24 more IOA items available. Please use our online service to access the data.
There are 24 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://vxug.fakedoma.in/archive/APTs/2021/2021.01.28/Lebanese%20Cedar%20APT.pdf
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,26 +1,26 @@
# Lilith RAT - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Lilith RAT](https://vuldb.com/?actor.lilith_rat). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Lilith RAT](https://vuldb.com/?actor.lilith_rat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.lilith_rat](https://vuldb.com/?actor.lilith_rat)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.lilith_rat](https://vuldb.com/?actor.lilith_rat)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Lilith RAT.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Lilith RAT.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 173.249.50.230 | vmi626137.contaboserver.net | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [173.249.50.230](https://vuldb.com/?ip.173.249.50.230) | vmi626137.contaboserver.net | - | High
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/594/original/Network_IOCs_list_for_coverage.txt?1625657479
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -22,31 +22,35 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [2.57.186.170](https://vuldb.com/?ip.2.57.186.170) | - | - | High
2 | [13.107.21.200](https://vuldb.com/?ip.13.107.21.200) | - | - | High
3 | [15.197.142.173](https://vuldb.com/?ip.15.197.142.173) | a4ec4c6ea1c92e2e6.awsglobalaccelerator.com | - | High
4 | [20.189.173.20](https://vuldb.com/?ip.20.189.173.20) | - | - | High
5 | [23.21.173.155](https://vuldb.com/?ip.23.21.173.155) | ec2-23-21-173-155.compute-1.amazonaws.com | - | Medium
6 | [23.21.211.162](https://vuldb.com/?ip.23.21.211.162) | ec2-23-21-211-162.compute-1.amazonaws.com | - | Medium
7 | [23.95.132.48](https://vuldb.com/?ip.23.95.132.48) | 23-95-132-48-host.colocrossing.com | - | High
8 | [23.205.105.153](https://vuldb.com/?ip.23.205.105.153) | a23-205-105-153.deploy.static.akamaitechnologies.com | - | High
9 | [23.205.105.157](https://vuldb.com/?ip.23.205.105.157) | a23-205-105-157.deploy.static.akamaitechnologies.com | - | High
10 | [23.222.5.37](https://vuldb.com/?ip.23.222.5.37) | a23-222-5-37.deploy.static.akamaitechnologies.com | - | High
11 | [31.41.46.120](https://vuldb.com/?ip.31.41.46.120) | maldova873.example.com | - | High
12 | [31.220.52.219](https://vuldb.com/?ip.31.220.52.219) | workshop.piguno.com | - | High
13 | [34.102.136.180](https://vuldb.com/?ip.34.102.136.180) | 180.136.102.34.bc.googleusercontent.com | - | Medium
14 | [35.247.234.230](https://vuldb.com/?ip.35.247.234.230) | 230.234.247.35.bc.googleusercontent.com | - | Medium
15 | [37.235.1.174](https://vuldb.com/?ip.37.235.1.174) | resolver1.freedns.zone.powered.by.virtexxa.com | - | High
16 | [37.235.1.177](https://vuldb.com/?ip.37.235.1.177) | resolver2.freedns.zone.powered.by.virtexxa.com | - | High
17 | [45.33.83.75](https://vuldb.com/?ip.45.33.83.75) | li1029-75.members.linode.com | - | High
18 | [45.128.184.132](https://vuldb.com/?ip.45.128.184.132) | vds107519.mgn-host.ru | - | High
19 | [45.147.229.85](https://vuldb.com/?ip.45.147.229.85) | - | - | High
20 | [45.154.253.150](https://vuldb.com/?ip.45.154.253.150) | shared04.cust05.proxy.is | - | High
21 | [45.154.253.152](https://vuldb.com/?ip.45.154.253.152) | shared06.cust05.proxy.is | - | High
22 | [50.16.216.118](https://vuldb.com/?ip.50.16.216.118) | ec2-50-16-216-118.compute-1.amazonaws.com | - | Medium
23 | [50.19.92.227](https://vuldb.com/?ip.50.19.92.227) | ec2-50-19-92-227.compute-1.amazonaws.com | - | Medium
24 | ... | ... | ... | ...
2 | [3.220.57.224](https://vuldb.com/?ip.3.220.57.224) | ec2-3-220-57-224.compute-1.amazonaws.com | - | Medium
3 | [3.232.242.170](https://vuldb.com/?ip.3.232.242.170) | ec2-3-232-242-170.compute-1.amazonaws.com | - | Medium
4 | [13.107.21.200](https://vuldb.com/?ip.13.107.21.200) | - | - | High
5 | [15.197.142.173](https://vuldb.com/?ip.15.197.142.173) | a4ec4c6ea1c92e2e6.awsglobalaccelerator.com | - | High
6 | [18.116.152.12](https://vuldb.com/?ip.18.116.152.12) | ec2-18-116-152-12.us-east-2.compute.amazonaws.com | - | Medium
7 | [18.188.18.34](https://vuldb.com/?ip.18.188.18.34) | ec2-18-188-18-34.us-east-2.compute.amazonaws.com | - | Medium
8 | [20.189.173.20](https://vuldb.com/?ip.20.189.173.20) | - | - | High
9 | [23.21.173.155](https://vuldb.com/?ip.23.21.173.155) | ec2-23-21-173-155.compute-1.amazonaws.com | - | Medium
10 | [23.21.211.162](https://vuldb.com/?ip.23.21.211.162) | ec2-23-21-211-162.compute-1.amazonaws.com | - | Medium
11 | [23.95.132.48](https://vuldb.com/?ip.23.95.132.48) | 23-95-132-48-host.colocrossing.com | - | High
12 | [23.205.105.153](https://vuldb.com/?ip.23.205.105.153) | a23-205-105-153.deploy.static.akamaitechnologies.com | - | High
13 | [23.205.105.157](https://vuldb.com/?ip.23.205.105.157) | a23-205-105-157.deploy.static.akamaitechnologies.com | - | High
14 | [23.222.5.37](https://vuldb.com/?ip.23.222.5.37) | a23-222-5-37.deploy.static.akamaitechnologies.com | - | High
15 | [31.41.46.120](https://vuldb.com/?ip.31.41.46.120) | maldova873.example.com | - | High
16 | [31.220.52.219](https://vuldb.com/?ip.31.220.52.219) | workshop.piguno.com | - | High
17 | [34.98.99.30](https://vuldb.com/?ip.34.98.99.30) | 30.99.98.34.bc.googleusercontent.com | - | Medium
18 | [34.102.136.180](https://vuldb.com/?ip.34.102.136.180) | 180.136.102.34.bc.googleusercontent.com | - | Medium
19 | [34.117.168.233](https://vuldb.com/?ip.34.117.168.233) | 233.168.117.34.bc.googleusercontent.com | - | Medium
20 | [35.186.238.101](https://vuldb.com/?ip.35.186.238.101) | 101.238.186.35.bc.googleusercontent.com | - | Medium
21 | [35.247.234.230](https://vuldb.com/?ip.35.247.234.230) | 230.234.247.35.bc.googleusercontent.com | - | Medium
22 | [37.235.1.174](https://vuldb.com/?ip.37.235.1.174) | resolver1.freedns.zone.powered.by.virtexxa.com | - | High
23 | [37.235.1.177](https://vuldb.com/?ip.37.235.1.177) | resolver2.freedns.zone.powered.by.virtexxa.com | - | High
24 | [45.33.83.75](https://vuldb.com/?ip.45.33.83.75) | li1029-75.members.linode.com | - | High
25 | [45.128.184.132](https://vuldb.com/?ip.45.128.184.132) | vds107519.mgn-host.ru | - | High
26 | [45.147.229.85](https://vuldb.com/?ip.45.147.229.85) | - | - | High
27 | [45.154.253.150](https://vuldb.com/?ip.45.154.253.150) | shared04.cust05.proxy.is | - | High
28 | ... | ... | ... | ...
There are 91 more IOC items available. Please use our online service to access the data.
There are 109 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -59,7 +63,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 5 more TTP items available. Please use our online service to access the data.
There are 6 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -72,33 +76,33 @@ ID | Type | Indicator | Confidence
3 | File | `/car.php` | Medium
4 | File | `/CMD_ACCOUNT_ADMIN` | High
5 | File | `/config/getuser` | High
6 | File | `/context/%2e/WEB-INF/web.xml` | High
7 | File | `/core/admin/categories.php` | High
8 | File | `/dashboards/#` | High
9 | File | `/etc/controller-agent/agent.conf` | High
10 | File | `/etc/postfix/sender_login` | High
11 | File | `/etc/sudoers` | Medium
12 | File | `/etc/tomcat8/Catalina/attack` | High
13 | File | `/filemanager/php/connector.php` | High
14 | File | `/forum/away.php` | High
15 | File | `/fudforum/adm/hlplist.php` | High
16 | File | `/GponForm/fsetup_Form` | High
17 | File | `/log_download.cgi` | High
18 | File | `/modules/profile/index.php` | High
19 | File | `/MTFWU` | Low
20 | File | `/out.php` | Medium
21 | File | `/public/plugins/` | High
22 | File | `/s/` | Low
23 | File | `/secure/QueryComponent!Default.jspa` | High
24 | File | `/server-info` | Medium
25 | File | `/tmp` | Low
26 | File | `/tmp/app/.env` | High
27 | File | `/tmp/kamailio_ctl` | High
28 | File | `/tmp/kamailio_fifo` | High
29 | File | `/uncpath/` | Medium
30 | File | `/updown/upload.cgi` | High
31 | File | `/usr/bin/at` | Medium
32 | File | `/usr/bin/pkexec` | High
6 | File | `/core/admin/categories.php` | High
7 | File | `/dashboards/#` | High
8 | File | `/etc/controller-agent/agent.conf` | High
9 | File | `/etc/postfix/sender_login` | High
10 | File | `/etc/sudoers` | Medium
11 | File | `/etc/tomcat8/Catalina/attack` | High
12 | File | `/filemanager/php/connector.php` | High
13 | File | `/forum/away.php` | High
14 | File | `/fudforum/adm/hlplist.php` | High
15 | File | `/GponForm/fsetup_Form` | High
16 | File | `/log_download.cgi` | High
17 | File | `/modules/profile/index.php` | High
18 | File | `/MTFWU` | Low
19 | File | `/out.php` | Medium
20 | File | `/public/plugins/` | High
21 | File | `/s/` | Low
22 | File | `/secure/QueryComponent!Default.jspa` | High
23 | File | `/server-info` | Medium
24 | File | `/tmp` | Low
25 | File | `/tmp/app/.env` | High
26 | File | `/tmp/kamailio_ctl` | High
27 | File | `/tmp/kamailio_fifo` | High
28 | File | `/uncpath/` | Medium
29 | File | `/updown/upload.cgi` | High
30 | File | `/usr/bin/pkexec` | High
31 | File | `/way4acs/enroll` | High
32 | File | `/WEB-INF/web.xml` | High
33 | ... | ... | ...
There are 282 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
@ -119,6 +123,7 @@ The following list contains _external sources_ which discuss the actor and the a
* https://blog.talosintelligence.com/2022/01/threat-roundup-0121-0128.html
* https://blog.talosintelligence.com/2022/02/threat-roundup-0204-0211.html
* https://blog.talosintelligence.com/2022/03/threat-roundup-0304-0311.html
* https://blog.talosintelligence.com/2022/03/threat-roundup-0311-0318.html
* https://vxug.fakedoma.in/archive/APTs/2021/2021.01.06(1)/LokiBot%20Infection%20Chain.pdf
## Literature

View File

@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [IT](https://vuldb.com/?country.it)
* ...
There are 14 more country items available. Please use our online service to access the data.
There are 13 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -60,26 +60,26 @@ ID | Type | Indicator | Confidence
7 | File | `/cloud_config/router_post/check_reg_verify_code` | High
8 | File | `/context/%2e/WEB-INF/web.xml` | High
9 | File | `/data-service/users/` | High
10 | File | `/Hospital-Management-System-master/func.php` | High
11 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
12 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
13 | File | `/js/app.js` | Medium
14 | File | `/ManageRoute/postRoute` | High
15 | File | `/message-bus/_diagnostics` | High
16 | File | `/ms/cms/content/list.do` | High
17 | File | `/plugin/jcapture/applet.php` | High
18 | File | `/preferences/tags` | High
19 | File | `/proc/<pid>/status` | High
20 | File | `/public/plugins/` | High
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
22 | File | `/secure/EditSubscription.jspa` | High
23 | File | `/secure/QueryComponent!Default.jspa` | High
24 | File | `/tmp` | Low
25 | File | `/uncpath/` | Medium
26 | File | `1.2.2.pl4` | Medium
10 | File | `/etc/config/rpcd` | High
11 | File | `/Hospital-Management-System-master/func.php` | High
12 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
13 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
14 | File | `/js/app.js` | Medium
15 | File | `/ManageRoute/postRoute` | High
16 | File | `/message-bus/_diagnostics` | High
17 | File | `/ms/cms/content/list.do` | High
18 | File | `/plugin/jcapture/applet.php` | High
19 | File | `/preferences/tags` | High
20 | File | `/proc/<pid>/status` | High
21 | File | `/public/plugins/` | High
22 | File | `/rest-service-fecru/server-v1` | High
23 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
24 | File | `/secure/EditSubscription.jspa` | High
25 | File | `/secure/QueryComponent!Default.jspa` | High
26 | File | `/tmp` | Low
27 | ... | ... | ...
There are 227 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 225 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,6 +1,6 @@
# MargulasRAT - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [MargulasRAT](https://vuldb.com/?actor.margulasrat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [MargulasRAT](https://vuldb.com/?actor.margulasrat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.margulasrat](https://vuldb.com/?actor.margulasrat)
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with MargulasRAT:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
@ -16,11 +16,11 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 149.248.52.61 | 149.248.52.61.vultr.com | - | Medium
1 | [149.248.52.61](https://vuldb.com/?ip.149.248.52.61) | 149.248.52.61.vultr.com | - | Medium
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by MargulasRAT. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _MargulasRAT_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -1,6 +1,6 @@
# Mars Stealer - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Mars Stealer](https://vuldb.com/?actor.mars_stealer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Mars Stealer](https://vuldb.com/?actor.mars_stealer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.mars_stealer](https://vuldb.com/?actor.mars_stealer)
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Mars Stealer:
* US
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
@ -16,11 +16,12 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 159.65.9.223 | - | - | High
1 | [5.63.155.126](https://vuldb.com/?ip.5.63.155.126) | 5-63-155-126.cloudvps.regruhosting.ru | - | High
2 | [159.65.9.223](https://vuldb.com/?ip.159.65.9.223) | - | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Mars Stealer. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Mars Stealer_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -44,6 +45,7 @@ There are 2 more IOA items available (file, library, argument, input value, patt
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://gist.github.com/viriback/362a91ed9601ba906d8a17c8102a68bb
* https://isc.sans.edu/forums/diary/Arkei+Variants+From+Vidar+to+Mars+Stealer/28468/
## Literature

View File

@ -0,0 +1,45 @@
# Mining Multitool - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Mining Multitool](https://vuldb.com/?actor.mining_multitool). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.mining_multitool](https://vuldb.com/?actor.mining_multitool)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Mining Multitool:
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Mining Multitool.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [185.128.43.62](https://vuldb.com/?ip.185.128.43.62) | - | - | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Mining Multitool. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `inc/config.php` | High
2 | Argument | `basePath` | Medium
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://securelist.com/a-mining-multitool/86950/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

57
actors/Miori/README.md Normal file
View File

@ -0,0 +1,57 @@
# Miori - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Miori](https://vuldb.com/?actor.miori). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.miori](https://vuldb.com/?actor.miori)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Miori:
* [DE](https://vuldb.com/?country.de)
* [US](https://vuldb.com/?country.us)
* [KR](https://vuldb.com/?country.kr)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Miori.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [94.177.226.227](https://vuldb.com/?ip.94.177.226.227) | host227-226-177-94.static.arubacloud.de | - | High
2 | [144.202.49.126](https://vuldb.com/?ip.144.202.49.126) | 144.202.49.126.vultrusercontent.com | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Miori_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-284 | Execution with Unnecessary Privileges | High
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Miori. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `Advanced_ASUSDDNS_Content.asp` | High
2 | File | `data/gbconfiguration.dat` | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blog.trendmicro.com/trendlabs-security-intelligence/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -8,6 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
The following _campaigns_ are known and can be associated with Mirai:
* CVE-2020-9054
* DDoS Ukraine
* Log4Shell
@ -20,7 +21,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
* [CN](https://vuldb.com/?country.cn)
* ...
There are 7 more country items available. Please use our online service to access the data.
There are 8 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -33,7 +34,8 @@ ID | IP address | Hostname | Campaign | Confidence
3 | [34.80.131.135](https://vuldb.com/?ip.34.80.131.135) | 135.131.80.34.bc.googleusercontent.com | - | Medium
4 | [45.61.136.130](https://vuldb.com/?ip.45.61.136.130) | - | DDoS Ukraine | High
5 | [45.61.186.13](https://vuldb.com/?ip.45.61.186.13) | - | DDoS Ukraine | High
6 | ... | ... | ... | ...
6 | [45.88.181.46](https://vuldb.com/?ip.45.88.181.46) | pelko.incifios.org.uk | - | High
7 | ... | ... | ... | ...
There are 22 more IOC items available. Please use our online service to access the data.
@ -66,14 +68,14 @@ ID | Type | Indicator | Confidence
8 | File | `/rest/api/2/search` | High
9 | File | `/rom-0` | Low
10 | File | `/thruk/#cgi-bin/extinfo.cgi?type=2` | High
11 | File | `/uncpath/` | Medium
12 | File | `/usr/sbin/httpd` | High
13 | File | `adclick.php` | Medium
14 | File | `admin.php` | Medium
15 | File | `admin/scripts/FileUploader/php.php` | High
11 | File | `/tmp` | Low
12 | File | `/uncpath/` | Medium
13 | File | `/usr/sbin/httpd` | High
14 | File | `adclick.php` | Medium
15 | File | `admin.php` | Medium
16 | ... | ... | ...
There are 129 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 132 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -86,6 +88,7 @@ The following list contains _external sources_ which discuss the actor and the a
* https://blog.netlab.360.com/wei-xie-kuai-xun-log4jlou-dong-yi-jing-bei-yong-lai-zu-jian-botnet-zhen-dui-linuxshe-bei/
* https://blog.netlab.360.com/wo-men-kan-dao-de-wu-ke-lan-bei-ddosgong-ji-xi-jie/
* https://blogs.infoblox.com/cyber-threat-intelligence/cyber-campaign-briefs/log4j-indicators-of-compromise-to-date/
* https://isc.sans.edu/forums/diary/Zyxel+Network+Storage+Devices+Hunted+By+Mirai+Variant/28324/
* https://urlhaus.abuse.ch/host/185.243.56.167/
## Literature

View File

@ -45,13 +45,14 @@ ID | IP address | Hostname | Campaign | Confidence
11 | [46.166.129.159](https://vuldb.com/?ip.46.166.129.159) | gcn.warrirge.com | - | High
12 | [66.219.22.235](https://vuldb.com/?ip.66.219.22.235) | core96.hostingmadeeasy.com | - | High
13 | [78.129.139.134](https://vuldb.com/?ip.78.129.139.134) | der134.creditloanlenders.com | - | High
14 | ... | ... | ... | ...
14 | [78.129.139.147](https://vuldb.com/?ip.78.129.139.147) | - | - | High
15 | ... | ... | ... | ...
There are 50 more IOC items available. Please use our online service to access the data.
There are 54 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _MuddyWater_. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _MuddyWater_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -82,21 +83,20 @@ ID | Type | Indicator | Confidence
12 | File | `/hdf5/src/H5T.c` | High
13 | File | `/include/chart_generator.php` | High
14 | File | `/jerry-core/parser/js/js-scanner-util.c` | High
15 | File | `/modules/profile/index.php` | High
16 | File | `/music/ajax.php` | High
17 | File | `/opensis/functions/GetStuListFnc.php` | High
18 | File | `/owa/auth/logon.aspx` | High
19 | File | `/post/editing` | High
20 | File | `/product.php` | Medium
21 | File | `/product_list.php` | High
22 | File | `/public/plugins/` | High
23 | File | `/RestAPI` | Medium
24 | File | `/rsms/` | Low
25 | File | `/secure/admin/ViewInstrumentation.jspa` | High
26 | File | `/userRpm/PingIframeRpm.htm` | High
27 | ... | ... | ...
15 | File | `/music/ajax.php` | High
16 | File | `/opensis/functions/GetStuListFnc.php` | High
17 | File | `/post/editing` | High
18 | File | `/product.php` | Medium
19 | File | `/product_list.php` | High
20 | File | `/ptms/classes/Users.php` | High
21 | File | `/public/plugins/` | High
22 | File | `/RestAPI` | Medium
23 | File | `/rsms/` | Low
24 | File | `/secure/admin/ViewInstrumentation.jspa` | High
25 | File | `/userRpm/PingIframeRpm.htm` | High
26 | ... | ... | ...
There are 223 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 216 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -104,9 +104,11 @@ The following list contains _external sources_ which discuss the actor and the a
* https://blog.talosintelligence.com/2019/05/recent-muddywater-associated-blackwater.html
* https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html
* https://blog.talosintelligence.com/2022/03/iranian-supergroup-muddywater.html
* https://reaqta.com/2017/11/muddywater-apt-targeting-middle-east/
* https://securelist.com/muddywater/88059/
* https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/seedworm-espionage-group
* https://twitter.com/ShadowChasing1/status/1481621068255137794
* https://unit42.paloaltonetworks.com/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/
* https://www.cisa.gov/uscert/ncas/alerts/aa22-055a
* https://www.clearskysec.com/wp-content/uploads/2019/06/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdf

View File

@ -49,7 +49,7 @@ There are 56 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Muhstik. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Muhstik_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -58,7 +58,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 7 more TTP items available. Please use our online service to access the data.
There are 6 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -89,7 +89,7 @@ ID | Type | Indicator | Confidence
21 | File | `adm1n/admin_config.php` | High
22 | ... | ... | ...
There are 184 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 187 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -9,14 +9,18 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
The following _campaigns_ are known and can be associated with Mustang Panda:
* Diànxùn
* Hodur
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Mustang Panda:
* [DE](https://vuldb.com/?country.de)
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
* ...
There are 1 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
@ -26,12 +30,15 @@ ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [42.99.117.95](https://vuldb.com/?ip.42.99.117.95) | - | - | High
2 | [43.254.217.67](https://vuldb.com/?ip.43.254.217.67) | - | - | High
3 | [45.32.50.150](https://vuldb.com/?ip.45.32.50.150) | 45.32.50.150.vultr.com | - | Medium
4 | [45.77.184.12](https://vuldb.com/?ip.45.77.184.12) | comm.phiu.pw | - | High
5 | [45.248.87.14](https://vuldb.com/?ip.45.248.87.14) | - | - | High
6 | ... | ... | ... | ...
3 | [43.254.218.42](https://vuldb.com/?ip.43.254.218.42) | - | Hodur | High
4 | [45.32.50.150](https://vuldb.com/?ip.45.32.50.150) | 45.32.50.150.vultr.com | - | Medium
5 | [45.77.184.12](https://vuldb.com/?ip.45.77.184.12) | comm.phiu.pw | - | High
6 | [45.131.179.179](https://vuldb.com/?ip.45.131.179.179) | - | Hodur | High
7 | [45.154.14.235](https://vuldb.com/?ip.45.154.14.235) | - | Hodur | High
8 | [45.248.87.14](https://vuldb.com/?ip.45.248.87.14) | - | - | High
9 | ... | ... | ... | ...
There are 22 more IOC items available. Please use our online service to access the data.
There are 32 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -65,7 +72,7 @@ ID | Type | Indicator | Confidence
11 | File | `/webtools/control/httpService` | High
12 | ... | ... | ...
There are 89 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 93 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -75,6 +82,7 @@ The following list contains _external sources_ which discuss the actor and the a
* https://twitter.com/ESETresearch/status/1400165861973966854
* https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
* https://www.mcafee.com/enterprise/en-us/assets/reports/rp-operation-dianxun.pdf
* https://www.welivesecurity.com/2022/03/23/mustang-panda-hodur-old-tricks-new-korplug-variant/
## Literature

110
actors/Mylobot/README.md Normal file
View File

@ -0,0 +1,110 @@
# Mylobot - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Mylobot](https://vuldb.com/?actor.mylobot). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.mylobot](https://vuldb.com/?actor.mylobot)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Mylobot:
* [US](https://vuldb.com/?country.us)
* [NL](https://vuldb.com/?country.nl)
* [RU](https://vuldb.com/?country.ru)
* ...
There are 28 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Mylobot.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [46.166.173.180](https://vuldb.com/?ip.46.166.173.180) | - | - | High
2 | [70.36.107.38](https://vuldb.com/?ip.70.36.107.38) | - | - | High
3 | [70.36.107.39](https://vuldb.com/?ip.70.36.107.39) | - | - | High
4 | [74.222.19.63](https://vuldb.com/?ip.74.222.19.63) | - | - | High
5 | ... | ... | ... | ...
There are 18 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Mylobot_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 6 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Mylobot. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `.procmailrc` | Medium
2 | File | `/../conf/config.properties` | High
3 | File | `/addnews.html` | High
4 | File | `/admin/` | Low
5 | File | `/api/2.0/rest/aggregator/xml` | High
6 | File | `/api/blade-log/api/list` | High
7 | File | `/cgi-bin/webviewer_login_page` | High
8 | File | `/Config/SaveUploadedHotspotLogoFile` | High
9 | File | `/core/vendor/meenie/javascript-packer/example-inline.php` | High
10 | File | `/etc/config/rpcd` | High
11 | File | `/exponent_constants.php` | High
12 | File | `/forum/away.php` | High
13 | File | `/goform/formLogin` | High
14 | File | `/hub/api/user` | High
15 | File | `/mfaslmf/nolicense` | High
16 | File | `/opt/bin/cli` | Medium
17 | File | `/plain` | Low
18 | File | `/proc` | Low
19 | File | `/proc/ioports` | High
20 | File | `/products/details.asp` | High
21 | File | `/public/plugins/` | High
22 | File | `/RestAPI` | Medium
23 | File | `/tmp` | Low
24 | File | `/uncpath/` | Medium
25 | File | `/User/saveUser` | High
26 | File | `/ViewUserHover.jspa` | High
27 | File | `/WEB-INF/web.xml` | High
28 | File | `/wp-admin/admin-ajax.php` | High
29 | File | `/wp-json/wc/v3/webhooks` | High
30 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
31 | File | `abc-pcie.c` | Medium
32 | File | `accountmanagement.php` | High
33 | File | `addentry.php` | Medium
34 | File | `adherents/subscription/info.php` | High
35 | File | `admin.joomlaflashfun.php` | High
36 | File | `admin.joomlaradiov5.php` | High
37 | File | `admin.panoramic.php` | High
38 | File | `admin.php` | Medium
39 | File | `admin/change-password.php` | High
40 | File | `admin/index.php` | High
41 | ... | ... | ...
There are 358 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://ioc.hatenablog.com/entry/2018/11/14/000000
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -1,88 +1,115 @@
# NSA - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NSA](https://vuldb.com/?actor.nsa). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NSA](https://vuldb.com/?actor.nsa). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.nsa](https://vuldb.com/?actor.nsa)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.nsa](https://vuldb.com/?actor.nsa)
## Campaigns
The following campaigns are known and can be associated with NSA:
The following _campaigns_ are known and can be associated with NSA:
* BOUNDLESS INFORMANT
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with NSA:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with NSA:
* US
* CN
* IR
* [US](https://vuldb.com/?country.us)
* [GB](https://vuldb.com/?country.gb)
* [CN](https://vuldb.com/?country.cn)
* ...
There are 12 more country items available. Please use our online service to access the data.
There are 25 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of NSA.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of NSA.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 31.6.17.94 | - | High
2 | 37.72.168.84 | 84.168.72.37.static.swiftway.net | High
3 | 37.130.229.100 | uk.server | High
4 | 37.130.229.101 | uk.server | High
5 | 37.220.10.28 | h37-220-10-28.host.redstation.co.uk | High
6 | 50.115.118.140 | sfaaa.net | High
7 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [31.6.17.94](https://vuldb.com/?ip.31.6.17.94) | - | BOUNDLESS INFORMANT | High
2 | [37.72.168.84](https://vuldb.com/?ip.37.72.168.84) | 84.168.72.37.static.swiftway.net | BOUNDLESS INFORMANT | High
3 | [37.130.229.100](https://vuldb.com/?ip.37.130.229.100) | uk.server | BOUNDLESS INFORMANT | High
4 | [37.130.229.101](https://vuldb.com/?ip.37.130.229.101) | uk.server | BOUNDLESS INFORMANT | High
5 | [37.220.10.28](https://vuldb.com/?ip.37.220.10.28) | h37-220-10-28.host.redstation.co.uk | BOUNDLESS INFORMANT | High
6 | [50.115.118.140](https://vuldb.com/?ip.50.115.118.140) | sfaaa.net | BOUNDLESS INFORMANT | High
7 | ... | ... | ... | ...
There are 25 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by NSA. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _NSA_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ...
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 2 more TTP items available. Please use our online service to access the data.
There are 4 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by NSA. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by NSA. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.ssh/authorized_keys2` | High
2 | File | `/anony/mjpg.cgi` | High
3 | File | `/filemanager/upload.php` | High
4 | File | `/html/device-id` | High
5 | File | `/uncpath/` | Medium
6 | File | `actbar3.ocx` | Medium
7 | File | `adclick.php` | Medium
8 | File | `admin.php` | Medium
9 | File | `admin/users/add` | High
10 | File | `administrator/components/com_media/helpers/media.php` | High
11 | File | `ajax-actions.php` | High
12 | File | `ajaxRequest/methodCall.do` | High
13 | File | `apply.cgi` | Medium
14 | File | `BKESimmgr.exe` | High
15 | ... | ... | ...
1 | File | `.procmailrc` | Medium
2 | File | `/.ssh/authorized_keys2` | High
3 | File | `/admin-ajax.php?action=eps_redirect_save` | High
4 | File | `/anony/mjpg.cgi` | High
5 | File | `/auth` | Low
6 | File | `/dashboard/view-chair-list.php` | High
7 | File | `/etc/hosts` | Medium
8 | File | `/filemanager/upload.php` | High
9 | File | `/GponForm/device_Form?script/` | High
10 | File | `/GponForm/fsetup_Form` | High
11 | File | `/GponForm/usb_restore_Form?script/` | High
12 | File | `/html/device-id` | High
13 | File | `/includes/decorators/global-translations.jsp` | High
14 | File | `/index.php` | Medium
15 | File | `/product_list.php` | High
16 | File | `/secure/QueryComponent!Default.jspa` | High
17 | File | `/see_more_details.php` | High
18 | File | `/server-status` | High
19 | File | `/setSystemAdmin` | High
20 | File | `/uncpath/` | Medium
21 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
22 | File | `/WEB-INF/web.xml` | High
23 | File | `actbar3.ocx` | Medium
24 | File | `adclick.php` | Medium
25 | File | `addentry.php` | Medium
26 | File | `admin.php` | Medium
27 | File | `admin/executar_login.php` | High
28 | File | `admin/mcart_xls_import.php` | High
29 | File | `admin/setting.php` | High
30 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
31 | File | `admin/users/add` | High
32 | File | `administrator/components/com_media/helpers/media.php` | High
33 | File | `admin_ranks.php` | High
34 | File | `ajax-actions.php` | High
35 | File | `ajaxRequest/methodCall.do` | High
36 | File | `alipay/alipayapi.php` | High
37 | File | `apcupsd.exe` | Medium
38 | File | `apply.cgi` | Medium
39 | File | `auth.inc.php` | Medium
40 | File | `auth.py` | Low
41 | File | `auth2-gss.c` | Medium
42 | ... | ... | ...
There are 118 more IOA items available. Please use our online service to access the data.
There are 367 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://medium.com/@danchodanchev/how-the-nsa-utilized-iranian-cyber-proxies-to-participate-in-the-boundless-informant-program-e82045d44848
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -15,6 +15,7 @@ The following _campaigns_ are known and can be associated with Naikon:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Naikon:
* [US](https://vuldb.com/?country.us)
* [FR](https://vuldb.com/?country.fr)
* [CN](https://vuldb.com/?country.cn)
## IOC - Indicator of Compromise
@ -51,18 +52,20 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `%windir%\Internet Logs\` | High
2 | File | `/crypto_keyfile.bin` | High
3 | File | `/show_news.php` | High
4 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
5 | File | `/squashfs-root/www/HNAP1/control/SetWizardConfig.php` | High
6 | File | `500page.jsp` | Medium
7 | File | `admin/admin_process.php` | High
8 | File | `admin/user_activate_submit.php` | High
9 | File | `browse-scategory.php` | High
10 | File | `classes/Visualizer/Gutenberg/Block.php` | High
11 | ... | ... | ...
2 | File | `/admin.php/admin/website/data.html` | High
3 | File | `/aqpg/users/login.php` | High
4 | File | `/crypto_keyfile.bin` | High
5 | File | `/cwms/admin/?page=articles/view_article/` | High
6 | File | `/cwms/classes/Master.php?f=save_contact` | High
7 | File | `/mims/app/addcustomerHandler.php` | High
8 | File | `/one_church/userregister.php` | High
9 | File | `/show_news.php` | High
10 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
11 | File | `/squashfs-root/www/HNAP1/control/SetWizardConfig.php` | High
12 | File | `500page.jsp` | Medium
13 | ... | ... | ...
There are 83 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 106 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,6 +1,6 @@
# Necro - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Necro](https://vuldb.com/?actor.necro). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Necro](https://vuldb.com/?actor.necro). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.necro](https://vuldb.com/?actor.necro)
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Necro:
* US
* RU
* SI
* [US](https://vuldb.com/?country.us)
* [RU](https://vuldb.com/?country.ru)
* [SI](https://vuldb.com/?country.si)
* ...
There are 7 more country items available. Please use our online service to access the data.
@ -21,23 +21,22 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 45.145.185.83 | - | - | High
2 | 45.145.185.229 | - | - | High
3 | 52.3.115.71 | ec2-52-3-115-71.compute-1.amazonaws.com | - | Medium
4 | 54.161.239.214 | ec2-54-161-239-214.compute-1.amazonaws.com | - | Medium
1 | [45.145.185.83](https://vuldb.com/?ip.45.145.185.83) | - | - | High
2 | [45.145.185.229](https://vuldb.com/?ip.45.145.185.229) | - | - | High
3 | [52.3.115.71](https://vuldb.com/?ip.52.3.115.71) | ec2-52-3-115-71.compute-1.amazonaws.com | - | Medium
4 | [54.161.239.214](https://vuldb.com/?ip.54.161.239.214) | ec2-54-161-239-214.compute-1.amazonaws.com | - | Medium
5 | ... | ... | ... | ...
There are 16 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Necro. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Necro_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
3 | T1499 | CWE-404 | Resource Consumption | High
## IOA - Indicator of Attack

View File

@ -1,65 +1,100 @@
# Nemucod - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Nemucod](https://vuldb.com/?actor.nemucod). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Nemucod](https://vuldb.com/?actor.nemucod). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.nemucod](https://vuldb.com/?actor.nemucod)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.nemucod](https://vuldb.com/?actor.nemucod)
## Countries
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Nemucod:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Nemucod:
* US
* RU
* CN
* [US](https://vuldb.com/?country.us)
* [CN](https://vuldb.com/?country.cn)
* [GB](https://vuldb.com/?country.gb)
* ...
There are 1 more country items available. Please use our online service to access the data.
There are 25 more country items available. Please use our online service to access the data.
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Nemucod.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Nemucod.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 185.130.104.156 | . | High
2 | 185.130.104.178 | mail.instadavance.com | High
3 | 185.159.82.11 | customer.clientshostname.com | High
4 | ... | ... | ...
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [185.130.104.156](https://vuldb.com/?ip.185.130.104.156) | . | - | High
2 | [185.130.104.178](https://vuldb.com/?ip.185.130.104.178) | mail.instadavance.com | - | High
3 | [185.159.82.11](https://vuldb.com/?ip.185.159.82.11) | customer.clientshostname.com | - | High
4 | ... | ... | ... | ...
There are 2 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Nemucod. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Nemucod_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Description | Confidence
-- | --------- | ----------- | ----------
1 | T1059.007 | Cross Site Scripting | High
2 | T1068 | Execution with Unnecessary Privileges | High
3 | T1211 | 7PK Security Features | High
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-266, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 5 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Nemucod. This data is unique as it uses our predictive model for actor profiling.
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Nemucod. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/anony/mjpg.cgi` | High
2 | File | `/plain` | Low
3 | File | `awstats.pl` | Medium
4 | ... | ... | ...
1 | File | `/?module=users&section=cpanel&page=list` | High
2 | File | `/admin/powerline` | High
3 | File | `/admin/syslog` | High
4 | File | `/api/upload` | Medium
5 | File | `/cgi-bin` | Medium
6 | File | `/cgi-bin/kerbynet` | High
7 | File | `/context/%2e/WEB-INF/web.xml` | High
8 | File | `/dcim/sites/add/` | High
9 | File | `/EXCU_SHELL` | Medium
10 | File | `/forum/away.php` | High
11 | File | `/fudforum/adm/hlplist.php` | High
12 | File | `/login` | Low
13 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
14 | File | `/monitoring` | Medium
15 | File | `/new` | Low
16 | File | `/proc/<pid>/status` | High
17 | File | `/public/login.htm` | High
18 | File | `/public/plugins/` | High
19 | File | `/rom` | Low
20 | File | `/scripts/killpvhost` | High
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
22 | File | `/secure/QueryComponent!Default.jspa` | High
23 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
24 | File | `/tmp` | Low
25 | File | `/tmp/redis.ds` | High
26 | File | `/uncpath/` | Medium
27 | File | `/ViewUserHover.jspa` | High
28 | File | `/wp-admin` | Medium
29 | File | `/wp-json/wc/v3/webhooks` | High
30 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
31 | File | `AccountManagerService.java` | High
32 | File | `actions/CompanyDetailsSave.php` | High
33 | File | `ActiveServices.java` | High
34 | File | `ActivityManagerService.java` | High
35 | File | `addlink.php` | Medium
36 | ... | ... | ...
There are 14 more IOA items available. Please use our online service to access the data.
There are 313 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://unit42.paloaltonetworks.com/unit42-practice-makes-perfect-nemucod-evolves-delivery-obfuscation-techniques-harvest-credentials/
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,27 +1,70 @@
# NetTraveler - Cyber Threat Intelligence
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NetTraveler](https://vuldb.com/?actor.nettraveler). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NetTraveler](https://vuldb.com/?actor.nettraveler). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.nettraveler](https://vuldb.com/?actor.nettraveler)
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.nettraveler](https://vuldb.com/?actor.nettraveler)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with NetTraveler:
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of NetTraveler.
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of NetTraveler.
ID | IP address | Hostname | Confidence
-- | ---------- | -------- | ----------
1 | 122.10.17.130 | - | High
2 | 216.83.32.29 | - | High
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [61.178.77.111](https://vuldb.com/?ip.61.178.77.111) | - | - | High
2 | [67.198.140.148](https://vuldb.com/?ip.67.198.140.148) | 67.198.140.148.static.krypt.com | - | High
3 | [96.44.179.26](https://vuldb.com/?ip.96.44.179.26) | 96.44.179.26.static.quadranet.com | - | High
4 | [96.46.4.237](https://vuldb.com/?ip.96.46.4.237) | 96-46-4-237.res.trstrm.net | - | High
5 | ... | ... | ... | ...
There are 15 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _NetTraveler_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1587.003 | CWE-295 | Improper Certificate Validation | High
4 | ... | ... | ... | ...
There are 1 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by NetTraveler. This data is unique as it uses our predictive model for actor profiling.
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/bin/login.php` | High
2 | File | `/see_more_details.php` | High
3 | File | `/start-stop` | Medium
4 | File | `/uncpath/` | Medium
5 | File | `/webmail/` | Medium
6 | File | `addentry.php` | Medium
7 | File | `admin.remository.php` | High
8 | File | `admin/index.php` | High
9 | ... | ... | ...
There are 68 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains external sources which discuss the actor and the associated activities:
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://ioc.hatenablog.com/entry/2011/04/28/000000
* https://www.threatminer.org/report.php?q=NetTraveler_Makeover_10th_Birthday.pdf&y=2014
## Literature
The following articles explain our unique predictive cyber threat intelligence:
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)

View File

@ -1,6 +1,6 @@
# NightScout - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NightScout](https://vuldb.com/?actor.nightscout). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NightScout](https://vuldb.com/?actor.nightscout). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.nightscout](https://vuldb.com/?actor.nightscout)
@ -14,8 +14,8 @@ The following _campaigns_ are known and can be associated with NightScout:
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with NightScout:
* CN
* US
* [CN](https://vuldb.com/?country.cn)
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
@ -23,16 +23,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 45.158.32.65 | - | NightScout | High
2 | 103.255.177.138 | - | NightScout | High
3 | 185.239.226.172 | - | NightScout | High
1 | [45.158.32.65](https://vuldb.com/?ip.45.158.32.65) | - | NightScout | High
2 | [103.255.177.138](https://vuldb.com/?ip.103.255.177.138) | - | NightScout | High
3 | [185.239.226.172](https://vuldb.com/?ip.185.239.226.172) | - | NightScout | High
4 | ... | ... | ... | ...
There are 1 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by NightScout. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _NightScout_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -77,7 +77,7 @@ ID | Type | Indicator | Confidence
25 | File | `AndroidManifest.xml` | High
26 | ... | ... | ...
There are 220 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 223 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -29,37 +29,38 @@ ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [37.59.198.130](https://vuldb.com/?ip.37.59.198.130) | - | - | High
2 | [37.59.198.131](https://vuldb.com/?ip.37.59.198.131) | - | - | High
3 | [45.32.100.179](https://vuldb.com/?ip.45.32.100.179) | 45.32.100.179.vultr.com | - | Medium
4 | [45.32.114.49](https://vuldb.com/?ip.45.32.114.49) | 45.32.114.49.vultr.com | - | Medium
5 | [45.76.179.28](https://vuldb.com/?ip.45.76.179.28) | 45.76.179.28.vultr.com | - | Medium
6 | [45.76.179.151](https://vuldb.com/?ip.45.76.179.151) | 45.76.179.151.vultr.com | - | Medium
7 | [45.114.117.164](https://vuldb.com/?ip.45.114.117.164) | folien.reisnart.com | - | High
8 | [46.183.220.81](https://vuldb.com/?ip.46.183.220.81) | ip-220-81.dataclub.info | - | High
9 | [46.183.220.82](https://vuldb.com/?ip.46.183.220.82) | ip-220-82.dataclub.info | - | High
10 | [46.183.222.82](https://vuldb.com/?ip.46.183.222.82) | ip-222-82.dataclub.info | - | High
11 | [46.183.222.83](https://vuldb.com/?ip.46.183.222.83) | ip-222-83.dataclub.info | - | High
12 | [46.183.222.84](https://vuldb.com/?ip.46.183.222.84) | ip-222-84.dataclub.info | - | High
13 | [46.183.223.106](https://vuldb.com/?ip.46.183.223.106) | ip-223-106.dataclub.info | - | High
14 | [46.183.223.107](https://vuldb.com/?ip.46.183.223.107) | ip-223-107.dataclub.info | - | High
15 | [62.113.238.135](https://vuldb.com/?ip.62.113.238.135) | hosted-by.securefastserver.com | - | High
16 | [64.62.174.9](https://vuldb.com/?ip.64.62.174.9) | agent2.jenkins.aoindustries.com | - | High
17 | [64.62.174.16](https://vuldb.com/?ip.64.62.174.16) | unassigned16.net2.fc.aoindustries.com | - | High
18 | [64.62.174.17](https://vuldb.com/?ip.64.62.174.17) | unassigned17.net2.fc.aoindustries.com | - | High
19 | [64.62.174.21](https://vuldb.com/?ip.64.62.174.21) | unassigned21.net2.fc.aoindustries.com | - | High
20 | [64.62.174.41](https://vuldb.com/?ip.64.62.174.41) | dev1.plant-orbit.com | - | High
21 | ... | ... | ... | ...
3 | [45.9.239.34](https://vuldb.com/?ip.45.9.239.34) | 45.9.239.34.deltahost-ptr | - | High
4 | [45.9.239.45](https://vuldb.com/?ip.45.9.239.45) | 45.9.239.45.deltahost-ptr | - | High
5 | [45.9.239.77](https://vuldb.com/?ip.45.9.239.77) | 45.9.239.77.deltahost-ptr | - | High
6 | [45.9.239.110](https://vuldb.com/?ip.45.9.239.110) | 45.9.239.110.deltahost-ptr | - | High
7 | [45.9.239.139](https://vuldb.com/?ip.45.9.239.139) | 45.9.239.139.deltahost-ptr | - | High
8 | [45.32.100.179](https://vuldb.com/?ip.45.32.100.179) | 45.32.100.179.vultr.com | - | Medium
9 | [45.32.114.49](https://vuldb.com/?ip.45.32.114.49) | 45.32.114.49.vultr.com | - | Medium
10 | [45.76.179.28](https://vuldb.com/?ip.45.76.179.28) | 45.76.179.28.vultr.com | - | Medium
11 | [45.76.179.151](https://vuldb.com/?ip.45.76.179.151) | 45.76.179.151.vultr.com | - | Medium
12 | [45.114.117.164](https://vuldb.com/?ip.45.114.117.164) | folien.reisnart.com | - | High
13 | [46.183.220.81](https://vuldb.com/?ip.46.183.220.81) | ip-220-81.dataclub.info | - | High
14 | [46.183.220.82](https://vuldb.com/?ip.46.183.220.82) | ip-220-82.dataclub.info | - | High
15 | [46.183.221.188](https://vuldb.com/?ip.46.183.221.188) | ip-221-188.dataclub.info | - | High
16 | [46.183.221.189](https://vuldb.com/?ip.46.183.221.189) | ip-221-189.dataclub.info | - | High
17 | [46.183.221.190](https://vuldb.com/?ip.46.183.221.190) | ip-221-190.dataclub.info | - | High
18 | [46.183.222.82](https://vuldb.com/?ip.46.183.222.82) | ip-222-82.dataclub.info | - | High
19 | [46.183.222.83](https://vuldb.com/?ip.46.183.222.83) | ip-222-83.dataclub.info | - | High
20 | [46.183.222.84](https://vuldb.com/?ip.46.183.222.84) | ip-222-84.dataclub.info | - | High
21 | [46.183.223.106](https://vuldb.com/?ip.46.183.223.106) | ip-223-106.dataclub.info | - | High
22 | [46.183.223.107](https://vuldb.com/?ip.46.183.223.107) | ip-223-107.dataclub.info | - | High
23 | ... | ... | ... | ...
There are 81 more IOC items available. Please use our online service to access the data.
There are 90 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by OceanLotus. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _OceanLotus_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
3 | T1499 | CWE-404 | Resource Consumption | High
## IOA - Indicator of Attack
@ -78,6 +79,7 @@ There are 10 more IOA items available (file, library, argument, input value, pat
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blogs.blackberry.com/en/2019/10/mobile-malware-and-apt-espionage-prolific-pervasive-and-cross-platform
* https://github.com/eset/malware-ioc/tree/master/oceanlotus
* https://www.threatminer.org/report.php?q=ESET_OceanLotus.pdf&y=2018
* https://www.threatminer.org/report.php?q=OceanLotusBlossoms_MassDigitalSurveillanceandAttacksTargetingASEAN,AsianNations,theMedia,HumanRightsGroups,andCivilSociety_Volexity.pdf&y=2017

30
actors/Oski/README.md Normal file
View File

@ -0,0 +1,30 @@
# Oski - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Oski](https://vuldb.com/?actor.oski). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.oski](https://vuldb.com/?actor.oski)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Oski.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [2.56.57.108](https://vuldb.com/?ip.2.56.57.108) | - | - | High
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://isc.sans.edu/forums/diary/Arkei+Variants+From+Vidar+to+Mars+Stealer/28468/
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -99,7 +99,7 @@ ID | IP address | Hostname | Campaign | Confidence
69 | [46.165.248.240](https://vuldb.com/?ip.46.165.248.240) | - | - | High
70 | ... | ... | ... | ...
There are 274 more IOC items available. Please use our online service to access the data.
There are 275 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
@ -128,19 +128,19 @@ ID | Type | Indicator | Confidence
6 | File | `/ajax/networking/get_netcfg.php` | High
7 | File | `/apply_noauth.cgi` | High
8 | File | `/assets/ctx` | Medium
9 | File | `/cgi-bin/user/Config.cgi` | High
10 | File | `/cgi-bin/wapopen` | High
11 | File | `/cms/print.php` | High
12 | File | `/concat?/%2557EB-INF/web.xml` | High
13 | File | `/data/remove` | Medium
14 | File | `/etc/passwd` | Medium
15 | File | `/htdocs/cgibin` | High
16 | File | `/login` | Low
17 | File | `/navigate/navigate_download.php` | High
18 | File | `/owa/auth/logon.aspx` | High
19 | File | `/password.html` | High
20 | File | `/proc/ioports` | High
21 | File | `/property-list/property_view.php` | High
9 | File | `/cgi-bin/wapopen` | High
10 | File | `/cms/print.php` | High
11 | File | `/concat?/%2557EB-INF/web.xml` | High
12 | File | `/data/remove` | Medium
13 | File | `/etc/passwd` | Medium
14 | File | `/htdocs/cgibin` | High
15 | File | `/login` | Low
16 | File | `/navigate/navigate_download.php` | High
17 | File | `/owa/auth/logon.aspx` | High
18 | File | `/password.html` | High
19 | File | `/proc/ioports` | High
20 | File | `/property-list/property_view.php` | High
21 | File | `/ptms/classes/Users.php` | High
22 | File | `/rest` | Low
23 | File | `/rest/api/2/search` | High
24 | File | `/s/` | Low
@ -174,7 +174,7 @@ ID | Type | Indicator | Confidence
52 | File | `admin/media/rename.php` | High
53 | ... | ... | ...
There are 465 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 466 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
@ -183,6 +183,7 @@ The following list contains _external sources_ which discuss the actor and the a
* https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=09308982-77bd-41e0-8269-f2cc9ce3266e&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
* https://github.com/faisalusuf/ThreatIntelligence/blob/main/Patchwork/Tracking-Patchwork-IOCs.csv
* https://securelist.com/the-dropping-elephant-actor/75328/
* https://twitter.com/souiten/status/1473142851798114312
* https://unit42.paloaltonetworks.com/unit42-patchwork-continues-deliver-badnews-indian-subcontinent/
* https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/
* https://vxug.fakedoma.in/archive/APTs/2021/2021.01.20(1)/Patchwork.pdf

View File

@ -0,0 +1,41 @@
# Pitty Panda - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Pitty Panda](https://vuldb.com/?actor.pitty_panda). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.pitty_panda](https://vuldb.com/?actor.pitty_panda)
## Countries
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Pitty Panda:
* [US](https://vuldb.com/?country.us)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Pitty Panda.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [61.145.112.78](https://vuldb.com/?ip.61.145.112.78) | - | - | High
2 | [63.251.83.36](https://vuldb.com/?ip.63.251.83.36) | - | - | High
3 | [64.74.96.242](https://vuldb.com/?ip.64.74.96.242) | - | - | High
4 | ... | ... | ... | ...
There are 4 more IOC items available. Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://ioc.hatenablog.com/entry/2014/07/15/000000
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

30
actors/PoshC2/README.md Normal file
View File

@ -0,0 +1,30 @@
# PoshC2 - Cyber Threat Intelligence
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [PoshC2](https://vuldb.com/?actor.poshc2). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.poshc2](https://vuldb.com/?actor.poshc2)
## IOC - Indicator of Compromise
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of PoshC2.
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | [35.202.253.45](https://vuldb.com/?ip.35.202.253.45) | 45.253.202.35.bc.googleusercontent.com | - | Medium
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://www.lac.co.jp/lacwatch/people/20190213_001770.html
## Literature
The following _articles_ explain our unique predictive cyber threat intelligence:
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
## License
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!

View File

@ -51,7 +51,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
4 | ... | ... | ... | ...
There are 8 more TTP items available. Please use our online service to access the data.
There are 9 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -61,29 +61,30 @@ ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/.htaccess` | Medium
2 | File | `/admin-panel1.php` | High
3 | File | `/admin/?page=members/view_member` | High
4 | File | `/admin/file-manager/` | High
5 | File | `/admin/login.php` | High
6 | File | `/admin/news/news_mod.php` | High
7 | File | `/admin/page_edit/3` | High
8 | File | `/admin/templates/template_manage.php` | High
9 | File | `/admin_page/all-files-update-ajax.php` | High
10 | File | `/api/servers` | Medium
11 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
12 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
13 | File | `/cloud_config/router_post/register` | High
14 | File | `/cloud_config/router_post/upgrade_info` | High
15 | File | `/DataPackageTable` | High
16 | File | `/download/` | Medium
17 | File | `/etc/cobbler` | Medium
18 | File | `/etc/passwd` | Medium
19 | File | `/goform/SetPptpServerCfg` | High
20 | File | `/i/:data/ipa.plist` | High
21 | File | `/languages/index.php` | High
22 | File | `/mdiy/dict/listExcludeApp` | High
23 | ... | ... | ...
3 | File | `/admin.php/admin/ulog/index.html` | High
4 | File | `/admin.php/admin/vod/data.html` | High
5 | File | `/admin/?page=members/view_member` | High
6 | File | `/admin/login.php` | High
7 | File | `/admin/news/news_mod.php` | High
8 | File | `/admin/page_edit/3` | High
9 | File | `/admin/templates/template_manage.php` | High
10 | File | `/admin_page/all-files-update-ajax.php` | High
11 | File | `/api/crontab` | Medium
12 | File | `/api/servers` | Medium
13 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
14 | File | `/cgi-bin/uploadAccessCodePic` | High
15 | File | `/cgi-bin/uploadWeiXinPic` | High
16 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
17 | File | `/cloud_config/router_post/register` | High
18 | File | `/cloud_config/router_post/upgrade_info` | High
19 | File | `/config/list` | Medium
20 | File | `/controller/Index.php` | High
21 | File | `/data/sqldata` | High
22 | File | `/DataPackageTable` | High
23 | File | `/download/` | Medium
24 | ... | ... | ...
There are 194 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 205 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,6 +1,6 @@
# Prowli - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Prowli](https://vuldb.com/?actor.prowli). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Prowli](https://vuldb.com/?actor.prowli). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.prowli](https://vuldb.com/?actor.prowli)
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Prowli:
* RU
* [RU](https://vuldb.com/?country.ru)
## IOC - Indicator of Compromise
@ -16,11 +16,11 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 185.212.128.154 | free.ptr1.ru | - | High
1 | [185.212.128.154](https://vuldb.com/?ip.185.212.128.154) | free.ptr1.ru | - | High
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Prowli. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Prowli_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------

View File

@ -41,7 +41,7 @@ There are 55 more IOC items available. Please use our online service to access t
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by PsiXBot. This data is unique as it uses our predictive model for actor profiling.
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _PsiXBot_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
@ -50,7 +50,7 @@ ID | Technique | Weakness | Description | Confidence
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
4 | ... | ... | ... | ...
There are 7 more TTP items available. Please use our online service to access the data.
There are 6 more TTP items available. Please use our online service to access the data.
## IOA - Indicator of Attack
@ -59,46 +59,46 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `/?Page=Node/OBJ=/System/DeviceFolder/DeviceFolder/DateTime/Action=Submit` | High
2 | File | `/bin/boa` | Medium
3 | File | `/config/getuser` | High
4 | File | `/de/cgi/dfs_guest/` | High
5 | File | `/download` | Medium
6 | File | `/etc/gsissh/sshd_config` | High
7 | File | `/etc/passwd` | Medium
8 | File | `/etc/quantum/quantum.conf` | High
9 | File | `/etc/shadow` | Medium
10 | File | `/forum/away.php` | High
11 | File | `/getcfg.php` | Medium
12 | File | `/goform/telnet` | High
13 | File | `/goform/WanParameterSetting` | High
14 | File | `/inc/extensions.php` | High
15 | File | `/include/makecvs.php` | High
16 | File | `/modules/profile/index.php` | High
17 | File | `/modules/tasks/summary.inc.php` | High
18 | File | `/payu/icpcheckout/` | High
19 | File | `/property-list/property_view.php` | High
20 | File | `/public/login.htm` | High
21 | File | `/req_password_user.php` | High
22 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
23 | File | `/resourceNode/resources.jsf` | High
24 | File | `/rest/project-templates/1.0/createshared` | High
25 | File | `/rom-0` | Low
26 | File | `/secure/QueryComponent!Default.jspa` | High
27 | File | `/trx_addons/v2/get/sc_layout` | High
28 | File | `/uncpath/` | Medium
29 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
30 | File | `/usr/syno/etc/mount.conf` | High
31 | File | `/var/log/nginx` | High
32 | File | `/var/WEB-GUI/cgi-bin/telnet.cgi` | High
33 | File | `/WEB-INF/web.xml` | High
34 | File | `/_next` | Low
35 | File | `3.6.cpj` | Low
36 | File | `404.php` | Low
37 | File | `a-b-membres.php` | High
38 | File | `ActionsAndOperations` | High
39 | File | `adclick.php` | Medium
40 | File | `add_2_basket.asp` | High
41 | File | `add_vhost.php` | High
2 | File | `/admin/news/news_ok.php` | High
3 | File | `/bin/boa` | Medium
4 | File | `/config/getuser` | High
5 | File | `/de/cgi/dfs_guest/` | High
6 | File | `/download` | Medium
7 | File | `/etc/gsissh/sshd_config` | High
8 | File | `/etc/passwd` | Medium
9 | File | `/etc/quantum/quantum.conf` | High
10 | File | `/etc/shadow` | Medium
11 | File | `/forum/away.php` | High
12 | File | `/getcfg.php` | Medium
13 | File | `/goform/telnet` | High
14 | File | `/goform/WanParameterSetting` | High
15 | File | `/inc/extensions.php` | High
16 | File | `/include/makecvs.php` | High
17 | File | `/modules/profile/index.php` | High
18 | File | `/modules/tasks/summary.inc.php` | High
19 | File | `/payu/icpcheckout/` | High
20 | File | `/property-list/property_view.php` | High
21 | File | `/public/login.htm` | High
22 | File | `/req_password_user.php` | High
23 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
24 | File | `/resourceNode/resources.jsf` | High
25 | File | `/rest/project-templates/1.0/createshared` | High
26 | File | `/rom-0` | Low
27 | File | `/secure/QueryComponent!Default.jspa` | High
28 | File | `/trx_addons/v2/get/sc_layout` | High
29 | File | `/uncpath/` | Medium
30 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
31 | File | `/usr/syno/etc/mount.conf` | High
32 | File | `/var/log/nginx` | High
33 | File | `/var/WEB-GUI/cgi-bin/telnet.cgi` | High
34 | File | `/WEB-INF/web.xml` | High
35 | File | `/_next` | Low
36 | File | `3.6.cpj` | Low
37 | File | `404.php` | Low
38 | File | `a-b-membres.php` | High
39 | File | `ActionsAndOperations` | High
40 | File | `adclick.php` | Medium
41 | File | `add_2_basket.asp` | High
42 | File | `admin.asp` | Medium
43 | File | `admin.aspx` | Medium
44 | File | `admin.php` | Medium
@ -106,15 +106,15 @@ ID | Type | Indicator | Confidence
46 | File | `admin/member_details.php` | High
47 | File | `admin_chatconfig.php` | High
48 | File | `ajaxp.php` | Medium
49 | File | `alphabet.php` | Medium
50 | File | `article2/comments.inc.php` | High
51 | File | `articles/edit.php` | High
52 | File | `assp.pl` | Low
53 | File | `auth-gss2.c` | Medium
54 | File | `authent.php4` | Medium
49 | File | `ajax_calls.php` | High
50 | File | `alphabet.php` | Medium
51 | File | `article2/comments.inc.php` | High
52 | File | `articles/edit.php` | High
53 | File | `assp.pl` | Low
54 | File | `auth-gss2.c` | Medium
55 | ... | ... | ...
There are 479 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
There are 477 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References

View File

@ -1,6 +1,6 @@
# Purple Fox - Cyber Threat Intelligence
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Purple Fox](https://vuldb.com/?actor.purple_fox). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Purple Fox](https://vuldb.com/?actor.purple_fox). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.purple_fox](https://vuldb.com/?actor.purple_fox)
@ -8,7 +8,8 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Purple Fox:
* CN
* [CN](https://vuldb.com/?country.cn)
* [KZ](https://vuldb.com/?country.kz)
## IOC - Indicator of Compromise
@ -16,8 +17,20 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
ID | IP address | Hostname | Campaign | Confidence
-- | ---------- | -------- | -------- | ----------
1 | 144.48.243.79 | - | - | High
2 | 193.164.223.77 | - | - | High
1 | [57.167.200.174](https://vuldb.com/?ip.57.167.200.174) | - | - | High
2 | [60.174.95.143](https://vuldb.com/?ip.60.174.95.143) | - | - | High
3 | [65.113.192.79](https://vuldb.com/?ip.65.113.192.79) | 65-113-192-79.dia.static.qwest.net | - | High
4 | ... | ... | ... | ...
There are 13 more IOC items available. Please use our online service to access the data.
## TTP - Tactics, Techniques, Procedures
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Purple Fox_. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Weakness | Description | Confidence
-- | --------- | -------- | ----------- | ----------
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
## IOA - Indicator of Attack
@ -25,13 +38,20 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
ID | Type | Indicator | Confidence
-- | ---- | --------- | ----------
1 | File | `web/jquery/uploader/uploadify.php` | High
1 | File | `index.php` | Medium
2 | File | `web/jquery/uploader/uploadify.php` | High
3 | File | `wp-admin/options-general.php` | High
4 | ... | ... | ...
There are 3 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
## References
The following list contains _external sources_ which discuss the actor and the associated activities:
* https://blogs.blackberry.com/en/2022/01/threat-thursday-purple-fox-rootkit
* https://github.com/guardicore/labs_campaigns/tree/master/Purple_Fox
* https://www.trendmicro.com/en_us/research/21/l/a-look-into-purple-fox-server-infrastructure.html
## Literature

Some files were not shown because too many files have changed in this diff Show More