Update
This commit is contained in:
parent
ef16ee7c43
commit
d8bfb92c48
|
@ -0,0 +1,31 @@
|
|||
# ALOSH - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [ALOSH](https://vuldb.com/?actor.alosh). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.alosh](https://vuldb.com/?actor.alosh)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of ALOSH.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [172.96.187.2](https://vuldb.com/?ip.172.96.187.2) | nyc008.hawkhost.com | - | High
|
||||
2 | [181.141.0.30](https://vuldb.com/?ip.181.141.0.30) | hfc-181-141-0-30.une.net.co | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://lab52.io/blog/literature-lover-targeting-colombia-with-limerat/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -46,7 +46,7 @@ There are 60 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by APT1. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT1_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -86,27 +86,27 @@ ID | Type | Indicator | Confidence
|
|||
8 | File | `/login` | Low
|
||||
9 | File | `/mgmt/shared/authz/users/` | High
|
||||
10 | File | `/modules/profile/index.php` | High
|
||||
11 | File | `/out.php` | Medium
|
||||
12 | File | `/public/plugins/` | High
|
||||
13 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
14 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
15 | File | `/secure/admin/ViewInstrumentation.jspa` | High
|
||||
16 | File | `/SSOPOST/metaAlias/%realm%/idpv2` | High
|
||||
17 | File | `/system/proxy` | High
|
||||
18 | File | `/tmp/phpglibccheck` | High
|
||||
19 | File | `/uncpath/` | Medium
|
||||
20 | File | `adclick.php` | Medium
|
||||
21 | File | `add.php` | Low
|
||||
22 | File | `addentry.php` | Medium
|
||||
23 | File | `addressbookprovider.php` | High
|
||||
24 | File | `admin/pageUploadCSV.php` | High
|
||||
25 | File | `ajax_udf.php` | Medium
|
||||
26 | File | `AppCompatCache.exe` | High
|
||||
27 | File | `application.js.php` | High
|
||||
28 | File | `apply.cgi` | Medium
|
||||
29 | File | `arm/lithium-codegen-arm.cc` | High
|
||||
30 | File | `authenticate.c` | High
|
||||
31 | File | `base_maintenance.php` | High
|
||||
11 | File | `/one_church/userregister.php` | High
|
||||
12 | File | `/out.php` | Medium
|
||||
13 | File | `/public/plugins/` | High
|
||||
14 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
15 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
16 | File | `/secure/admin/ViewInstrumentation.jspa` | High
|
||||
17 | File | `/SSOPOST/metaAlias/%realm%/idpv2` | High
|
||||
18 | File | `/system/proxy` | High
|
||||
19 | File | `/tmp/phpglibccheck` | High
|
||||
20 | File | `/uncpath/` | Medium
|
||||
21 | File | `adclick.php` | Medium
|
||||
22 | File | `add.php` | Low
|
||||
23 | File | `addentry.php` | Medium
|
||||
24 | File | `addressbookprovider.php` | High
|
||||
25 | File | `admin.jcomments.php` | High
|
||||
26 | File | `admin/pageUploadCSV.php` | High
|
||||
27 | File | `ajax_udf.php` | Medium
|
||||
28 | File | `AppCompatCache.exe` | High
|
||||
29 | File | `application.js.php` | High
|
||||
30 | File | `apply.cgi` | Medium
|
||||
31 | File | `arm/lithium-codegen-arm.cc` | High
|
||||
32 | ... | ... | ...
|
||||
|
||||
There are 271 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
|
|
@ -114,29 +114,29 @@ ID | Type | Indicator | Confidence
|
|||
11 | File | `/NAGErrors` | Medium
|
||||
12 | File | `/plugins/servlet/audit/resource` | High
|
||||
13 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
14 | File | `/proc/ioports` | High
|
||||
15 | File | `/REBOOTSYSTEM` | High
|
||||
16 | File | `/replication` | Medium
|
||||
17 | File | `/reports/rwservlet` | High
|
||||
18 | File | `/RestAPI` | Medium
|
||||
19 | File | `/tmp` | Low
|
||||
20 | File | `/tmp/speedtest_urls.xml` | High
|
||||
21 | File | `/uncpath/` | Medium
|
||||
22 | File | `/var/log/nginx` | High
|
||||
23 | File | `/wp-admin/admin.php` | High
|
||||
24 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
25 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
26 | File | `admin/app/mediamanager` | High
|
||||
27 | File | `admin/index.php` | High
|
||||
28 | File | `admin\model\catalog\download.php` | High
|
||||
29 | File | `afr.php` | Low
|
||||
30 | File | `apcupsd.pid` | Medium
|
||||
31 | File | `api/it-recht-kanzlei/api-it-recht-kanzlei.php` | High
|
||||
32 | File | `api/sms/send-sms` | High
|
||||
33 | File | `api/v1/alarms` | High
|
||||
14 | File | `/REBOOTSYSTEM` | High
|
||||
15 | File | `/replication` | Medium
|
||||
16 | File | `/reports/rwservlet` | High
|
||||
17 | File | `/RestAPI` | Medium
|
||||
18 | File | `/tmp` | Low
|
||||
19 | File | `/tmp/speedtest_urls.xml` | High
|
||||
20 | File | `/uncpath/` | Medium
|
||||
21 | File | `/var/log/nginx` | High
|
||||
22 | File | `/wp-admin/admin.php` | High
|
||||
23 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
24 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
25 | File | `admin/app/mediamanager` | High
|
||||
26 | File | `admin/index.php` | High
|
||||
27 | File | `admin\model\catalog\download.php` | High
|
||||
28 | File | `afr.php` | Low
|
||||
29 | File | `apcupsd.pid` | Medium
|
||||
30 | File | `api/it-recht-kanzlei/api-it-recht-kanzlei.php` | High
|
||||
31 | File | `api/sms/send-sms` | High
|
||||
32 | File | `api/v1/alarms` | High
|
||||
33 | File | `application/controller/InstallerController.php` | High
|
||||
34 | ... | ... | ...
|
||||
|
||||
There are 290 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 289 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -21,10 +21,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 26 more country items available. Please use our online service to access the data.
|
||||
There are 25 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -77,20 +77,20 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/?module=users§ion=cpanel&page=list` | High
|
||||
2 | File | `/admin/powerline` | High
|
||||
3 | File | `/admin/produts/controller.php` | High
|
||||
4 | File | `/admin/syslog` | High
|
||||
5 | File | `/admin/user/team` | High
|
||||
6 | File | `/api/upload` | Medium
|
||||
7 | File | `/cgi-bin` | Medium
|
||||
8 | File | `/cgi-bin/kerbynet` | High
|
||||
9 | File | `/cgi-bin/system_mgr.cgi` | High
|
||||
10 | File | `/common/logViewer/logViewer.jsf` | High
|
||||
11 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
12 | File | `/crmeb/app/admin/controller/store/CopyTaobao.php` | High
|
||||
13 | File | `/dcim/sites/add/` | High
|
||||
14 | File | `/EXCU_SHELL` | Medium
|
||||
15 | File | `/forum/away.php` | High
|
||||
2 | File | `/admin/login.php` | High
|
||||
3 | File | `/admin/powerline` | High
|
||||
4 | File | `/admin/produts/controller.php` | High
|
||||
5 | File | `/admin/syslog` | High
|
||||
6 | File | `/admin/user/team` | High
|
||||
7 | File | `/api/upload` | Medium
|
||||
8 | File | `/cgi-bin` | Medium
|
||||
9 | File | `/cgi-bin/kerbynet` | High
|
||||
10 | File | `/cgi-bin/system_mgr.cgi` | High
|
||||
11 | File | `/common/logViewer/logViewer.jsf` | High
|
||||
12 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
13 | File | `/crmeb/app/admin/controller/store/CopyTaobao.php` | High
|
||||
14 | File | `/dcim/sites/add/` | High
|
||||
15 | File | `/EXCU_SHELL` | Medium
|
||||
16 | File | `/fudforum/adm/hlplist.php` | High
|
||||
17 | File | `/login` | Low
|
||||
18 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
|
@ -115,7 +115,7 @@ ID | Type | Indicator | Confidence
|
|||
37 | File | `AccountManagerService.java` | High
|
||||
38 | ... | ... | ...
|
||||
|
||||
There are 326 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 328 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -18,7 +18,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [PL](https://vuldb.com/?country.pl)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 6 more country items available. Please use our online service to access the data.
|
||||
|
@ -59,7 +59,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -67,32 +67,33 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/admin.add` | Medium
|
||||
2 | File | `/admin/?page=user/manage_user` | High
|
||||
3 | File | `/admin/admin.php?module=admin_access_group_edit&aagID` | High
|
||||
4 | File | `/admin/customers.php?page=1&cID` | High
|
||||
5 | File | `/admin/edit_user.php` | High
|
||||
6 | File | `/admin/files` | Medium
|
||||
7 | File | `/administrator/components/menu/` | High
|
||||
8 | File | `/administrator/components/table_manager/` | High
|
||||
9 | File | `/api/appInternals/1.0/agent/configuration&` | High
|
||||
10 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
|
||||
11 | File | `/api/ZRMesh/set_ZRMesh` | High
|
||||
12 | File | `/cloud_config/router_post/register` | High
|
||||
13 | File | `/Hospital-Management-System-master/contact.php` | High
|
||||
14 | File | `/Hospital-Management-System-master/func.php` | High
|
||||
15 | File | `/jerry-core/ecma/base/ecma-lcache.c` | High
|
||||
16 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
|
||||
17 | File | `/jerry-core/jmem/jmem-heap.c` | High
|
||||
18 | File | `/ManageRoute/postRoute` | High
|
||||
19 | File | `/ms/cms/content/list.do` | High
|
||||
20 | File | `/orms/` | Low
|
||||
21 | File | `/parser/js/js-parser-expr.c` | High
|
||||
22 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
23 | File | `/thruk/#cgi-bin/extinfo.cgi?type=2` | High
|
||||
24 | ... | ... | ...
|
||||
1 | File | `.htaccess` | Medium
|
||||
2 | File | `/admin.add` | Medium
|
||||
3 | File | `/admin/?page=user/manage_user` | High
|
||||
4 | File | `/admin/admin.php?module=admin_access_group_edit&aagID` | High
|
||||
5 | File | `/admin/customers.php?page=1&cID` | High
|
||||
6 | File | `/admin/edit_user.php` | High
|
||||
7 | File | `/admin/files` | Medium
|
||||
8 | File | `/admin/login.php` | High
|
||||
9 | File | `/administrator/components/menu/` | High
|
||||
10 | File | `/administrator/components/table_manager/` | High
|
||||
11 | File | `/api/appInternals/1.0/agent/configuration&` | High
|
||||
12 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
|
||||
13 | File | `/api/fetch` | Medium
|
||||
14 | File | `/api/ZRMesh/set_ZRMesh` | High
|
||||
15 | File | `/audit/log/log_management.php` | High
|
||||
16 | File | `/cloud_config/router_post/register` | High
|
||||
17 | File | `/cwms/admin/?page=articles/view_article/` | High
|
||||
18 | File | `/Hospital-Management-System-master/contact.php` | High
|
||||
19 | File | `/Hospital-Management-System-master/func.php` | High
|
||||
20 | File | `/i/:data/ipa.plist` | High
|
||||
21 | File | `/jerry-core/ecma/base/ecma-lcache.c` | High
|
||||
22 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
|
||||
23 | File | `/jerry-core/jmem/jmem-heap.c` | High
|
||||
24 | File | `/ManageRoute/postRoute` | High
|
||||
25 | ... | ... | ...
|
||||
|
||||
There are 204 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 214 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -68,30 +68,31 @@ ID | Type | Indicator | Confidence
|
|||
8 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
|
||||
9 | File | `/medical/inventories.php` | High
|
||||
10 | File | `/monitoring` | Medium
|
||||
11 | File | `/NAGErrors` | Medium
|
||||
12 | File | `/plugins/servlet/audit/resource` | High
|
||||
13 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
14 | File | `/replication` | Medium
|
||||
15 | File | `/RestAPI` | Medium
|
||||
16 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
17 | File | `/tmp` | Low
|
||||
18 | File | `/tmp/speedtest_urls.xml` | High
|
||||
19 | File | `/uncpath/` | Medium
|
||||
20 | File | `/var/log/nginx` | High
|
||||
21 | File | `/wp-content/plugins/updraftplus/admin.php` | High
|
||||
22 | File | `actions.hsp` | Medium
|
||||
23 | File | `addentry.php` | Medium
|
||||
24 | File | `add_edit_user.asp` | High
|
||||
25 | File | `add_to_cart.php` | High
|
||||
26 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
27 | File | `admin/config/confmgr.php` | High
|
||||
28 | File | `admin/system_manage/save.html` | High
|
||||
29 | File | `admin\model\catalog\download.php` | High
|
||||
30 | File | `ajax.php` | Medium
|
||||
31 | File | `apcupsd.pid` | Medium
|
||||
32 | ... | ... | ...
|
||||
11 | File | `/plugins/servlet/audit/resource` | High
|
||||
12 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
13 | File | `/replication` | Medium
|
||||
14 | File | `/RestAPI` | Medium
|
||||
15 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
16 | File | `/tmp` | Low
|
||||
17 | File | `/tmp/speedtest_urls.xml` | High
|
||||
18 | File | `/uncpath/` | Medium
|
||||
19 | File | `/var/log/nginx` | High
|
||||
20 | File | `/wp-content/plugins/updraftplus/admin.php` | High
|
||||
21 | File | `actions.hsp` | Medium
|
||||
22 | File | `addentry.php` | Medium
|
||||
23 | File | `add_edit_user.asp` | High
|
||||
24 | File | `add_to_cart.php` | High
|
||||
25 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
26 | File | `admin/config/confmgr.php` | High
|
||||
27 | File | `admin/system_manage/save.html` | High
|
||||
28 | File | `admin\model\catalog\download.php` | High
|
||||
29 | File | `ajax.php` | Medium
|
||||
30 | File | `apcupsd.pid` | Medium
|
||||
31 | File | `api/sms/send-sms` | High
|
||||
32 | File | `api/v1/alarms` | High
|
||||
33 | ... | ... | ...
|
||||
|
||||
There are 277 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 278 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,63 +1,64 @@
|
|||
# APT36 - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT36](https://vuldb.com/?actor.apt36). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [APT36](https://vuldb.com/?actor.apt36). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.apt36](https://vuldb.com/?actor.apt36)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.apt36](https://vuldb.com/?actor.apt36)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with APT36:
|
||||
The following _campaigns_ are known and can be associated with APT36:
|
||||
|
||||
* C-Major
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT36:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with APT36:
|
||||
|
||||
* US
|
||||
* NL
|
||||
* RU
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* ...
|
||||
|
||||
There are 13 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of APT36.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of APT36.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 5.189.137.8 | vending.softjourn.if.ua | High
|
||||
2 | 5.189.143.225 | - | High
|
||||
3 | 5.189.152.147 | ccloud.armax.de | High
|
||||
4 | 5.189.167.23 | mltx.de | High
|
||||
5 | 5.189.167.65 | vmi437585.contaboserver.net | High
|
||||
6 | 23.254.119.11 | - | High
|
||||
7 | 64.188.12.126 | 64.188.12.126.static.quadranet.com | High
|
||||
8 | 64.188.25.232 | 64.188.25.232.static.quadranet.com | High
|
||||
9 | 75.98.175.79 | a2s83.a2hosting.com | High
|
||||
10 | 75.119.139.169 | server1.immacolata.com | High
|
||||
11 | 80.240.134.51 | - | High
|
||||
12 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.189.137.8](https://vuldb.com/?ip.5.189.137.8) | vending.softjourn.if.ua | C-Major | High
|
||||
2 | [5.189.143.225](https://vuldb.com/?ip.5.189.143.225) | - | C-Major | High
|
||||
3 | [5.189.152.147](https://vuldb.com/?ip.5.189.152.147) | ccloud.armax.de | C-Major | High
|
||||
4 | [5.189.167.23](https://vuldb.com/?ip.5.189.167.23) | mltx.de | C-Major | High
|
||||
5 | [5.189.167.65](https://vuldb.com/?ip.5.189.167.65) | vmi437585.contaboserver.net | C-Major | High
|
||||
6 | [23.254.119.11](https://vuldb.com/?ip.23.254.119.11) | - | - | High
|
||||
7 | [64.188.12.126](https://vuldb.com/?ip.64.188.12.126) | 64.188.12.126.static.quadranet.com | - | High
|
||||
8 | [64.188.25.232](https://vuldb.com/?ip.64.188.25.232) | 64.188.25.232.static.quadranet.com | - | High
|
||||
9 | [75.98.175.79](https://vuldb.com/?ip.75.98.175.79) | a2s83.a2hosting.com | C-Major | High
|
||||
10 | [75.119.139.169](https://vuldb.com/?ip.75.119.139.169) | server1.immacolata.com | - | High
|
||||
11 | [80.240.134.51](https://vuldb.com/?ip.80.240.134.51) | - | C-Major | High
|
||||
12 | [82.196.13.94](https://vuldb.com/?ip.82.196.13.94) | - | C-Major | High
|
||||
13 | ... | ... | ... | ...
|
||||
|
||||
There are 46 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by APT36. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _APT36_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by APT36. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by APT36. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -89,18 +90,19 @@ ID | Type | Indicator | Confidence
|
|||
26 | File | `comment_add.asp` | High
|
||||
27 | ... | ... | ...
|
||||
|
||||
There are 229 more IOA items available. Please use our online service to access the data.
|
||||
There are 229 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://vxug.fakedoma.in/archive/APTs/2021/2021.05.13/Transparent%20Tribe.pdf
|
||||
* https://www.threatminer.org/report.php?q=indian-military-personnel-targeted-by-information-theft-campaign-cmajor.pdf&y=2016
|
||||
* https://www.trendmicro.com/en_us/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -62,7 +62,7 @@ ID | Type | Indicator | Confidence
|
|||
7 | File | `/server-status` | High
|
||||
8 | ... | ... | ...
|
||||
|
||||
There are 60 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 61 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -109,7 +109,7 @@ ID | Type | Indicator | Confidence
|
|||
33 | File | `admin.php/comments/batchdel/` | High
|
||||
34 | ... | ... | ...
|
||||
|
||||
There are 289 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 290 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -10,7 +10,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [IR](https://vuldb.com/?country.ir)
|
||||
* ...
|
||||
|
||||
There are 16 more country items available. Please use our online service to access the data.
|
||||
|
|
|
@ -39,7 +39,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1211 | CWE-254 | 7PK Security Features | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -59,7 +59,7 @@ ID | Type | Indicator | Confidence
|
|||
10 | File | `admin.asp` | Medium
|
||||
11 | ... | ... | ...
|
||||
|
||||
There are 84 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 85 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Autoit - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Autoit](https://vuldb.com/?actor.autoit). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Autoit](https://vuldb.com/?actor.autoit). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.autoit](https://vuldb.com/?actor.autoit)
|
||||
|
||||
|
@ -8,9 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Autoit:
|
||||
|
||||
* DE
|
||||
* US
|
||||
* ES
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 2 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -18,19 +21,19 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 8.248.165.254 | - | - | High
|
||||
2 | 8.249.217.254 | - | - | High
|
||||
3 | 8.253.131.121 | - | - | High
|
||||
4 | 13.56.128.67 | screenconnect.medsphere.com | - | High
|
||||
5 | 23.3.13.88 | a23-3-13-88.deploy.static.akamaitechnologies.com | - | High
|
||||
6 | 23.3.13.154 | a23-3-13-154.deploy.static.akamaitechnologies.com | - | High
|
||||
1 | [8.248.165.254](https://vuldb.com/?ip.8.248.165.254) | - | - | High
|
||||
2 | [8.249.217.254](https://vuldb.com/?ip.8.249.217.254) | - | - | High
|
||||
3 | [8.253.131.121](https://vuldb.com/?ip.8.253.131.121) | - | - | High
|
||||
4 | [13.56.128.67](https://vuldb.com/?ip.13.56.128.67) | screenconnect.medsphere.com | - | High
|
||||
5 | [23.3.13.88](https://vuldb.com/?ip.23.3.13.88) | a23-3-13-88.deploy.static.akamaitechnologies.com | - | High
|
||||
6 | [23.3.13.154](https://vuldb.com/?ip.23.3.13.154) | a23-3-13-154.deploy.static.akamaitechnologies.com | - | High
|
||||
7 | ... | ... | ... | ...
|
||||
|
||||
There are 24 more IOC items available. Please use our online service to access the data.
|
||||
There are 26 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Autoit. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Autoit_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -39,7 +42,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -60,7 +63,7 @@ ID | Type | Indicator | Confidence
|
|||
11 | File | `auth.php` | Medium
|
||||
12 | ... | ... | ...
|
||||
|
||||
There are 90 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 91 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -69,6 +72,7 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
* https://blog.talosintelligence.com/2021/08/threat-roundup-0730-0806.html
|
||||
* https://blog.talosintelligence.com/2021/09/threat-roundup-0827-0903.html
|
||||
* https://blog.talosintelligence.com/2021/09/threat-roundup-0910-0917.html
|
||||
* https://blog.talosintelligence.com/2022/03/threat-roundup-0318-0325.html
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [SC](https://vuldb.com/?country.sc)
|
||||
* ...
|
||||
|
||||
There are 11 more country items available. Please use our online service to access the data.
|
||||
There are 9 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -46,7 +46,7 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
|
@ -60,9 +60,9 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.htaccess` | Medium
|
||||
2 | File | `/admin-panel1.php` | High
|
||||
3 | File | `/admin/?page=members/view_member` | High
|
||||
4 | File | `/admin/doctors/view_doctor.php` | High
|
||||
5 | File | `/admin/file-manager/` | High
|
||||
3 | File | `/admin.php/admin/plog/index.html` | High
|
||||
4 | File | `/admin.php/admin/ulog/index.html` | High
|
||||
5 | File | `/admin.php/admin/vod/data.html` | High
|
||||
6 | File | `/admin/files` | Medium
|
||||
7 | File | `/admin/login.php` | High
|
||||
8 | File | `/admin/news/news_mod.php` | High
|
||||
|
@ -70,19 +70,22 @@ ID | Type | Indicator | Confidence
|
|||
10 | File | `/admin/options` | High
|
||||
11 | File | `/admin/page_edit/3` | High
|
||||
12 | File | `/admin/templates/template_manage.php` | High
|
||||
13 | File | `/admin_page/all-files-update-ajax.php` | High
|
||||
14 | File | `/api/servers` | Medium
|
||||
15 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
|
||||
16 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
17 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
18 | File | `/common/info.cgi` | High
|
||||
19 | File | `/DataPackageTable` | High
|
||||
20 | File | `/download/` | Medium
|
||||
21 | File | `/etc/passwd` | Medium
|
||||
22 | File | `/goform/SetPptpServerCfg` | High
|
||||
23 | ... | ... | ...
|
||||
13 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
14 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
15 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
16 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
17 | File | `/common/info.cgi` | High
|
||||
18 | File | `/config/list` | Medium
|
||||
19 | File | `/controller/Index.php` | High
|
||||
20 | File | `/data/sqldata` | High
|
||||
21 | File | `/DataPackageTable` | High
|
||||
22 | File | `/download/` | Medium
|
||||
23 | File | `/etc/passwd` | Medium
|
||||
24 | File | `/factor/avx-ecm/vecarith52.c` | High
|
||||
25 | File | `/goform/delAd` | High
|
||||
26 | ... | ... | ...
|
||||
|
||||
There are 189 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 215 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -0,0 +1,37 @@
|
|||
# Babadeda - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Babadeda](https://vuldb.com/?actor.babadeda). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.babadeda](https://vuldb.com/?actor.babadeda)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following _campaigns_ are known and can be associated with Babadeda:
|
||||
|
||||
* Ukraine
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Babadeda.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [45.12.5.62](https://vuldb.com/?ip.45.12.5.62) | galya.gitarova.example.com | Ukraine | High
|
||||
2 | [185.244.41.109](https://vuldb.com/?ip.185.244.41.109) | - | Ukraine | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://twitter.com/s1ckb017/status/1494047314792665088
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,40 +1,40 @@
|
|||
# Babar - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Babar](https://vuldb.com/?actor.babar). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Babar](https://vuldb.com/?actor.babar). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.babar](https://vuldb.com/?actor.babar)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.babar](https://vuldb.com/?actor.babar)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Babar:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Babar:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Babar.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Babar.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 64.20.43.107 | vps238561.trouble-free.net | High
|
||||
2 | 69.25.212.153 | - | High
|
||||
3 | 83.149.75.58 | reserved.ps-it.nl | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [64.20.43.107](https://vuldb.com/?ip.64.20.43.107) | vps238561.trouble-free.net | - | High
|
||||
2 | [69.25.212.153](https://vuldb.com/?ip.69.25.212.153) | - | - | High
|
||||
3 | [83.149.75.58](https://vuldb.com/?ip.83.149.75.58) | reserved.ps-it.nl | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 12 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Babar. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Babar_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Babar. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Babar. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -43,17 +43,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `dc_categorieslist.asp` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 11 more IOA items available. Please use our online service to access the data.
|
||||
There are 11 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=Elephantosis.pdf&y=2015
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -29,7 +29,7 @@ There are 30 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Barys_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Barys_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -0,0 +1,30 @@
|
|||
# Bashlite - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bashlite](https://vuldb.com/?actor.bashlite). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bashlite](https://vuldb.com/?actor.bashlite)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Bashlite.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [185.244.25.213](https://vuldb.com/?ip.185.244.25.213) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.trendmicro.co.jp/archives/20879
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,6 +1,6 @@
|
|||
# BazarLoader - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BazarLoader](https://vuldb.com/?actor.bazarloader). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BazarLoader](https://vuldb.com/?actor.bazarloader). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bazarloader](https://vuldb.com/?actor.bazarloader)
|
||||
|
||||
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BazarLoader:
|
||||
|
||||
* US
|
||||
* DE
|
||||
* DK
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [DK](https://vuldb.com/?country.dk)
|
||||
* ...
|
||||
|
||||
There are 12 more country items available. Please use our online service to access the data.
|
||||
There are 21 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -21,24 +21,36 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 31.171.251.118 | ch.ns.mon0.li | - | High
|
||||
2 | 31.214.240.203 | - | - | High
|
||||
3 | 34.209.40.84 | ec2-34-209-40-84.us-west-2.compute.amazonaws.com | - | Medium
|
||||
4 | 34.221.188.35 | ec2-34-221-188-35.us-west-2.compute.amazonaws.com | - | Medium
|
||||
5 | 45.71.112.70 | host-45-71-112-70.nedetel.net | - | High
|
||||
6 | ... | ... | ... | ...
|
||||
1 | [13.225.230.232](https://vuldb.com/?ip.13.225.230.232) | server-13-225-230-232.jfk51.r.cloudfront.net | - | High
|
||||
2 | [13.226.32.216](https://vuldb.com/?ip.13.226.32.216) | server-13-226-32-216.ewr53.r.cloudfront.net | - | High
|
||||
3 | [18.67.60.164](https://vuldb.com/?ip.18.67.60.164) | server-18-67-60-164.iad89.r.cloudfront.net | - | High
|
||||
4 | [23.56.10.219](https://vuldb.com/?ip.23.56.10.219) | a23-56-10-219.deploy.static.akamaitechnologies.com | - | High
|
||||
5 | [23.62.25.178](https://vuldb.com/?ip.23.62.25.178) | a23-62-25-178.deploy.static.akamaitechnologies.com | - | High
|
||||
6 | [23.95.238.122](https://vuldb.com/?ip.23.95.238.122) | 23-95-238-122-host.colocrossing.com | - | High
|
||||
7 | [23.106.223.174](https://vuldb.com/?ip.23.106.223.174) | - | - | High
|
||||
8 | [23.160.193.217](https://vuldb.com/?ip.23.160.193.217) | unknown.ip-xfer.net | - | High
|
||||
9 | [23.193.217.119](https://vuldb.com/?ip.23.193.217.119) | a23-193-217-119.deploy.static.akamaitechnologies.com | - | High
|
||||
10 | [31.171.251.118](https://vuldb.com/?ip.31.171.251.118) | ch.ns.mon0.li | - | High
|
||||
11 | [31.214.240.203](https://vuldb.com/?ip.31.214.240.203) | - | - | High
|
||||
12 | [34.209.40.84](https://vuldb.com/?ip.34.209.40.84) | ec2-34-209-40-84.us-west-2.compute.amazonaws.com | - | Medium
|
||||
13 | [34.221.188.35](https://vuldb.com/?ip.34.221.188.35) | ec2-34-221-188-35.us-west-2.compute.amazonaws.com | - | Medium
|
||||
14 | [34.222.222.126](https://vuldb.com/?ip.34.222.222.126) | ec2-34-222-222-126.us-west-2.compute.amazonaws.com | - | Medium
|
||||
15 | [40.76.4.15](https://vuldb.com/?ip.40.76.4.15) | - | - | High
|
||||
16 | [40.112.72.205](https://vuldb.com/?ip.40.112.72.205) | - | - | High
|
||||
17 | [40.113.200.201](https://vuldb.com/?ip.40.113.200.201) | - | - | High
|
||||
18 | ... | ... | ... | ...
|
||||
|
||||
There are 22 more IOC items available. Please use our online service to access the data.
|
||||
There are 68 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by BazarLoader. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BazarLoader_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
|
@ -49,49 +61,74 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `.user` | Low
|
||||
2 | File | `/.dbus-keyrings` | High
|
||||
3 | File | `/cgi-bin/system_mgr.cgi` | High
|
||||
4 | File | `/Content/Template/root/reverse-shell.aspx` | High
|
||||
5 | File | `/debug/pprof` | Medium
|
||||
6 | File | `/inc/parser/xhtml.php` | High
|
||||
7 | File | `/includes/db_adodb.php` | High
|
||||
8 | File | `/PluXml/core/admin/parametres_edittpl.php` | High
|
||||
9 | File | `/register.do` | Medium
|
||||
10 | File | `/rest/project-templates/1.0/createshared` | High
|
||||
11 | File | `/restoreinfo.cgi` | High
|
||||
12 | File | `/services` | Medium
|
||||
13 | File | `/var/passwd` | Medium
|
||||
14 | File | `/var/run/storage_account_root` | High
|
||||
15 | File | `/webconsole/APIController` | High
|
||||
16 | File | `802dot1xclientcert.cgi` | High
|
||||
17 | File | `account.asp` | Medium
|
||||
18 | File | `Account.aspx` | Medium
|
||||
19 | File | `ActionsAndOperations` | High
|
||||
20 | File | `adclick.php` | Medium
|
||||
21 | File | `admin/db-backup-security/db-backup-security.php` | High
|
||||
22 | File | `admin/membersearch.php` | High
|
||||
23 | File | `agent_links.pl` | High
|
||||
24 | File | `Ap4StssAtom.cpp` | High
|
||||
25 | File | `Ap4StszAtom.cpp` | High
|
||||
26 | File | `apetag.c` | Medium
|
||||
27 | File | `apply_sec.cgi` | High
|
||||
28 | File | `article.php` | Medium
|
||||
29 | File | `asp` | Low
|
||||
30 | File | `attrs.c` | Low
|
||||
31 | File | `auth-gss2.c` | Medium
|
||||
32 | File | `auth.inc.php` | Medium
|
||||
33 | File | `authuser.php` | Medium
|
||||
34 | File | `bkr/server/widgets.py` | High
|
||||
35 | ... | ... | ...
|
||||
1 | File | `.htaccess` | Medium
|
||||
2 | File | `.user` | Low
|
||||
3 | File | `/.dbus-keyrings` | High
|
||||
4 | File | `/api` | Low
|
||||
5 | File | `/catalog/admin/categories.php?cPath=&action=new_product` | High
|
||||
6 | File | `/cgi-bin/system_mgr.cgi` | High
|
||||
7 | File | `/common/ticket_associated_tickets.php` | High
|
||||
8 | File | `/common/user_profile.php` | High
|
||||
9 | File | `/Content/Template/root/reverse-shell.aspx` | High
|
||||
10 | File | `/debug/pprof` | Medium
|
||||
11 | File | `/getcfg.php` | Medium
|
||||
12 | File | `/goform/form2userconfig.cgi` | High
|
||||
13 | File | `/include/makecvs.php` | High
|
||||
14 | File | `/includes/db_adodb.php` | High
|
||||
15 | File | `/objects/pluginSwitch.json.php` | High
|
||||
16 | File | `/PluXml/core/admin/parametres_edittpl.php` | High
|
||||
17 | File | `/register.do` | Medium
|
||||
18 | File | `/rest/api/latest/groupuserpicker` | High
|
||||
19 | File | `/rest/project-templates/1.0/createshared` | High
|
||||
20 | File | `/restoreinfo.cgi` | High
|
||||
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
22 | File | `/see_more_details.php` | High
|
||||
23 | File | `/sendrcpackage?keyid=-2544&keysymbol=-4081` | High
|
||||
24 | File | `/services` | Medium
|
||||
25 | File | `/uncpath/` | Medium
|
||||
26 | File | `/usr/local/vesta/bin` | High
|
||||
27 | File | `/usr/sbin/suexec` | High
|
||||
28 | File | `/v3/credentials` | High
|
||||
29 | File | `/var/log/monkeyd/master.log` | High
|
||||
30 | File | `/var/passwd` | Medium
|
||||
31 | File | `/var/run/storage_account_root` | High
|
||||
32 | File | `/webconsole/APIController` | High
|
||||
33 | File | `/websocket` | Medium
|
||||
34 | File | `802dot1xclientcert.cgi` | High
|
||||
35 | File | `account.asp` | Medium
|
||||
36 | File | `Account.aspx` | Medium
|
||||
37 | File | `ActionsAndOperations` | High
|
||||
38 | File | `adclick.php` | Medium
|
||||
39 | File | `add.php` | Low
|
||||
40 | File | `admin/?n=tags&c=index&a=doSaveTags` | High
|
||||
41 | File | `admin/admin.shtml` | High
|
||||
42 | File | `admin/db-backup-security/db-backup-security.php` | High
|
||||
43 | File | `admin/graph_trend.php` | High
|
||||
44 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
45 | File | `adminquery.php` | High
|
||||
46 | File | `agent_links.pl` | High
|
||||
47 | File | `Ap4StssAtom.cpp` | High
|
||||
48 | File | `Ap4StszAtom.cpp` | High
|
||||
49 | File | `apetag.c` | Medium
|
||||
50 | File | `app/system/language/admin/language_general.class.php` | High
|
||||
51 | File | `apply_sec.cgi` | High
|
||||
52 | File | `app\contacts\contact_times.php` | High
|
||||
53 | File | `Archive.java` | Medium
|
||||
54 | File | `article.php` | Medium
|
||||
55 | ... | ... | ...
|
||||
|
||||
There are 299 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 484 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.talosintelligence.com/2021/05/threat-roundup-0514-0521.html
|
||||
* https://blog.talosintelligence.com/2022/02/threat-roundup-0211-0218.html
|
||||
* https://blog.talosintelligence.com/2022/03/threat-roundup-0311-0318.html
|
||||
* https://isc.sans.edu/forums/diary/April+2021+Forensic+Quiz+Answers+and+Analysis/27308/
|
||||
* https://isc.sans.edu/forums/diary/Stolen+Images+Evidence+Campaign+Continues+Pushing+BazarLoader+Malware/27816/
|
||||
* https://isc.sans.edu/forums/diary/TA551+Shathak+continues+pushing+BazarLoader+infections+lead+to+Cobalt+Strike/27738/
|
||||
* https://twitter.com/_pr4gma/status/1347617681197961225
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -9,11 +9,11 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Black KingDom:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [MX](https://vuldb.com/?country.mx)
|
||||
* ...
|
||||
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
There are 8 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -35,11 +35,11 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
There are 9 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -49,28 +49,32 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.htaccess` | Medium
|
||||
2 | File | `/admin-panel1.php` | High
|
||||
3 | File | `/admin/login.php` | High
|
||||
4 | File | `/admin/templates/template_manage.php` | High
|
||||
5 | File | `/adminzone/index.php?page=admin-commandr` | High
|
||||
6 | File | `/api/servers` | Medium
|
||||
7 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
|
||||
8 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
9 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
10 | File | `/core/admin/comment.php` | High
|
||||
11 | File | `/DataPackageTable` | High
|
||||
12 | File | `/download/` | Medium
|
||||
13 | File | `/etc/passwd` | Medium
|
||||
14 | File | `/etc/wpa_supplicant.conf` | High
|
||||
15 | File | `/goform/SetPptpServerCfg` | High
|
||||
16 | File | `/i/:data/ipa.plist` | High
|
||||
17 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
18 | File | `/js/js-parser.c` | High
|
||||
19 | File | `/main?cmd=invalid_browser` | High
|
||||
20 | File | `/mdiy/dict/listExcludeApp` | High
|
||||
21 | File | `/ms/file/uploadTemplate.do` | High
|
||||
22 | ... | ... | ...
|
||||
3 | File | `/admin.php/admin/ulog/index.html` | High
|
||||
4 | File | `/admin.php/admin/vod/data.html` | High
|
||||
5 | File | `/admin/login.php` | High
|
||||
6 | File | `/admin/templates/template_manage.php` | High
|
||||
7 | File | `/api/servers` | Medium
|
||||
8 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
|
||||
9 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
10 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
11 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
12 | File | `/core/admin/comment.php` | High
|
||||
13 | File | `/data/sqldata` | High
|
||||
14 | File | `/DataPackageTable` | High
|
||||
15 | File | `/download/` | Medium
|
||||
16 | File | `/etc/passwd` | Medium
|
||||
17 | File | `/etc/wpa_supplicant.conf` | High
|
||||
18 | File | `/factor/avx-ecm/vecarith52.c` | High
|
||||
19 | File | `/goform/delAd` | High
|
||||
20 | File | `/goform/form2Reboot.cgi` | High
|
||||
21 | File | `/goform/SetLanInfo` | High
|
||||
22 | File | `/goform/SetPptpServerCfg` | High
|
||||
23 | File | `/i/:data/ipa.plist` | High
|
||||
24 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
25 | File | `/js/js-parser.c` | High
|
||||
26 | ... | ... | ...
|
||||
|
||||
There are 180 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 216 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
# BlackTech - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackTech](https://vuldb.com/?actor.blacktech). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlackTech](https://vuldb.com/?actor.blacktech). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.blacktech](https://vuldb.com/?actor.blacktech)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.blacktech](https://vuldb.com/?actor.blacktech)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with BlackTech:
|
||||
The following _campaigns_ are known and can be associated with BlackTech:
|
||||
|
||||
* Taiwan Government Agencies
|
||||
* TSCookie
|
||||
|
@ -14,51 +14,60 @@ The following campaigns are known and can be associated with BlackTech:
|
|||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackTech:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlackTech:
|
||||
|
||||
* CN
|
||||
* MS
|
||||
* US
|
||||
* [MS](https://vuldb.com/?country.ms)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of BlackTech.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BlackTech.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 10.0.0.211 | - | High
|
||||
2 | 43.240.12.81 | mail.terascape.net | High
|
||||
3 | 45.76.102.145 | 45.76.102.145.vultr.com | Medium
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [10.0.0.211](https://vuldb.com/?ip.10.0.0.211) | - | WaterBear | High
|
||||
2 | [43.240.12.81](https://vuldb.com/?ip.43.240.12.81) | mail.terascape.net | Taiwan Government Agencies | High
|
||||
3 | [45.76.102.145](https://vuldb.com/?ip.45.76.102.145) | 45.76.102.145.vultr.com | TSCookie | Medium
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by BlackTech. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlackTech_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1600 | Cryptographic Issues | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackTech. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlackTech. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/wp-json/oembed/1.0/embed?url` | High
|
||||
2 | File | `base/ErrorHandler.php` | High
|
||||
3 | File | `goto.php` | Medium
|
||||
4 | ... | ... | ...
|
||||
1 | File | `/mifs/c/i/reg/reg.html` | High
|
||||
2 | File | `/server-info` | Medium
|
||||
3 | File | `/wp-json/oembed/1.0/embed?url` | High
|
||||
4 | File | `a2billing/customer/iridium_threed.php` | High
|
||||
5 | File | `admin.php?s=/Channel/add.html` | High
|
||||
6 | File | `admin/class-bulk-editor-list-table.php` | High
|
||||
7 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
8 | File | `auth.asp` | Medium
|
||||
9 | File | `base/ErrorHandler.php` | High
|
||||
10 | ... | ... | ...
|
||||
|
||||
There are 8 more IOA items available. Please use our online service to access the data.
|
||||
There are 72 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blogs.jpcert.or.jp/en/2018/03/malware-tscooki-7aa0.html
|
||||
* https://www.ithome.com.tw/news/139504
|
||||
|
@ -67,7 +76,7 @@ The following list contains external sources which discuss the actor and the ass
|
|||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -0,0 +1,62 @@
|
|||
# BlueNoroff - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [BlueNoroff](https://vuldb.com/?actor.bluenoroff). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bluenoroff](https://vuldb.com/?actor.bluenoroff)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BlueNoroff:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [VN](https://vuldb.com/?country.vn)
|
||||
* [BR](https://vuldb.com/?country.br)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of BlueNoroff.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [45.238.25.2](https://vuldb.com/?ip.45.238.25.2) | ip-45-238-25-2.interlink.com.br | - | High
|
||||
2 | [118.70.116.154](https://vuldb.com/?ip.118.70.116.154) | - | - | High
|
||||
3 | [163.25.24.44](https://vuldb.com/?ip.163.25.24.44) | - | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _BlueNoroff_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1211 | CWE-254 | 7PK Security Features | High
|
||||
2 | T1600 | CWE-310, CWE-311 | Cryptographic Issues | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by BlueNoroff. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
2 | File | `auth.php` | Medium
|
||||
3 | File | `class_gw_2checkout.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 19 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,6 +1,6 @@
|
|||
# Bunse - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bunse](https://vuldb.com/?actor.bunse). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Bunse](https://vuldb.com/?actor.bunse). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.bunse](https://vuldb.com/?actor.bunse)
|
||||
|
||||
|
@ -14,8 +14,8 @@ The following _campaigns_ are known and can be associated with Bunse:
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Bunse:
|
||||
|
||||
* ES
|
||||
* US
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -23,8 +23,8 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 62.171.157.185 | vmi479022.contaboserver.net | Afghanistan and India | High
|
||||
2 | 95.111.241.233 | vmi698587.contaboserver.net | Afghanistan and India | High
|
||||
1 | [62.171.157.185](https://vuldb.com/?ip.62.171.157.185) | vmi479022.contaboserver.net | Afghanistan and India | High
|
||||
2 | [95.111.241.233](https://vuldb.com/?ip.95.111.241.233) | vmi698587.contaboserver.net | Afghanistan and India | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
|
|
@ -56,39 +56,39 @@ ID | Type | Indicator | Confidence
|
|||
4 | File | `/Admin/Views/FileEditor/` | High
|
||||
5 | File | `/article/add` | Medium
|
||||
6 | File | `/cgi-bin/editBookmark` | High
|
||||
7 | File | `/computer/(agent-name)/api` | High
|
||||
8 | File | `/controller/pay.class.php` | High
|
||||
9 | File | `/dev/block/mmcblk0rpmb` | High
|
||||
10 | File | `/dev/kmem` | Medium
|
||||
11 | File | `/dev/shm` | Medium
|
||||
12 | File | `/dev/snd/seq` | Medium
|
||||
13 | File | `/device/device=140/tab=wifi/view` | High
|
||||
14 | File | `/dl/dl_print.php` | High
|
||||
15 | File | `/getcfg.php` | Medium
|
||||
16 | File | `/goform/addressNat` | High
|
||||
17 | File | `/htdocs/admin/dict.php?id=3` | High
|
||||
18 | File | `/include/menu_v.inc.php` | High
|
||||
19 | File | `/includes/rrdtool.inc.php` | High
|
||||
20 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
|
||||
21 | File | `/jerry-core/ecma/base/ecma-gc.c` | High
|
||||
22 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
|
||||
23 | File | `/login` | Low
|
||||
24 | File | `/module/module_frame/index.php` | High
|
||||
25 | File | `/notice-edit.php` | High
|
||||
26 | File | `/nova/bin/sniffer` | High
|
||||
27 | File | `/proc/pid/syscall` | High
|
||||
28 | File | `/product_list.php` | High
|
||||
29 | File | `/rest/api/2/user/picker` | High
|
||||
30 | File | `/rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application` | High
|
||||
31 | File | `/services/details.asp` | High
|
||||
32 | File | `/src/core/controllers/cm.php` | High
|
||||
33 | File | `/storage/app/media/evil.svg` | High
|
||||
34 | File | `/transmission/web/` | High
|
||||
35 | File | `/uapi/doc` | Medium
|
||||
36 | File | `/uncpath/` | Medium
|
||||
7 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
8 | File | `/computer/(agent-name)/api` | High
|
||||
9 | File | `/controller/pay.class.php` | High
|
||||
10 | File | `/dev/block/mmcblk0rpmb` | High
|
||||
11 | File | `/dev/kmem` | Medium
|
||||
12 | File | `/dev/shm` | Medium
|
||||
13 | File | `/dev/snd/seq` | Medium
|
||||
14 | File | `/device/device=140/tab=wifi/view` | High
|
||||
15 | File | `/dl/dl_print.php` | High
|
||||
16 | File | `/getcfg.php` | Medium
|
||||
17 | File | `/goform/addressNat` | High
|
||||
18 | File | `/htdocs/admin/dict.php?id=3` | High
|
||||
19 | File | `/include/menu_v.inc.php` | High
|
||||
20 | File | `/includes/rrdtool.inc.php` | High
|
||||
21 | File | `/irj/servlet/prt/portal/prtroot/com.sap.portal.usermanagement.admin.UserMapping` | High
|
||||
22 | File | `/jerry-core/ecma/base/ecma-gc.c` | High
|
||||
23 | File | `/jerry-core/ecma/base/ecma-helpers-conversion.c` | High
|
||||
24 | File | `/login` | Low
|
||||
25 | File | `/module/module_frame/index.php` | High
|
||||
26 | File | `/notice-edit.php` | High
|
||||
27 | File | `/nova/bin/sniffer` | High
|
||||
28 | File | `/proc/pid/syscall` | High
|
||||
29 | File | `/product_list.php` | High
|
||||
30 | File | `/rest/api/2/user/picker` | High
|
||||
31 | File | `/rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application` | High
|
||||
32 | File | `/services/details.asp` | High
|
||||
33 | File | `/src/core/controllers/cm.php` | High
|
||||
34 | File | `/storage/app/media/evil.svg` | High
|
||||
35 | File | `/transmission/web/` | High
|
||||
36 | File | `/uapi/doc` | Medium
|
||||
37 | ... | ... | ...
|
||||
|
||||
There are 313 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 316 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -4,13 +4,19 @@ These _indicators_ were reported, collected, and generated during the [VulDB CTI
|
|||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.chafer](https://vuldb.com/?actor.chafer)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following _campaigns_ are known and can be associated with Chafer:
|
||||
|
||||
* Remexi
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Chafer:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* [IR](https://vuldb.com/?country.ir)
|
||||
* ...
|
||||
|
||||
There are 18 more country items available. Please use our online service to access the data.
|
||||
|
@ -26,7 +32,7 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
3 | [89.38.97.115](https://vuldb.com/?ip.89.38.97.115) | 89-38-97-115.hosted-by-worldstream.net | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more IOC items available. Please use our online service to access the data.
|
||||
There are 8 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -50,17 +56,19 @@ ID | Type | Indicator | Confidence
|
|||
1 | File | `//etc/RT2870STA.dat` | High
|
||||
2 | File | `/admin/index.php?id=themes&action=edit_template&filename=blog` | High
|
||||
3 | File | `/cwp_{SESSION_HASH}/admin/loader_ajax.php` | High
|
||||
4 | File | `/magnoliaPublic/travel/members/login.html` | High
|
||||
5 | File | `/Main_AdmStatus_Content.asp` | High
|
||||
6 | File | `/uncpath/` | Medium
|
||||
7 | ... | ... | ...
|
||||
4 | File | `/jquery_file_upload/server/php/index.php` | High
|
||||
5 | File | `/magnoliaPublic/travel/members/login.html` | High
|
||||
6 | File | `/Main_AdmStatus_Content.asp` | High
|
||||
7 | File | `/uncpath/` | Medium
|
||||
8 | ... | ... | ...
|
||||
|
||||
There are 50 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 57 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://securelist.com/chafer-used-remexi-malware/89538/
|
||||
* https://www.threatminer.org/report.php?q=Chafer_LatestAttacksRevealHeightenedAmbitions_SymantecBlogs.pdf&y=2018
|
||||
* https://www.threatminer.org/_reports/2019/NewPython-BasedPayloadMechaFlounderUsedbyChafer.pdf#viewer.action=download
|
||||
|
||||
|
|
|
@ -8,6 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
The following _campaigns_ are known and can be associated with Charming Kitten:
|
||||
|
||||
* CVE-2021-34473 / CVE-2021-34523 / CVE-2021-31207
|
||||
* Log4Shell
|
||||
|
||||
## Countries
|
||||
|
@ -51,7 +52,7 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
22 | [69.30.221.126](https://vuldb.com/?ip.69.30.221.126) | - | - | High
|
||||
23 | ... | ... | ... | ...
|
||||
|
||||
There are 88 more IOC items available. Please use our online service to access the data.
|
||||
There are 89 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -101,9 +102,10 @@ ID | Type | Indicator | Confidence
|
|||
27 | File | `actions/CompanyDetailsSave.php` | High
|
||||
28 | File | `ActiveServices.java` | High
|
||||
29 | File | `ActivityManagerService.java` | High
|
||||
30 | ... | ... | ...
|
||||
30 | File | `admin.php` | Medium
|
||||
31 | ... | ... | ...
|
||||
|
||||
There are 259 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 262 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -111,6 +113,7 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
|
||||
* https://github.com/blackorbird/APT_REPORT/tree/master/Charming%20Kitten
|
||||
* https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/
|
||||
* https://thedfirreport.com/2022/03/21/apt35-automates-initial-access-using-proxyshell/
|
||||
* https://vxug.fakedoma.in/archive/APTs/2021/2021.01.08/Charming%20Kitten.pdf
|
||||
* https://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf
|
||||
|
||||
|
|
|
@ -1,49 +1,78 @@
|
|||
# China Unknown - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [China Unknown](https://vuldb.com/?actor.china_unknown). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [China Unknown](https://vuldb.com/?actor.china_unknown). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.china_unknown](https://vuldb.com/?actor.china_unknown)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.china_unknown](https://vuldb.com/?actor.china_unknown)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with China Unknown:
|
||||
The following _campaigns_ are known and can be associated with China Unknown:
|
||||
|
||||
* Dragon Castling
|
||||
* RedXOR
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with China Unknown:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with China Unknown:
|
||||
|
||||
* CN
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* ...
|
||||
|
||||
There are 2 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of China Unknown.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of China Unknown.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 34.92.228.216 | 216.228.92.34.bc.googleusercontent.com | Medium
|
||||
2 | 158.247.208.230 | 158.247.208.230.vultr.com | Medium
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [23.106.123.196](https://vuldb.com/?ip.23.106.123.196) | - | Dragon Castling | High
|
||||
2 | [23.106.124.136](https://vuldb.com/?ip.23.106.124.136) | - | Dragon Castling | High
|
||||
3 | [34.92.228.216](https://vuldb.com/?ip.34.92.228.216) | 216.228.92.34.bc.googleusercontent.com | RedXOR | Medium
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _China Unknown_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by China Unknown. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by China Unknown. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `index.php` | Medium
|
||||
2 | File | `wp-includes/class-wp-query.php` | High
|
||||
3 | Argument | `tid` | Low
|
||||
1 | File | `/public/plugins/` | High
|
||||
2 | File | `/rom-0` | Low
|
||||
3 | File | `/uncpath/` | Medium
|
||||
4 | File | `actions/ChangeConfiguration.html` | High
|
||||
5 | File | `ajaxfilemanager.php` | High
|
||||
6 | ... | ... | ...
|
||||
|
||||
There are 42 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://github.com/avast/ioc/tree/master/OperationDragonCastling
|
||||
* https://vxug.fakedoma.in/archive/APTs/2021/2021.03.10(1)/RedXOR.pdf
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,57 +1,57 @@
|
|||
# Cleaver - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cleaver](https://vuldb.com/?actor.cleaver). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cleaver](https://vuldb.com/?actor.cleaver). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cleaver](https://vuldb.com/?actor.cleaver)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cleaver](https://vuldb.com/?actor.cleaver)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with Cleaver:
|
||||
The following _campaigns_ are known and can be associated with Cleaver:
|
||||
|
||||
* Cleaver
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cleaver:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cleaver:
|
||||
|
||||
* US
|
||||
* CA
|
||||
* NL
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CA](https://vuldb.com/?country.ca)
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
* ...
|
||||
|
||||
There are 6 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Cleaver.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Cleaver.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 23.238.17.181 | s1.regulatorfix.com | High
|
||||
2 | 50.23.164.161 | a1.a4.1732.ip4.static.sl-reverse.com | High
|
||||
3 | 64.120.128.154 | - | High
|
||||
4 | 64.120.208.74 | - | High
|
||||
5 | 64.120.208.75 | - | High
|
||||
6 | 64.120.208.76 | - | High
|
||||
7 | 64.120.208.78 | - | High
|
||||
8 | 66.96.252.198 | host-66-96-252-198.myrepublic.co.id | High
|
||||
9 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [23.238.17.181](https://vuldb.com/?ip.23.238.17.181) | s1.regulatorfix.com | Cleaver | High
|
||||
2 | [50.23.164.161](https://vuldb.com/?ip.50.23.164.161) | a1.a4.1732.ip4.static.sl-reverse.com | Cleaver | High
|
||||
3 | [64.120.128.154](https://vuldb.com/?ip.64.120.128.154) | - | Cleaver | High
|
||||
4 | [64.120.208.74](https://vuldb.com/?ip.64.120.208.74) | - | Cleaver | High
|
||||
5 | [64.120.208.75](https://vuldb.com/?ip.64.120.208.75) | - | Cleaver | High
|
||||
6 | [64.120.208.76](https://vuldb.com/?ip.64.120.208.76) | - | Cleaver | High
|
||||
7 | [64.120.208.78](https://vuldb.com/?ip.64.120.208.78) | - | Cleaver | High
|
||||
8 | [66.96.252.198](https://vuldb.com/?ip.66.96.252.198) | host-66-96-252-198.myrepublic.co.id | Cleaver | High
|
||||
9 | ... | ... | ... | ...
|
||||
|
||||
There are 32 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Cleaver. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cleaver_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1587.003 | Improper Certificate Validation | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1587.003 | CWE-295 | Improper Certificate Validation | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cleaver. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cleaver. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -60,18 +60,18 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `adclick.php` | Medium
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 24 more IOA items available. Please use our online service to access the data.
|
||||
There are 25 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.cylance.com/content/dam/cylance/pages/operation-cleaver/Cylance_Operation_Cleaver_Report.pdf
|
||||
* https://www.threatminer.org/report.php?q=Cylance_Operation_Cleaver_Report.pdf&y=2014
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Group:
|
||||
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* [IT](https://vuldb.com/?country.it)
|
||||
* [SV](https://vuldb.com/?country.sv)
|
||||
* ...
|
||||
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
There are 6 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -31,7 +31,7 @@ There are 16 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Cobalt Group_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cobalt Group_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -51,28 +51,28 @@ ID | Type | Indicator | Confidence
|
|||
1 | File | `/account/login` | High
|
||||
2 | File | `/admin.back` | Medium
|
||||
3 | File | `/admin.html?do=user&act=add` | High
|
||||
4 | File | `/administrator/components/menu/` | High
|
||||
5 | File | `/controller/CommentAdminController.java` | High
|
||||
6 | File | `/event-management/index.php` | High
|
||||
7 | File | `/goform/change_password_process` | High
|
||||
8 | File | `/goform/edit_opt` | High
|
||||
9 | File | `/goform/SetPptpServerCfg` | High
|
||||
10 | File | `/hdf5/src/H5Fint.c` | High
|
||||
11 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
12 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
|
||||
13 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
|
||||
14 | File | `/jerry-core/ecma/operations/ecma-objects.c` | High
|
||||
15 | File | `/secure/admin/ImporterFinishedPage.jspa` | High
|
||||
16 | File | `/src/njs_object.c` | High
|
||||
17 | File | `/template/unzip.do` | High
|
||||
18 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
19 | File | `AccountManagerService.java` | High
|
||||
20 | File | `account_sponsor_page.php` | High
|
||||
21 | File | `act.php` | Low
|
||||
22 | File | `adduser.do` | Medium
|
||||
4 | File | `/admin/customers.php?page=1&cID` | High
|
||||
5 | File | `/admin/link/link_ok.php` | High
|
||||
6 | File | `/administrator/components/menu/` | High
|
||||
7 | File | `/controller/CommentAdminController.java` | High
|
||||
8 | File | `/event-management/index.php` | High
|
||||
9 | File | `/goform/change_password_process` | High
|
||||
10 | File | `/goform/edit_opt` | High
|
||||
11 | File | `/goform/SetPptpServerCfg` | High
|
||||
12 | File | `/hdf5/src/H5Fint.c` | High
|
||||
13 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
14 | File | `/jerry-core/ecma/base/ecma-literal-storage.c` | High
|
||||
15 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
|
||||
16 | File | `/jerry-core/ecma/operations/ecma-objects.c` | High
|
||||
17 | File | `/src/njs_object.c` | High
|
||||
18 | File | `/template/unzip.do` | High
|
||||
19 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
20 | File | `AccountManagerService.java` | High
|
||||
21 | File | `account_sponsor_page.php` | High
|
||||
22 | File | `act.php` | Low
|
||||
23 | ... | ... | ...
|
||||
|
||||
There are 196 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 193 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,69 +1,124 @@
|
|||
# Cobalt Strike - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cobalt Strike](https://vuldb.com/?actor.cobalt_strike). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Cobalt Strike](https://vuldb.com/?actor.cobalt_strike). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.cobalt_strike](https://vuldb.com/?actor.cobalt_strike)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.cobalt_strike](https://vuldb.com/?actor.cobalt_strike)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Strike:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Cobalt Strike:
|
||||
|
||||
* US
|
||||
* CN
|
||||
* IT
|
||||
* [SV](https://vuldb.com/?country.sv)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [PL](https://vuldb.com/?country.pl)
|
||||
* ...
|
||||
|
||||
There are 3 more country items available. Please use our online service to access the data.
|
||||
There are 11 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Cobalt Strike.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Cobalt Strike.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 23.108.57.108 | - | High
|
||||
2 | 62.128.111.176 | - | High
|
||||
3 | 82.118.21.221 | vds-887334.hosted-by-itldc.com | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [23.82.140.91](https://vuldb.com/?ip.23.82.140.91) | - | - | High
|
||||
2 | [23.108.57.108](https://vuldb.com/?ip.23.108.57.108) | - | - | High
|
||||
3 | [62.128.111.176](https://vuldb.com/?ip.62.128.111.176) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more IOC items available. Please use our online service to access the data.
|
||||
There are 9 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Cobalt Strike. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Cobalt Strike_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1499 | Resource Consumption | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1222 | CWE-275 | Permission Issues | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cobalt Strike. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Cobalt Strike. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/admin/success_story.php` | High
|
||||
2 | File | `/etc/tomcat8/Catalina/attack` | High
|
||||
3 | File | `/movie-portal-script/movie.php` | High
|
||||
4 | File | `/notice-edit.php` | High
|
||||
5 | File | `/wp-content/plugins/updraftplus/admin.php` | High
|
||||
6 | File | `admin/images.php` | High
|
||||
7 | File | `admin/preview.php` | High
|
||||
8 | File | `archive_read_support_format_rar5.c` | High
|
||||
9 | File | `blanko.preview.php` | High
|
||||
10 | File | `burl.c` | Low
|
||||
11 | File | `CFM File Handler` | High
|
||||
12 | File | `cgi-bin/awstats.pl` | High
|
||||
13 | ... | ... | ...
|
||||
1 | File | `/.ssh/authorized_keys` | High
|
||||
2 | File | `/?admin/user.html` | High
|
||||
3 | File | `/admin/success_story.php` | High
|
||||
4 | File | `/configuration/httpListenerEdit.jsf` | High
|
||||
5 | File | `/etc/tomcat8/Catalina/attack` | High
|
||||
6 | File | `/movie-portal-script/movie.php` | High
|
||||
7 | File | `/notice-edit.php` | High
|
||||
8 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
|
||||
9 | File | `/tmp` | Low
|
||||
10 | File | `/wp-content/plugins/updraftplus/admin.php` | High
|
||||
11 | File | `4.2.0.CP08` | Medium
|
||||
12 | File | `account.asp` | Medium
|
||||
13 | File | `acerctrl.ocx` | Medium
|
||||
14 | File | `activate.php` | Medium
|
||||
15 | File | `add.php` | Low
|
||||
16 | File | `addressbook/csv_import.php` | High
|
||||
17 | File | `adm/krgourl.php` | High
|
||||
18 | File | `admin.php` | Medium
|
||||
19 | File | `admin/admin.php` | High
|
||||
20 | File | `admin/adminaddeditdetails.php` | High
|
||||
21 | File | `admin/ajaxsave.php` | High
|
||||
22 | File | `admin/auth.php` | High
|
||||
23 | File | `admin/config.php` | High
|
||||
24 | File | `admin/images.php` | High
|
||||
25 | File | `ADMIN/loginaction.php` | High
|
||||
26 | File | `admin/member_details.php` | High
|
||||
27 | File | `admin/preview.php` | High
|
||||
28 | File | `ajax/addComment.php` | High
|
||||
29 | File | `App_Data/sb.mdb` | High
|
||||
30 | File | `archive_read_support_format_rar5.c` | High
|
||||
31 | File | `article.php` | Medium
|
||||
32 | File | `asp:.jpg` | Medium
|
||||
33 | File | `auth-options.c` | High
|
||||
34 | File | `auth2-gss.c` | Medium
|
||||
35 | File | `aviso.php` | Medium
|
||||
36 | File | `backup.php` | Medium
|
||||
37 | File | `bios.php` | Medium
|
||||
38 | File | `blanko.preview.php` | High
|
||||
39 | File | `blocks.php` | Medium
|
||||
40 | File | `breadcrumbs_create.php` | High
|
||||
41 | File | `browse.php` | Medium
|
||||
42 | File | `browse_ladies.php` | High
|
||||
43 | File | `burl.c` | Low
|
||||
44 | File | `cadena_ofertas_ext.php` | High
|
||||
45 | File | `cal_popup.php` | High
|
||||
46 | File | `category-delete.php` | High
|
||||
47 | File | `category.php` | Medium
|
||||
48 | File | `CFM File Handler` | High
|
||||
49 | File | `cgi-bin/awstats.pl` | High
|
||||
50 | File | `Change-password.php` | High
|
||||
51 | File | `charts.php` | Medium
|
||||
52 | File | `classified.php` | High
|
||||
53 | File | `client.c` | Medium
|
||||
54 | File | `cmd.php` | Low
|
||||
55 | File | `comment.php` | Medium
|
||||
56 | File | `comments.php` | Medium
|
||||
57 | File | `config.php` | Medium
|
||||
58 | File | `controller/fetchpwd.php` | High
|
||||
59 | File | `core/stack/l2cap/l2cap_sm.c` | High
|
||||
60 | File | `country_escorts.php` | High
|
||||
61 | File | `cource.php` | Medium
|
||||
62 | ... | ... | ...
|
||||
|
||||
There are 98 more IOA items available. Please use our online service to access the data.
|
||||
There are 547 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://isc.sans.edu/forums/diary/Example+of+Cobalt+Strike+from+Emotet+infection/28318/
|
||||
* https://isc.sans.edu/forums/diary/Qakbot+infection+with+Cobalt+Strike+and+VNC+activity/28448/
|
||||
* https://research.checkpoint.com/2019/cobalt-group-returns-to-kazakhstan/
|
||||
* https://twitter.com/malware_traffic/status/1400876426497253379
|
||||
* https://twitter.com/malware_traffic/status/1415740795622248452
|
||||
* https://twitter.com/Unit42_Intel/status/1392174941181812737
|
||||
|
@ -72,7 +127,7 @@ The following list contains external sources which discuss the actor and the ass
|
|||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -29,19 +29,19 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.39.23.192](https://vuldb.com/?ip.5.39.23.192) | ip192.ip-5-39-23.eu | - | High
|
||||
2 | [5.135.85.16](https://vuldb.com/?ip.5.135.85.16) | flotweb-o20.bestonthenet.fr | - | High
|
||||
3 | [46.165.207.98](https://vuldb.com/?ip.46.165.207.98) | - | - | High
|
||||
4 | [46.165.207.99](https://vuldb.com/?ip.46.165.207.99) | - | - | High
|
||||
5 | [46.165.207.108](https://vuldb.com/?ip.46.165.207.108) | - | - | High
|
||||
6 | [46.165.207.109](https://vuldb.com/?ip.46.165.207.109) | - | - | High
|
||||
7 | [46.165.207.112](https://vuldb.com/?ip.46.165.207.112) | - | - | High
|
||||
8 | [46.165.207.113](https://vuldb.com/?ip.46.165.207.113) | - | - | High
|
||||
3 | [23.81.246.170](https://vuldb.com/?ip.23.81.246.170) | - | - | High
|
||||
4 | [46.165.207.98](https://vuldb.com/?ip.46.165.207.98) | - | - | High
|
||||
5 | [46.165.207.99](https://vuldb.com/?ip.46.165.207.99) | - | - | High
|
||||
6 | [46.165.207.108](https://vuldb.com/?ip.46.165.207.108) | - | - | High
|
||||
7 | [46.165.207.109](https://vuldb.com/?ip.46.165.207.109) | - | - | High
|
||||
8 | [46.165.207.112](https://vuldb.com/?ip.46.165.207.112) | - | - | High
|
||||
9 | ... | ... | ... | ...
|
||||
|
||||
There are 33 more IOC items available. Please use our online service to access the data.
|
||||
There are 34 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Confucius_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Confucius_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -60,8 +60,8 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `$SPLUNK_HOME/etc/splunk-launch.conf` | High
|
||||
2 | File | `/+CSCOE+/logon.html` | High
|
||||
3 | File | `/admin/index.php` | High
|
||||
4 | File | `/assets/ctx` | Medium
|
||||
3 | File | `/assets/ctx` | Medium
|
||||
4 | File | `/cloud_config/router_post/check_reg_verify_code` | High
|
||||
5 | File | `/concat?/%2557EB-INF/web.xml` | High
|
||||
6 | File | `/config/getuser` | High
|
||||
7 | File | `/debug/pprof` | Medium
|
||||
|
@ -75,58 +75,56 @@ ID | Type | Indicator | Confidence
|
|||
15 | File | `/osm/REGISTER.cmd` | High
|
||||
16 | File | `/product_list.php` | High
|
||||
17 | File | `/replication` | Medium
|
||||
18 | File | `/see_more_details.php` | High
|
||||
19 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
|
||||
20 | File | `/supervisor/procesa_carga.php` | High
|
||||
21 | File | `/type.php` | Medium
|
||||
22 | File | `/uncpath/` | Medium
|
||||
23 | File | `/usr/bin/pkexec` | High
|
||||
24 | File | `/zm/index.php` | High
|
||||
25 | File | `4.2.0.CP09` | Medium
|
||||
26 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
27 | File | `802dot1xclientcert.cgi` | High
|
||||
28 | File | `add.exe` | Low
|
||||
29 | File | `addentry.php` | Medium
|
||||
30 | File | `admin-ajax.php` | High
|
||||
31 | File | `admin.color.php` | High
|
||||
32 | File | `admin.cropcanvas.php` | High
|
||||
33 | File | `admin.joomlaradiov5.php` | High
|
||||
34 | File | `admin.php` | Medium
|
||||
35 | File | `admin.php?m=Food&a=addsave` | High
|
||||
36 | File | `admin/category.inc.php` | High
|
||||
37 | File | `admin/conf_users_edit.php` | High
|
||||
38 | File | `admin/index.php` | High
|
||||
39 | File | `admin/user.php` | High
|
||||
40 | File | `admin/write-post.php` | High
|
||||
41 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
42 | File | `admin_events.php` | High
|
||||
43 | File | `ajax_new_account.php` | High
|
||||
44 | File | `akocomments.php` | High
|
||||
45 | File | `allopass-error.php` | High
|
||||
46 | File | `announcement.php` | High
|
||||
47 | File | `app.php` | Low
|
||||
48 | File | `apply.cgi` | Medium
|
||||
49 | File | `archiver\index.php` | High
|
||||
50 | File | `artlinks.dispnew.php` | High
|
||||
51 | File | `auth.inc.php` | Medium
|
||||
52 | File | `authorization.do` | High
|
||||
53 | File | `awstats.pl` | Medium
|
||||
54 | File | `backoffice/login.asp` | High
|
||||
55 | File | `bb_usage_stats.php` | High
|
||||
56 | File | `binder.c` | Medium
|
||||
57 | File | `bl-kernel/ajax/upload-images.php` | High
|
||||
58 | File | `books.php` | Medium
|
||||
59 | File | `C:\Python27` | Medium
|
||||
60 | File | `C:\Windows\System32\config\SAM` | High
|
||||
61 | ... | ... | ...
|
||||
18 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
|
||||
19 | File | `/supervisor/procesa_carga.php` | High
|
||||
20 | File | `/type.php` | Medium
|
||||
21 | File | `/uncpath/` | Medium
|
||||
22 | File | `/usr/bin/pkexec` | High
|
||||
23 | File | `/zm/index.php` | High
|
||||
24 | File | `4.2.0.CP09` | Medium
|
||||
25 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
26 | File | `802dot1xclientcert.cgi` | High
|
||||
27 | File | `add.exe` | Low
|
||||
28 | File | `addentry.php` | Medium
|
||||
29 | File | `admin-ajax.php` | High
|
||||
30 | File | `admin.color.php` | High
|
||||
31 | File | `admin.cropcanvas.php` | High
|
||||
32 | File | `admin.joomlaradiov5.php` | High
|
||||
33 | File | `admin.php` | Medium
|
||||
34 | File | `admin.php?m=Food&a=addsave` | High
|
||||
35 | File | `admin/conf_users_edit.php` | High
|
||||
36 | File | `admin/index.php` | High
|
||||
37 | File | `admin/user.php` | High
|
||||
38 | File | `admin/write-post.php` | High
|
||||
39 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
40 | File | `admin_events.php` | High
|
||||
41 | File | `ajax_new_account.php` | High
|
||||
42 | File | `akocomments.php` | High
|
||||
43 | File | `allopass-error.php` | High
|
||||
44 | File | `announcement.php` | High
|
||||
45 | File | `app.php` | Low
|
||||
46 | File | `apply.cgi` | Medium
|
||||
47 | File | `archiver\index.php` | High
|
||||
48 | File | `artlinks.dispnew.php` | High
|
||||
49 | File | `auth.inc.php` | Medium
|
||||
50 | File | `authorization.do` | High
|
||||
51 | File | `awstats.pl` | Medium
|
||||
52 | File | `backoffice/login.asp` | High
|
||||
53 | File | `bb_usage_stats.php` | High
|
||||
54 | File | `binder.c` | Medium
|
||||
55 | File | `books.php` | Medium
|
||||
56 | File | `C:\Python27` | Medium
|
||||
57 | File | `C:\Windows\System32\config\SAM` | High
|
||||
58 | ... | ... | ...
|
||||
|
||||
There are 529 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 510 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://github.com/blackorbird/APT_REPORT/blob/master/Confucius/OperationTibbar-A-retaliatory-targeted-attack-from-SouthAsian-APT-Group-Confucius.pdf
|
||||
* https://twitter.com/ShadowChasing1/status/1449172597816455170
|
||||
* https://www.threatminer.org/report.php?q=Confucius%C2%A0Says%E2%80%A6Malware%C2%A0Families%C2%A0Get%C2%A0Further-PaloAltoNetworks.pdf&y=2016
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -19,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [GB](https://vuldb.com/?country.gb)
|
||||
* ...
|
||||
|
||||
There are 33 more country items available. Please use our online service to access the data.
|
||||
There are 32 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -100,49 +100,50 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/+CSCOE+/logon.html` | High
|
||||
2 | File | `/../../conf/template/uhttpd.json` | High
|
||||
3 | File | `/bin/boa` | Medium
|
||||
4 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
5 | File | `/etc/sudoers` | Medium
|
||||
6 | File | `/export` | Low
|
||||
7 | File | `/iissamples` | Medium
|
||||
8 | File | `/login` | Low
|
||||
9 | File | `/modules/profile/index.php` | High
|
||||
10 | File | `/monitoring` | Medium
|
||||
11 | File | `/new` | Low
|
||||
12 | File | `/proc/<pid>/status` | High
|
||||
13 | File | `/public/plugins/` | High
|
||||
14 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
15 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
16 | File | `/show_news.php` | High
|
||||
17 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
18 | File | `/tmp` | Low
|
||||
19 | File | `/uncpath/` | Medium
|
||||
20 | File | `/usr/bin/pkexec` | High
|
||||
21 | File | `/usr/sbin/suexec` | High
|
||||
22 | File | `/WEB-INF/web.xml` | High
|
||||
23 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
24 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
25 | File | `AccountManagerService.java` | High
|
||||
26 | File | `actions/CompanyDetailsSave.php` | High
|
||||
27 | File | `ActivityManagerService.java` | High
|
||||
28 | File | `adclick.php` | Medium
|
||||
29 | File | `admin.php` | Medium
|
||||
30 | File | `admin.php?page=languages` | High
|
||||
31 | File | `admin/add-glossary.php` | High
|
||||
32 | File | `admin/admin.php` | High
|
||||
33 | File | `admin/conf_users_edit.php` | High
|
||||
34 | File | `admin/edit-comments.php` | High
|
||||
35 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
|
||||
36 | File | `admin\db\DoSql.php` | High
|
||||
37 | File | `adverts/assets/plugins/ultimate/content/downloader.php` | High
|
||||
38 | File | `advsearch.asp` | High
|
||||
39 | File | `AjaxApplication.java` | High
|
||||
40 | File | `AllowBindAppWidgetActivity.java` | High
|
||||
41 | ... | ... | ...
|
||||
1 | File | `%PROGRAMDATA%\Razer\Synapse3\Service\bin` | High
|
||||
2 | File | `/+CSCOE+/logon.html` | High
|
||||
3 | File | `/../../conf/template/uhttpd.json` | High
|
||||
4 | File | `/admin/modules/system/custom_field.php` | High
|
||||
5 | File | `/bin/boa` | Medium
|
||||
6 | File | `/cgi-bin/wapopen` | High
|
||||
7 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
8 | File | `/etc/sudoers` | Medium
|
||||
9 | File | `/export` | Low
|
||||
10 | File | `/iissamples` | Medium
|
||||
11 | File | `/login` | Low
|
||||
12 | File | `/modules/profile/index.php` | High
|
||||
13 | File | `/monitoring` | Medium
|
||||
14 | File | `/new` | Low
|
||||
15 | File | `/proc/<pid>/status` | High
|
||||
16 | File | `/public/plugins/` | High
|
||||
17 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
18 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
19 | File | `/show_news.php` | High
|
||||
20 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
21 | File | `/tmp` | Low
|
||||
22 | File | `/uncpath/` | Medium
|
||||
23 | File | `/usr/bin/pkexec` | High
|
||||
24 | File | `/usr/sbin/suexec` | High
|
||||
25 | File | `/WEB-INF/web.xml` | High
|
||||
26 | File | `/wp-admin/admin-ajax.php` | High
|
||||
27 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
28 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
29 | File | `AccountManagerService.java` | High
|
||||
30 | File | `actions/CompanyDetailsSave.php` | High
|
||||
31 | File | `ActivityManagerService.java` | High
|
||||
32 | File | `adclick.php` | Medium
|
||||
33 | File | `admin.php` | Medium
|
||||
34 | File | `admin.php?page=languages` | High
|
||||
35 | File | `admin/add-glossary.php` | High
|
||||
36 | File | `admin/admin.php` | High
|
||||
37 | File | `admin/conf_users_edit.php` | High
|
||||
38 | File | `admin/edit-comments.php` | High
|
||||
39 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
|
||||
40 | File | `admin\db\DoSql.php` | High
|
||||
41 | File | `adverts/assets/plugins/ultimate/content/downloader.php` | High
|
||||
42 | ... | ... | ...
|
||||
|
||||
There are 351 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 360 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,31 +1,31 @@
|
|||
# Crouching Yeti - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crouching Yeti](https://vuldb.com/?actor.crouching_yeti). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Crouching Yeti](https://vuldb.com/?actor.crouching_yeti). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.crouching_yeti](https://vuldb.com/?actor.crouching_yeti)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.crouching_yeti](https://vuldb.com/?actor.crouching_yeti)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crouching Yeti:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Crouching Yeti:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Crouching Yeti.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Crouching Yeti.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 1.0.154.36 | node-55w.pool-1-0.dynamic.totinternet.net | High
|
||||
2 | 3.3.6.1 | - | High
|
||||
3 | 6.0.472.59 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [1.0.154.36](https://vuldb.com/?ip.1.0.154.36) | node-55w.pool-1-0.dynamic.totinternet.net | - | High
|
||||
2 | [3.3.6.1](https://vuldb.com/?ip.3.3.6.1) | - | - | High
|
||||
3 | [6.0.472.59](https://vuldb.com/?ip.6.0.472.59) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crouching Yeti. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Crouching Yeti. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -34,13 +34,13 @@ ID | Type | Indicator | Confidence
|
|||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.threatminer.org/report.php?q=Kaspersky_Lab_crouching_yeti_appendixes_eng_final.pdf&y=2014
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -0,0 +1,68 @@
|
|||
# DNSpionage - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DNSpionage](https://vuldb.com/?actor.dnspionage). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.dnspionage](https://vuldb.com/?actor.dnspionage)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following _campaigns_ are known and can be associated with DNSpionage:
|
||||
|
||||
* Middle East
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with DNSpionage:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [UA](https://vuldb.com/?country.ua)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DNSpionage.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [185.20.184.138](https://vuldb.com/?ip.185.20.184.138) | 185.20.184.138.deltahost-ptr | Middle East | High
|
||||
2 | [185.20.187.8](https://vuldb.com/?ip.185.20.187.8) | 185.20.187.8.deltahost-ptr | Middle East | High
|
||||
3 | [185.161.211.72](https://vuldb.com/?ip.185.161.211.72) | 185.161.211.72.deltahost-ptr | Middle East | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _DNSpionage_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-284 | Execution with Unnecessary Privileges | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by DNSpionage. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `data/gbconfiguration.dat` | High
|
||||
2 | File | `index.php` | Medium
|
||||
3 | File | `wp-login.php` | Medium
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 8 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://gblogs.cisco.com/jp/2018/12/talos-dnspionage-campaign-targets-middle-east/)
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,6 +1,6 @@
|
|||
# DanaBot - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DanaBot](https://vuldb.com/?actor.danabot). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DanaBot](https://vuldb.com/?actor.danabot). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.danabot](https://vuldb.com/?actor.danabot)
|
||||
|
||||
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with DanaBot:
|
||||
|
||||
* US
|
||||
* CN
|
||||
* AT
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [AT](https://vuldb.com/?country.at)
|
||||
* ...
|
||||
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
There are 7 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -21,17 +21,20 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 5.8.55.205 | carpbaboon.com | - | High
|
||||
2 | 31.214.157.12 | mail.private-mail.nl | - | High
|
||||
3 | 47.74.130.165 | - | - | High
|
||||
4 | 84.54.37.102 | - | - | High
|
||||
5 | ... | ... | ... | ...
|
||||
1 | [5.8.55.205](https://vuldb.com/?ip.5.8.55.205) | carpbaboon.com | - | High
|
||||
2 | [23.254.226.52](https://vuldb.com/?ip.23.254.226.52) | client-23-254-226-52.hostwindsdns.com | - | High
|
||||
3 | [31.214.157.12](https://vuldb.com/?ip.31.214.157.12) | mail.private-mail.nl | - | High
|
||||
4 | [45.147.231.79](https://vuldb.com/?ip.45.147.231.79) | - | - | High
|
||||
5 | [46.173.218.13](https://vuldb.com/?ip.46.173.218.13) | - | - | High
|
||||
6 | [47.74.130.165](https://vuldb.com/?ip.47.74.130.165) | - | - | High
|
||||
7 | [84.54.37.102](https://vuldb.com/?ip.84.54.37.102) | - | - | High
|
||||
8 | ... | ... | ... | ...
|
||||
|
||||
There are 18 more IOC items available. Please use our online service to access the data.
|
||||
There are 27 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by DanaBot. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _DanaBot_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -40,7 +43,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1211 | CWE-358 | 7PK Security Features | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -53,22 +56,27 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `/addnews.html` | High
|
||||
4 | File | `/cm/delete` | Medium
|
||||
5 | File | `/download` | Medium
|
||||
6 | File | `/redpass.cgi` | Medium
|
||||
7 | File | `/uncpath/` | Medium
|
||||
8 | File | `add-category.php` | High
|
||||
9 | File | `add_comment.php` | High
|
||||
10 | File | `admin.php` | Medium
|
||||
11 | File | `admin/admin.shtml` | High
|
||||
12 | File | `admin/user.php?form=update_f&user_name` | High
|
||||
13 | ... | ... | ...
|
||||
6 | File | `/GetSimpleCMS-3.3.15/admin/log.php` | High
|
||||
7 | File | `/lms/admin.php` | High
|
||||
8 | File | `/redpass.cgi` | Medium
|
||||
9 | File | `/uncpath/` | Medium
|
||||
10 | File | `add-category.php` | High
|
||||
11 | File | `add_comment.php` | High
|
||||
12 | File | `admin.php` | Medium
|
||||
13 | File | `admin/admin.shtml` | High
|
||||
14 | File | `admin/content.php` | High
|
||||
15 | File | `admin/user.php?form=update_f&user_name` | High
|
||||
16 | ... | ... | ...
|
||||
|
||||
There are 102 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 130 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blogs.blackberry.com/en/2021/11/threat-thursday-danabot-malware-as-a-service
|
||||
* https://github.com/eset/malware-ioc/tree/master/danabot
|
||||
* https://isc.sans.edu/forums/diary/Example+of+Danabot+distributed+through+malspam/27744/
|
||||
* https://research.checkpoint.com/2019/danabot-demands-a-ransom-payment/
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -0,0 +1,30 @@
|
|||
# DarkHotel - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkHotel](https://vuldb.com/?actor.darkhotel). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.darkhotel](https://vuldb.com/?actor.darkhotel)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DarkHotel.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [23.111.184.119](https://vuldb.com/?ip.23.111.184.119) | zeus.hosterbox.com | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.zscaler.com/blogs/security-research/new-darkhotel-apt-attack-chain-identified
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,47 +1,46 @@
|
|||
# DarkHydrus - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkHydrus](https://vuldb.com/?actor.darkhydrus). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkHydrus](https://vuldb.com/?actor.darkhydrus). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.darkhydrus](https://vuldb.com/?actor.darkhydrus)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.darkhydrus](https://vuldb.com/?actor.darkhydrus)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with DarkHydrus:
|
||||
The following _campaigns_ are known and can be associated with DarkHydrus:
|
||||
|
||||
* DarkHydrus
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with DarkHydrus:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with DarkHydrus:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of DarkHydrus.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DarkHydrus.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 94.130.88.9 | cm16.debounce.io | High
|
||||
2 | 107.175.75.123 | 107-175-75-123-host.colocrossing.com | High
|
||||
3 | 107.175.150.113 | 107-175-150-113-host.colocrossing.com | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [94.130.88.9](https://vuldb.com/?ip.94.130.88.9) | cm16.debounce.io | - | High
|
||||
2 | [107.175.75.123](https://vuldb.com/?ip.107.175.75.123) | 107-175-75-123-host.colocrossing.com | - | High
|
||||
3 | [107.175.150.113](https://vuldb.com/?ip.107.175.150.113) | 107-175-150-113-host.colocrossing.com | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by DarkHydrus. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _DarkHydrus_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1499 | Resource Consumption | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by DarkHydrus. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by DarkHydrus. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -53,11 +52,11 @@ ID | Type | Indicator | Confidence
|
|||
6 | File | `add_comment.php` | High
|
||||
7 | ... | ... | ...
|
||||
|
||||
There are 46 more IOA items available. Please use our online service to access the data.
|
||||
There are 46 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications/
|
||||
* https://unit42.paloaltonetworks.com/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/
|
||||
|
@ -66,7 +65,7 @@ The following list contains external sources which discuss the actor and the ass
|
|||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,29 +1,29 @@
|
|||
# DarkSide - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkSide](https://vuldb.com/?actor.darkside). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DarkSide](https://vuldb.com/?actor.darkside). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.darkside](https://vuldb.com/?actor.darkside)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.darkside](https://vuldb.com/?actor.darkside)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of DarkSide.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DarkSide.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 99.83.154.118 | a51062ecadbb5a26e.awsglobalaccelerator.com | High
|
||||
2 | 176.103.62.217 | - | High
|
||||
3 | 185.243.214.107 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [99.83.154.118](https://vuldb.com/?ip.99.83.154.118) | a51062ecadbb5a26e.awsglobalaccelerator.com | - | High
|
||||
2 | [176.103.62.217](https://vuldb.com/?ip.176.103.62.217) | - | - | High
|
||||
3 | [185.243.214.107](https://vuldb.com/?ip.185.243.214.107) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://us-cert.cisa.gov/ncas/analysis-reports/ar21-189a
|
||||
* https://us-cert.cisa.gov/sites/default/files/publications/AA21-131A.stix.xml
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -20,7 +20,7 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _DazzleSpy_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _DazzleSpy_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -1,37 +1,39 @@
|
|||
# DeputyDog - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DeputyDog](https://vuldb.com/?actor.deputydog). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [DeputyDog](https://vuldb.com/?actor.deputydog). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.deputydog](https://vuldb.com/?actor.deputydog)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.deputydog](https://vuldb.com/?actor.deputydog)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with DeputyDog:
|
||||
The following _campaigns_ are known and can be associated with DeputyDog:
|
||||
|
||||
* SnowMan
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of DeputyDog.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of DeputyDog.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 58.64.199.22 | - | High
|
||||
2 | 58.64.199.25 | - | High
|
||||
3 | 58.64.199.27 | - | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [58.64.199.22](https://vuldb.com/?ip.58.64.199.22) | - | SnowMan | High
|
||||
2 | [58.64.199.25](https://vuldb.com/?ip.58.64.199.25) | - | SnowMan | High
|
||||
3 | [58.64.199.27](https://vuldb.com/?ip.58.64.199.27) | - | SnowMan | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more IOC items available. Please use our online service to access the data.
|
||||
There are 7 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://ioc.hatenablog.com/entry/2013/09/21/000000
|
||||
* https://ioc.hatenablog.com/entry/2013/09/30/000000
|
||||
* https://www.threatminer.org/report.php?q=Op_SnowMan_DeputyDog.pdf&y=2014
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Domestic Kitten - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Domestic Kitten](https://vuldb.com/?actor.domestic_kitten). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Domestic Kitten](https://vuldb.com/?actor.domestic_kitten). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.domestic_kitten](https://vuldb.com/?actor.domestic_kitten)
|
||||
|
||||
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Domestic Kitten:
|
||||
|
||||
* NL
|
||||
* US
|
||||
* ME
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [IR](https://vuldb.com/?country.ir)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -21,25 +21,25 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 89.38.98.49 | 89-38-98-49.hosted-by-worldstream.net | - | High
|
||||
2 | 162.248.247.172 | - | - | High
|
||||
3 | 190.2.144.140 | 190-2-144-140.hosted-by-worldstream.net | - | High
|
||||
1 | [46.4.143.130](https://vuldb.com/?ip.46.4.143.130) | dns.belogy.de | - | High
|
||||
2 | [62.112.8.37](https://vuldb.com/?ip.62.112.8.37) | customer.worldstream.nl | - | High
|
||||
3 | [62.112.8.174](https://vuldb.com/?ip.62.112.8.174) | customer.worldstream.nl | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more IOC items available. Please use our online service to access the data.
|
||||
There are 14 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Domestic Kitten. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Domestic Kitten_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -47,21 +47,50 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/hub/api/user` | High
|
||||
2 | File | `/uncpath/` | Medium
|
||||
3 | File | `/wp-content/plugins/forum-server/feed.php` | High
|
||||
4 | File | `app/controllers/application_controller.rb` | High
|
||||
5 | File | `BKFSim_vhfd.exe` | High
|
||||
6 | File | `Cgi/private.py` | High
|
||||
7 | File | `cmd.php` | Low
|
||||
8 | ... | ... | ...
|
||||
1 | File | `.travis.yml` | Medium
|
||||
2 | File | `/.env` | Low
|
||||
3 | File | `/admin.php` | Medium
|
||||
4 | File | `/admin/config.php?display=disa&view=form` | High
|
||||
5 | File | `/appliance/users?action=edit` | High
|
||||
6 | File | `/category_view.php` | High
|
||||
7 | File | `/connectors/index.php` | High
|
||||
8 | File | `/core/model/modx/modmanagerrequest.class.php` | High
|
||||
9 | File | `/dev/kmem` | Medium
|
||||
10 | File | `/file?action=download&file` | High
|
||||
11 | File | `/forum/away.php` | High
|
||||
12 | File | `/hub/api/user` | High
|
||||
13 | File | `/medical/inventories.php` | High
|
||||
14 | File | `/monitoring` | Medium
|
||||
15 | File | `/NAGErrors` | Medium
|
||||
16 | File | `/plugins/servlet/audit/resource` | High
|
||||
17 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
18 | File | `/proc/ioports` | High
|
||||
19 | File | `/replication` | Medium
|
||||
20 | File | `/RestAPI` | Medium
|
||||
21 | File | `/rom-0` | Low
|
||||
22 | File | `/tmp` | Low
|
||||
23 | File | `/tmp/speedtest_urls.xml` | High
|
||||
24 | File | `/uncpath/` | Medium
|
||||
25 | File | `/var/log/nginx` | High
|
||||
26 | File | `/WEB-INF/web.xml` | High
|
||||
27 | File | `/wp-admin/admin.php` | High
|
||||
28 | File | `account.asp` | Medium
|
||||
29 | File | `addentry.php` | Medium
|
||||
30 | File | `admin-ajax.php?action=get_wdtable order[0][dir]` | High
|
||||
31 | File | `admin/index.php` | High
|
||||
32 | File | `admin/login.php` | High
|
||||
33 | File | `admins.js` | Medium
|
||||
34 | File | `admin\model\catalog\download.php` | High
|
||||
35 | File | `apcupsd.pid` | Medium
|
||||
36 | ... | ... | ...
|
||||
|
||||
There are 59 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 311 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blogs.blackberry.com/en/2019/10/mobile-malware-and-apt-espionage-prolific-pervasive-and-cross-platform
|
||||
* https://research.checkpoint.com/2018/domestic-kitten-an-iranian-surveillance-operation/
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -37,7 +37,8 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
7 | [37.139.28.208](https://vuldb.com/?ip.37.139.28.208) | - | - | High
|
||||
8 | [45.33.29.133](https://vuldb.com/?ip.45.33.29.133) | li1046-133.members.linode.com | - | High
|
||||
9 | [46.101.204.168](https://vuldb.com/?ip.46.101.204.168) | - | - | High
|
||||
10 | ... | ... | ... | ...
|
||||
10 | [46.105.40.12](https://vuldb.com/?ip.46.105.40.12) | ip12.ip-46-105-40.eu | - | High
|
||||
11 | ... | ... | ... | ...
|
||||
|
||||
There are 38 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
|
@ -96,13 +97,14 @@ ID | Type | Indicator | Confidence
|
|||
34 | File | `announcements.php` | High
|
||||
35 | ... | ... | ...
|
||||
|
||||
There are 295 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 298 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://github.com/faisalusuf/ThreatIntelligence/blob/main/APT%20DONOT%20TEAM/Tracking-DONOT-IOCs.csv
|
||||
* https://twitter.com/ShadowChasing1/status/1497125743125413892
|
||||
* https://www.welivesecurity.com/2022/01/18/donot-go-do-not-respawn/
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -58,7 +58,7 @@ ID | Type | Indicator | Confidence
|
|||
7 | File | `bbcode.php` | Medium
|
||||
8 | ... | ... | ...
|
||||
|
||||
There are 56 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 57 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Dyre - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Dyre](https://vuldb.com/?actor.dyre). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Dyre](https://vuldb.com/?actor.dyre). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.dyre](https://vuldb.com/?actor.dyre)
|
||||
|
||||
|
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Dyre:
|
||||
|
||||
* RU
|
||||
* US
|
||||
* DE
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* ...
|
||||
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
|
@ -21,19 +21,19 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 37.59.2.42 | ns399064.ip-37-59-2.eu | - | High
|
||||
2 | 64.70.19.202 | mailrelay.202.website.ws | - | High
|
||||
3 | 69.195.129.75 | - | - | High
|
||||
4 | 80.248.224.75 | - | - | High
|
||||
5 | 85.25.134.53 | delta526.dedicatedpanel.com | - | High
|
||||
6 | 85.25.138.12 | echo389.startdedicated.de | - | High
|
||||
1 | [37.59.2.42](https://vuldb.com/?ip.37.59.2.42) | ns399064.ip-37-59-2.eu | - | High
|
||||
2 | [64.70.19.202](https://vuldb.com/?ip.64.70.19.202) | mailrelay.202.website.ws | - | High
|
||||
3 | [69.195.129.75](https://vuldb.com/?ip.69.195.129.75) | - | - | High
|
||||
4 | [80.248.224.75](https://vuldb.com/?ip.80.248.224.75) | - | - | High
|
||||
5 | [85.25.134.53](https://vuldb.com/?ip.85.25.134.53) | delta526.dedicatedpanel.com | - | High
|
||||
6 | [85.25.138.12](https://vuldb.com/?ip.85.25.138.12) | echo389.startdedicated.de | - | High
|
||||
7 | ... | ... | ... | ...
|
||||
|
||||
There are 24 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Dyre. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Dyre_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -42,7 +42,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1211 | CWE-254 | 7PK Security Features | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 3 more TTP items available. Please use our online service to access the data.
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
|
|
@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [VN](https://vuldb.com/?country.vn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
There are 2 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -23,165 +23,191 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [1.186.249.82](https://vuldb.com/?ip.1.186.249.82) | 1.186.249.82.dvois.com | - | High
|
||||
2 | [1.226.84.243](https://vuldb.com/?ip.1.226.84.243) | - | - | High
|
||||
3 | [2.58.16.86](https://vuldb.com/?ip.2.58.16.86) | - | - | High
|
||||
4 | [2.58.16.89](https://vuldb.com/?ip.2.58.16.89) | - | - | High
|
||||
5 | [2.82.75.215](https://vuldb.com/?ip.2.82.75.215) | bl21-75-215.dsl.telepac.pt | - | High
|
||||
6 | [5.2.84.232](https://vuldb.com/?ip.5.2.84.232) | momos.alastyr.com | - | High
|
||||
7 | [5.2.136.90](https://vuldb.com/?ip.5.2.136.90) | static-5-2-136-90.rdsnet.ro | - | High
|
||||
8 | [5.2.182.7](https://vuldb.com/?ip.5.2.182.7) | static-5-2-182-7.rdsnet.ro | - | High
|
||||
9 | [5.2.212.254](https://vuldb.com/?ip.5.2.212.254) | static-5-2-212-254.rdsnet.ro | - | High
|
||||
10 | [5.9.189.24](https://vuldb.com/?ip.5.9.189.24) | static.24.189.9.5.clients.your-server.de | - | High
|
||||
11 | [5.12.246.155](https://vuldb.com/?ip.5.12.246.155) | 5-12-246-155.residential.rdsnet.ro | - | High
|
||||
12 | [5.35.249.46](https://vuldb.com/?ip.5.35.249.46) | rs250366.rs.hosteurope.de | - | High
|
||||
13 | [5.39.91.110](https://vuldb.com/?ip.5.39.91.110) | ns3278366.ip-5-39-91.eu | - | High
|
||||
14 | [5.79.70.250](https://vuldb.com/?ip.5.79.70.250) | - | - | High
|
||||
15 | [5.89.33.136](https://vuldb.com/?ip.5.89.33.136) | net-5-89-33-136.cust.vodafonedsl.it | - | High
|
||||
16 | [5.159.57.195](https://vuldb.com/?ip.5.159.57.195) | www-riedle.transfermarkt.de | - | High
|
||||
17 | [5.196.35.138](https://vuldb.com/?ip.5.196.35.138) | vps10.open-techno.net | - | High
|
||||
18 | [5.230.193.41](https://vuldb.com/?ip.5.230.193.41) | casagarcia-web.sys.netzfabrik.eu | - | High
|
||||
19 | [8.4.9.137](https://vuldb.com/?ip.8.4.9.137) | onlinehorizons.net | - | High
|
||||
20 | [8.247.6.134](https://vuldb.com/?ip.8.247.6.134) | - | - | High
|
||||
21 | [12.32.68.154](https://vuldb.com/?ip.12.32.68.154) | mail.sealscoinc.com | - | High
|
||||
22 | [12.149.72.170](https://vuldb.com/?ip.12.149.72.170) | - | - | High
|
||||
23 | [12.162.84.2](https://vuldb.com/?ip.12.162.84.2) | - | - | High
|
||||
24 | [12.163.208.58](https://vuldb.com/?ip.12.163.208.58) | - | - | High
|
||||
25 | [12.182.146.226](https://vuldb.com/?ip.12.182.146.226) | - | - | High
|
||||
26 | [12.184.217.101](https://vuldb.com/?ip.12.184.217.101) | - | - | High
|
||||
27 | [23.6.65.194](https://vuldb.com/?ip.23.6.65.194) | a23-6-65-194.deploy.static.akamaitechnologies.com | - | High
|
||||
28 | [23.36.85.183](https://vuldb.com/?ip.23.36.85.183) | a23-36-85-183.deploy.static.akamaitechnologies.com | - | High
|
||||
29 | [23.199.63.11](https://vuldb.com/?ip.23.199.63.11) | a23-199-63-11.deploy.static.akamaitechnologies.com | - | High
|
||||
30 | [23.199.71.185](https://vuldb.com/?ip.23.199.71.185) | a23-199-71-185.deploy.static.akamaitechnologies.com | - | High
|
||||
31 | [23.239.2.11](https://vuldb.com/?ip.23.239.2.11) | li683-11.members.linode.com | - | High
|
||||
32 | [24.43.99.75](https://vuldb.com/?ip.24.43.99.75) | rrcs-24-43-99-75.west.biz.rr.com | - | High
|
||||
33 | [24.101.229.82](https://vuldb.com/?ip.24.101.229.82) | dynamic-acs-24-101-229-82.zoominternet.net | - | High
|
||||
34 | [24.119.116.230](https://vuldb.com/?ip.24.119.116.230) | 24-119-116-230.cpe.sparklight.net | - | High
|
||||
35 | [24.121.176.48](https://vuldb.com/?ip.24.121.176.48) | 24-121-176-48.prkrcmtc01.com.sta.suddenlink.net | - | High
|
||||
36 | [24.137.76.62](https://vuldb.com/?ip.24.137.76.62) | host-24-137-76-62.public.eastlink.ca | - | High
|
||||
37 | [24.178.90.49](https://vuldb.com/?ip.24.178.90.49) | 024-178-090-049.res.spectrum.com | - | High
|
||||
38 | [24.179.13.119](https://vuldb.com/?ip.24.179.13.119) | 024-179-013-119.res.spectrum.com | - | High
|
||||
39 | [24.217.117.217](https://vuldb.com/?ip.24.217.117.217) | 024-217-117-217.res.spectrum.com | - | High
|
||||
40 | [24.232.228.233](https://vuldb.com/?ip.24.232.228.233) | OL233-228.fibertel.com.ar | - | High
|
||||
41 | [24.244.177.40](https://vuldb.com/?ip.24.244.177.40) | - | - | High
|
||||
42 | [27.78.27.110](https://vuldb.com/?ip.27.78.27.110) | localhost | - | High
|
||||
43 | [27.82.13.10](https://vuldb.com/?ip.27.82.13.10) | KD027082013010.ppp-bb.dion.ne.jp | - | High
|
||||
44 | [27.109.24.214](https://vuldb.com/?ip.27.109.24.214) | - | - | High
|
||||
45 | [27.114.9.93](https://vuldb.com/?ip.27.114.9.93) | i27-114-9-93.s41.a011.ap.plala.or.jp | - | High
|
||||
46 | [35.190.87.116](https://vuldb.com/?ip.35.190.87.116) | 116.87.190.35.bc.googleusercontent.com | - | Medium
|
||||
47 | [36.91.44.183](https://vuldb.com/?ip.36.91.44.183) | - | - | High
|
||||
48 | [37.46.129.215](https://vuldb.com/?ip.37.46.129.215) | we-too.ru | - | High
|
||||
49 | [37.97.135.82](https://vuldb.com/?ip.37.97.135.82) | 37-97-135-82.colo.transip.net | - | High
|
||||
50 | [37.139.21.175](https://vuldb.com/?ip.37.139.21.175) | 37.139.21.175-e2-8080-keep-up | - | High
|
||||
51 | [37.179.204.33](https://vuldb.com/?ip.37.179.204.33) | - | - | High
|
||||
52 | [37.187.4.178](https://vuldb.com/?ip.37.187.4.178) | ks2.kku.io | - | High
|
||||
53 | [37.187.57.57](https://vuldb.com/?ip.37.187.57.57) | ns3357940.ovh.net | - | High
|
||||
54 | [37.187.72.193](https://vuldb.com/?ip.37.187.72.193) | ns3362285.ip-37-187-72.eu | - | High
|
||||
55 | [37.187.161.206](https://vuldb.com/?ip.37.187.161.206) | toolbox.alabs.io | - | High
|
||||
56 | [37.205.9.252](https://vuldb.com/?ip.37.205.9.252) | s1.ithelp24.eu | - | High
|
||||
57 | [37.221.70.250](https://vuldb.com/?ip.37.221.70.250) | b2b-customer.inftele.net | - | High
|
||||
58 | [41.76.108.46](https://vuldb.com/?ip.41.76.108.46) | - | - | High
|
||||
59 | [41.169.36.237](https://vuldb.com/?ip.41.169.36.237) | - | - | High
|
||||
60 | [41.185.28.84](https://vuldb.com/?ip.41.185.28.84) | brf01-nix01.wadns.net | - | High
|
||||
61 | [41.185.29.128](https://vuldb.com/?ip.41.185.29.128) | abp79-nix01.wadns.net | - | High
|
||||
62 | [41.231.225.139](https://vuldb.com/?ip.41.231.225.139) | - | - | High
|
||||
63 | [42.62.40.103](https://vuldb.com/?ip.42.62.40.103) | - | - | High
|
||||
64 | [45.16.226.117](https://vuldb.com/?ip.45.16.226.117) | 45-16-226-117.lightspeed.sndgca.sbcglobal.net | - | High
|
||||
65 | [45.33.77.42](https://vuldb.com/?ip.45.33.77.42) | li1023-42.members.linode.com | - | High
|
||||
66 | [45.46.37.97](https://vuldb.com/?ip.45.46.37.97) | cpe-45-46-37-97.maine.res.rr.com | - | High
|
||||
67 | [45.55.36.51](https://vuldb.com/?ip.45.55.36.51) | - | - | High
|
||||
68 | [45.55.219.163](https://vuldb.com/?ip.45.55.219.163) | - | - | High
|
||||
69 | [45.79.95.107](https://vuldb.com/?ip.45.79.95.107) | li1194-107.members.linode.com | - | High
|
||||
70 | [45.80.148.200](https://vuldb.com/?ip.45.80.148.200) | - | - | High
|
||||
71 | [45.118.115.99](https://vuldb.com/?ip.45.118.115.99) | - | - | High
|
||||
72 | [45.118.135.203](https://vuldb.com/?ip.45.118.135.203) | 45-118-135-203.ip.linodeusercontent.com | - | High
|
||||
73 | [45.142.114.231](https://vuldb.com/?ip.45.142.114.231) | mail.dounutmail.de | - | High
|
||||
74 | [45.230.45.171](https://vuldb.com/?ip.45.230.45.171) | - | - | High
|
||||
75 | [46.4.100.178](https://vuldb.com/?ip.46.4.100.178) | support.wizard-shopservice.de | - | High
|
||||
76 | [46.4.192.185](https://vuldb.com/?ip.46.4.192.185) | static.185.192.4.46.clients.your-server.de | - | High
|
||||
77 | [46.28.111.142](https://vuldb.com/?ip.46.28.111.142) | enkindu.jsuchy.net | - | High
|
||||
78 | [46.32.229.152](https://vuldb.com/?ip.46.32.229.152) | 094882.vps-10.com | - | High
|
||||
79 | [46.32.233.226](https://vuldb.com/?ip.46.32.233.226) | yetitoolusa.com | - | High
|
||||
80 | [46.38.238.8](https://vuldb.com/?ip.46.38.238.8) | v2202109122001163131.happysrv.de | - | High
|
||||
81 | [46.43.2.95](https://vuldb.com/?ip.46.43.2.95) | chris.default.cjenkinson.uk0.bigv.io | - | High
|
||||
82 | [46.55.222.11](https://vuldb.com/?ip.46.55.222.11) | - | - | High
|
||||
83 | [46.101.58.37](https://vuldb.com/?ip.46.101.58.37) | 46.101.58.37-e1-8080 | - | High
|
||||
84 | [46.105.81.76](https://vuldb.com/?ip.46.105.81.76) | myu0.cylipo.sbs | - | High
|
||||
85 | [46.105.114.137](https://vuldb.com/?ip.46.105.114.137) | ns3188253.ip-46-105-114.eu | - | High
|
||||
86 | [46.105.131.68](https://vuldb.com/?ip.46.105.131.68) | http.adven.fr | - | High
|
||||
87 | [46.105.131.79](https://vuldb.com/?ip.46.105.131.79) | relay.adven.fr | - | High
|
||||
88 | [46.105.131.87](https://vuldb.com/?ip.46.105.131.87) | pop.adven.fr | - | High
|
||||
89 | [46.105.236.18](https://vuldb.com/?ip.46.105.236.18) | - | - | High
|
||||
90 | [46.165.254.206](https://vuldb.com/?ip.46.165.254.206) | - | - | High
|
||||
91 | [46.214.107.142](https://vuldb.com/?ip.46.214.107.142) | 46-214-107-142.next-gen.ro | - | High
|
||||
92 | [47.36.140.164](https://vuldb.com/?ip.47.36.140.164) | 047-036-140-164.res.spectrum.com | - | High
|
||||
93 | [47.146.39.147](https://vuldb.com/?ip.47.146.39.147) | - | - | High
|
||||
94 | [47.188.131.94](https://vuldb.com/?ip.47.188.131.94) | - | - | High
|
||||
95 | [47.246.24.225](https://vuldb.com/?ip.47.246.24.225) | - | - | High
|
||||
96 | [47.246.24.226](https://vuldb.com/?ip.47.246.24.226) | - | - | High
|
||||
97 | [47.246.24.230](https://vuldb.com/?ip.47.246.24.230) | - | - | High
|
||||
98 | [47.246.24.232](https://vuldb.com/?ip.47.246.24.232) | - | - | High
|
||||
99 | [49.12.121.47](https://vuldb.com/?ip.49.12.121.47) | filezilla-project.org | - | High
|
||||
100 | [49.50.209.131](https://vuldb.com/?ip.49.50.209.131) | 131.host-49-50-209.euba.megatel.co.nz | - | High
|
||||
101 | [49.212.135.76](https://vuldb.com/?ip.49.212.135.76) | os3-321-50322.vs.sakura.ne.jp | - | High
|
||||
102 | [49.212.155.94](https://vuldb.com/?ip.49.212.155.94) | os3-325-52340.vs.sakura.ne.jp | - | High
|
||||
103 | [50.28.51.143](https://vuldb.com/?ip.50.28.51.143) | - | - | High
|
||||
104 | [50.31.146.101](https://vuldb.com/?ip.50.31.146.101) | mail.brillinjurylaw.com | - | High
|
||||
105 | [50.56.135.44](https://vuldb.com/?ip.50.56.135.44) | - | - | High
|
||||
106 | [50.91.114.38](https://vuldb.com/?ip.50.91.114.38) | 050-091-114-038.res.spectrum.com | - | High
|
||||
107 | [50.116.78.109](https://vuldb.com/?ip.50.116.78.109) | intersearchmedia.com | - | High
|
||||
108 | [50.245.107.73](https://vuldb.com/?ip.50.245.107.73) | 50-245-107-73-static.hfc.comcastbusiness.net | - | High
|
||||
109 | [51.15.4.22](https://vuldb.com/?ip.51.15.4.22) | 51-15-4-22.rev.poneytelecom.eu | - | High
|
||||
110 | [51.15.7.145](https://vuldb.com/?ip.51.15.7.145) | 51-15-7-145.rev.poneytelecom.eu | - | High
|
||||
111 | [51.75.33.127](https://vuldb.com/?ip.51.75.33.127) | ip127.ip-51-75-33.eu | - | High
|
||||
112 | [51.89.36.180](https://vuldb.com/?ip.51.89.36.180) | ip180.ip-51-89-36.eu | - | High
|
||||
113 | [51.89.199.141](https://vuldb.com/?ip.51.89.199.141) | ip141.ip-51-89-199.eu | - | High
|
||||
114 | [51.255.165.160](https://vuldb.com/?ip.51.255.165.160) | 160.ip-51-255-165.eu | - | High
|
||||
115 | [54.38.143.245](https://vuldb.com/?ip.54.38.143.245) | tools.inovato.me | - | High
|
||||
116 | [58.27.215.3](https://vuldb.com/?ip.58.27.215.3) | 58-27-215-3.wateen.net | - | High
|
||||
117 | [58.94.58.13](https://vuldb.com/?ip.58.94.58.13) | i58-94-58-13.s41.a014.ap.plala.or.jp | - | High
|
||||
118 | [58.216.16.130](https://vuldb.com/?ip.58.216.16.130) | - | - | High
|
||||
119 | [58.227.42.236](https://vuldb.com/?ip.58.227.42.236) | - | - | High
|
||||
120 | [59.148.253.194](https://vuldb.com/?ip.59.148.253.194) | 059148253194.ctinets.com | - | High
|
||||
121 | [60.93.23.51](https://vuldb.com/?ip.60.93.23.51) | softbank060093023051.bbtec.net | - | High
|
||||
122 | [60.108.128.186](https://vuldb.com/?ip.60.108.128.186) | softbank060108128186.bbtec.net | - | High
|
||||
123 | [60.125.114.64](https://vuldb.com/?ip.60.125.114.64) | softbank060125114064.bbtec.net | - | High
|
||||
124 | [60.249.78.226](https://vuldb.com/?ip.60.249.78.226) | 60-249-78-226.hinet-ip.hinet.net | - | High
|
||||
125 | [61.19.246.238](https://vuldb.com/?ip.61.19.246.238) | - | - | High
|
||||
126 | [62.30.7.67](https://vuldb.com/?ip.62.30.7.67) | 67.7-30-62.static.virginmediabusiness.co.uk | - | High
|
||||
127 | [62.75.141.82](https://vuldb.com/?ip.62.75.141.82) | static-ip-62-75-141-82.inaddr.ip-pool.com | - | High
|
||||
128 | [62.84.75.50](https://vuldb.com/?ip.62.84.75.50) | mail.saadegrp.com.lb | - | High
|
||||
129 | [62.171.142.179](https://vuldb.com/?ip.62.171.142.179) | vmi499457.contaboserver.net | - | High
|
||||
130 | [62.212.34.102](https://vuldb.com/?ip.62.212.34.102) | - | - | High
|
||||
131 | [64.190.63.136](https://vuldb.com/?ip.64.190.63.136) | - | - | High
|
||||
132 | [64.207.182.168](https://vuldb.com/?ip.64.207.182.168) | - | - | High
|
||||
133 | [66.54.51.172](https://vuldb.com/?ip.66.54.51.172) | - | - | High
|
||||
134 | [66.76.26.33](https://vuldb.com/?ip.66.76.26.33) | 66-76-26-33.hdsncmta01.com.sta.suddenlink.net | - | High
|
||||
135 | [66.228.61.248](https://vuldb.com/?ip.66.228.61.248) | li318-248.members.linode.com | - | High
|
||||
136 | [67.19.105.107](https://vuldb.com/?ip.67.19.105.107) | ns2.datatrust.com.br | - | High
|
||||
137 | [67.170.250.203](https://vuldb.com/?ip.67.170.250.203) | c-67-170-250-203.hsd1.ca.comcast.net | - | High
|
||||
138 | [67.225.218.50](https://vuldb.com/?ip.67.225.218.50) | lb01.parklogic.com | - | High
|
||||
139 | [68.2.97.91](https://vuldb.com/?ip.68.2.97.91) | ip68-2-97-91.ph.ph.cox.net | - | High
|
||||
140 | [68.183.170.114](https://vuldb.com/?ip.68.183.170.114) | 68.183.170.114-e1-8080-keep-up | - | High
|
||||
141 | [68.183.190.199](https://vuldb.com/?ip.68.183.190.199) | 68.183.190.199-e1-8080-keep-up | - | High
|
||||
142 | [69.17.170.58](https://vuldb.com/?ip.69.17.170.58) | unallocated-static.rogers.com | - | High
|
||||
143 | [69.43.168.200](https://vuldb.com/?ip.69.43.168.200) | ns0.imunplugged.com | - | High
|
||||
144 | [69.45.19.251](https://vuldb.com/?ip.69.45.19.251) | coastinet.com | - | High
|
||||
145 | [69.167.152.111](https://vuldb.com/?ip.69.167.152.111) | - | - | High
|
||||
146 | [69.198.17.49](https://vuldb.com/?ip.69.198.17.49) | 69-198-17-49.customerip.birch.net | - | High
|
||||
147 | [70.32.84.74](https://vuldb.com/?ip.70.32.84.74) | - | - | High
|
||||
148 | [70.32.89.105](https://vuldb.com/?ip.70.32.89.105) | parties-at-sea.com | - | High
|
||||
149 | [70.32.92.133](https://vuldb.com/?ip.70.32.92.133) | popdesigngroup.com | - | High
|
||||
150 | [70.32.115.157](https://vuldb.com/?ip.70.32.115.157) | harpotripofalifetime.com | - | High
|
||||
151 | [70.168.7.6](https://vuldb.com/?ip.70.168.7.6) | wsip-70-168-7-6.ri.ri.cox.net | - | High
|
||||
152 | [70.182.77.184](https://vuldb.com/?ip.70.182.77.184) | wsip-70-182-77-184.ok.ok.cox.net | - | High
|
||||
153 | [70.184.125.132](https://vuldb.com/?ip.70.184.125.132) | wsip-70-184-125-132.ph.ph.cox.net | - | High
|
||||
154 | [71.15.245.148](https://vuldb.com/?ip.71.15.245.148) | 071-015-245-148.res.spectrum.com | - | High
|
||||
155 | [71.197.211.156](https://vuldb.com/?ip.71.197.211.156) | c-71-197-211-156.hsd1.wa.comcast.net | - | High
|
||||
156 | [71.244.60.231](https://vuldb.com/?ip.71.244.60.231) | static-71-244-60-231.dllstx.fios.frontiernet.net | - | High
|
||||
157 | [72.10.49.117](https://vuldb.com/?ip.72.10.49.117) | rtw7-rfpn.accessdomain.com | - | High
|
||||
158 | [72.18.204.17](https://vuldb.com/?ip.72.18.204.17) | lasvegas-nv-datacenter.com | - | High
|
||||
159 | ... | ... | ... | ...
|
||||
3 | [1.234.2.232](https://vuldb.com/?ip.1.234.2.232) | - | - | High
|
||||
4 | [1.234.21.73](https://vuldb.com/?ip.1.234.21.73) | - | - | High
|
||||
5 | [2.47.112.152](https://vuldb.com/?ip.2.47.112.152) | net-2-47-112-152.cust.vodafonedsl.it | - | High
|
||||
6 | [2.58.16.86](https://vuldb.com/?ip.2.58.16.86) | - | - | High
|
||||
7 | [2.58.16.89](https://vuldb.com/?ip.2.58.16.89) | - | - | High
|
||||
8 | [2.82.75.215](https://vuldb.com/?ip.2.82.75.215) | bl21-75-215.dsl.telepac.pt | - | High
|
||||
9 | [5.2.84.232](https://vuldb.com/?ip.5.2.84.232) | momos.alastyr.com | - | High
|
||||
10 | [5.2.136.90](https://vuldb.com/?ip.5.2.136.90) | static-5-2-136-90.rdsnet.ro | - | High
|
||||
11 | [5.2.182.7](https://vuldb.com/?ip.5.2.182.7) | static-5-2-182-7.rdsnet.ro | - | High
|
||||
12 | [5.2.212.254](https://vuldb.com/?ip.5.2.212.254) | static-5-2-212-254.rdsnet.ro | - | High
|
||||
13 | [5.9.116.246](https://vuldb.com/?ip.5.9.116.246) | static.246.116.9.5.clients.your-server.de | - | High
|
||||
14 | [5.9.128.163](https://vuldb.com/?ip.5.9.128.163) | static.163.128.9.5.clients.your-server.de | - | High
|
||||
15 | [5.9.189.24](https://vuldb.com/?ip.5.9.189.24) | static.24.189.9.5.clients.your-server.de | - | High
|
||||
16 | [5.12.246.155](https://vuldb.com/?ip.5.12.246.155) | 5-12-246-155.residential.rdsnet.ro | - | High
|
||||
17 | [5.35.249.46](https://vuldb.com/?ip.5.35.249.46) | rs250366.rs.hosteurope.de | - | High
|
||||
18 | [5.39.84.48](https://vuldb.com/?ip.5.39.84.48) | ns3126815.ip-5-39-84.eu | - | High
|
||||
19 | [5.39.91.110](https://vuldb.com/?ip.5.39.91.110) | ns3278366.ip-5-39-91.eu | - | High
|
||||
20 | [5.79.70.250](https://vuldb.com/?ip.5.79.70.250) | - | - | High
|
||||
21 | [5.89.33.136](https://vuldb.com/?ip.5.89.33.136) | net-5-89-33-136.cust.vodafonedsl.it | - | High
|
||||
22 | [5.159.57.195](https://vuldb.com/?ip.5.159.57.195) | www-riedle.transfermarkt.de | - | High
|
||||
23 | [5.196.35.138](https://vuldb.com/?ip.5.196.35.138) | vps10.open-techno.net | - | High
|
||||
24 | [5.196.73.150](https://vuldb.com/?ip.5.196.73.150) | ns3000085.ip-5-196-73.eu | - | High
|
||||
25 | [5.230.193.41](https://vuldb.com/?ip.5.230.193.41) | casagarcia-web.sys.netzfabrik.eu | - | High
|
||||
26 | [8.4.9.137](https://vuldb.com/?ip.8.4.9.137) | onlinehorizons.net | - | High
|
||||
27 | [8.247.6.134](https://vuldb.com/?ip.8.247.6.134) | - | - | High
|
||||
28 | [12.6.183.21](https://vuldb.com/?ip.12.6.183.21) | - | - | High
|
||||
29 | [12.32.68.154](https://vuldb.com/?ip.12.32.68.154) | mail.sealscoinc.com | - | High
|
||||
30 | [12.149.72.170](https://vuldb.com/?ip.12.149.72.170) | - | - | High
|
||||
31 | [12.162.84.2](https://vuldb.com/?ip.12.162.84.2) | - | - | High
|
||||
32 | [12.163.208.58](https://vuldb.com/?ip.12.163.208.58) | - | - | High
|
||||
33 | [12.182.146.226](https://vuldb.com/?ip.12.182.146.226) | - | - | High
|
||||
34 | [12.184.217.101](https://vuldb.com/?ip.12.184.217.101) | - | - | High
|
||||
35 | [23.6.65.194](https://vuldb.com/?ip.23.6.65.194) | a23-6-65-194.deploy.static.akamaitechnologies.com | - | High
|
||||
36 | [23.36.85.183](https://vuldb.com/?ip.23.36.85.183) | a23-36-85-183.deploy.static.akamaitechnologies.com | - | High
|
||||
37 | [23.199.63.11](https://vuldb.com/?ip.23.199.63.11) | a23-199-63-11.deploy.static.akamaitechnologies.com | - | High
|
||||
38 | [23.199.71.185](https://vuldb.com/?ip.23.199.71.185) | a23-199-71-185.deploy.static.akamaitechnologies.com | - | High
|
||||
39 | [23.239.2.11](https://vuldb.com/?ip.23.239.2.11) | li683-11.members.linode.com | - | High
|
||||
40 | [23.254.203.51](https://vuldb.com/?ip.23.254.203.51) | hwsrv-779084.hostwindsdns.com | - | High
|
||||
41 | [24.43.99.75](https://vuldb.com/?ip.24.43.99.75) | rrcs-24-43-99-75.west.biz.rr.com | - | High
|
||||
42 | [24.101.229.82](https://vuldb.com/?ip.24.101.229.82) | dynamic-acs-24-101-229-82.zoominternet.net | - | High
|
||||
43 | [24.119.116.230](https://vuldb.com/?ip.24.119.116.230) | 24-119-116-230.cpe.sparklight.net | - | High
|
||||
44 | [24.121.176.48](https://vuldb.com/?ip.24.121.176.48) | 24-121-176-48.prkrcmtc01.com.sta.suddenlink.net | - | High
|
||||
45 | [24.137.76.62](https://vuldb.com/?ip.24.137.76.62) | host-24-137-76-62.public.eastlink.ca | - | High
|
||||
46 | [24.178.90.49](https://vuldb.com/?ip.24.178.90.49) | 024-178-090-049.res.spectrum.com | - | High
|
||||
47 | [24.179.13.119](https://vuldb.com/?ip.24.179.13.119) | 024-179-013-119.res.spectrum.com | - | High
|
||||
48 | [24.217.117.217](https://vuldb.com/?ip.24.217.117.217) | 024-217-117-217.res.spectrum.com | - | High
|
||||
49 | [24.232.228.233](https://vuldb.com/?ip.24.232.228.233) | OL233-228.fibertel.com.ar | - | High
|
||||
50 | [24.244.177.40](https://vuldb.com/?ip.24.244.177.40) | - | - | High
|
||||
51 | [27.78.27.110](https://vuldb.com/?ip.27.78.27.110) | localhost | - | High
|
||||
52 | [27.82.13.10](https://vuldb.com/?ip.27.82.13.10) | KD027082013010.ppp-bb.dion.ne.jp | - | High
|
||||
53 | [27.109.24.214](https://vuldb.com/?ip.27.109.24.214) | - | - | High
|
||||
54 | [27.114.9.93](https://vuldb.com/?ip.27.114.9.93) | i27-114-9-93.s41.a011.ap.plala.or.jp | - | High
|
||||
55 | [31.24.158.56](https://vuldb.com/?ip.31.24.158.56) | bm.servidoresdedicados.com | - | High
|
||||
56 | [35.190.87.116](https://vuldb.com/?ip.35.190.87.116) | 116.87.190.35.bc.googleusercontent.com | - | Medium
|
||||
57 | [36.91.44.183](https://vuldb.com/?ip.36.91.44.183) | - | - | High
|
||||
58 | [37.46.129.215](https://vuldb.com/?ip.37.46.129.215) | we-too.ru | - | High
|
||||
59 | [37.97.135.82](https://vuldb.com/?ip.37.97.135.82) | 37-97-135-82.colo.transip.net | - | High
|
||||
60 | [37.139.21.175](https://vuldb.com/?ip.37.139.21.175) | 37.139.21.175-e2-8080-keep-up | - | High
|
||||
61 | [37.179.204.33](https://vuldb.com/?ip.37.179.204.33) | - | - | High
|
||||
62 | [37.187.4.178](https://vuldb.com/?ip.37.187.4.178) | ks2.kku.io | - | High
|
||||
63 | [37.187.57.57](https://vuldb.com/?ip.37.187.57.57) | ns3357940.ovh.net | - | High
|
||||
64 | [37.187.72.193](https://vuldb.com/?ip.37.187.72.193) | ns3362285.ip-37-187-72.eu | - | High
|
||||
65 | [37.187.161.206](https://vuldb.com/?ip.37.187.161.206) | toolbox.alabs.io | - | High
|
||||
66 | [37.205.9.252](https://vuldb.com/?ip.37.205.9.252) | s1.ithelp24.eu | - | High
|
||||
67 | [37.221.70.250](https://vuldb.com/?ip.37.221.70.250) | b2b-customer.inftele.net | - | High
|
||||
68 | [41.76.108.46](https://vuldb.com/?ip.41.76.108.46) | - | - | High
|
||||
69 | [41.169.36.237](https://vuldb.com/?ip.41.169.36.237) | - | - | High
|
||||
70 | [41.185.28.84](https://vuldb.com/?ip.41.185.28.84) | brf01-nix01.wadns.net | - | High
|
||||
71 | [41.185.29.128](https://vuldb.com/?ip.41.185.29.128) | abp79-nix01.wadns.net | - | High
|
||||
72 | [41.231.225.139](https://vuldb.com/?ip.41.231.225.139) | - | - | High
|
||||
73 | [42.62.40.103](https://vuldb.com/?ip.42.62.40.103) | - | - | High
|
||||
74 | [45.16.226.117](https://vuldb.com/?ip.45.16.226.117) | 45-16-226-117.lightspeed.sndgca.sbcglobal.net | - | High
|
||||
75 | [45.33.77.42](https://vuldb.com/?ip.45.33.77.42) | li1023-42.members.linode.com | - | High
|
||||
76 | [45.46.37.97](https://vuldb.com/?ip.45.46.37.97) | cpe-45-46-37-97.maine.res.rr.com | - | High
|
||||
77 | [45.55.36.51](https://vuldb.com/?ip.45.55.36.51) | - | - | High
|
||||
78 | [45.55.219.163](https://vuldb.com/?ip.45.55.219.163) | - | - | High
|
||||
79 | [45.79.95.107](https://vuldb.com/?ip.45.79.95.107) | li1194-107.members.linode.com | - | High
|
||||
80 | [45.80.148.200](https://vuldb.com/?ip.45.80.148.200) | - | - | High
|
||||
81 | [45.118.115.99](https://vuldb.com/?ip.45.118.115.99) | - | - | High
|
||||
82 | [45.118.135.203](https://vuldb.com/?ip.45.118.135.203) | 45-118-135-203.ip.linodeusercontent.com | - | High
|
||||
83 | [45.142.114.231](https://vuldb.com/?ip.45.142.114.231) | mail.dounutmail.de | - | High
|
||||
84 | [45.176.232.124](https://vuldb.com/?ip.45.176.232.124) | - | - | High
|
||||
85 | [45.230.45.171](https://vuldb.com/?ip.45.230.45.171) | - | - | High
|
||||
86 | [46.4.100.178](https://vuldb.com/?ip.46.4.100.178) | support.wizard-shopservice.de | - | High
|
||||
87 | [46.4.192.185](https://vuldb.com/?ip.46.4.192.185) | static.185.192.4.46.clients.your-server.de | - | High
|
||||
88 | [46.28.111.142](https://vuldb.com/?ip.46.28.111.142) | enkindu.jsuchy.net | - | High
|
||||
89 | [46.32.229.152](https://vuldb.com/?ip.46.32.229.152) | 094882.vps-10.com | - | High
|
||||
90 | [46.32.233.226](https://vuldb.com/?ip.46.32.233.226) | yetitoolusa.com | - | High
|
||||
91 | [46.38.238.8](https://vuldb.com/?ip.46.38.238.8) | v2202109122001163131.happysrv.de | - | High
|
||||
92 | [46.43.2.95](https://vuldb.com/?ip.46.43.2.95) | chris.default.cjenkinson.uk0.bigv.io | - | High
|
||||
93 | [46.55.222.11](https://vuldb.com/?ip.46.55.222.11) | - | - | High
|
||||
94 | [46.101.58.37](https://vuldb.com/?ip.46.101.58.37) | 46.101.58.37-e1-8080 | - | High
|
||||
95 | [46.105.81.76](https://vuldb.com/?ip.46.105.81.76) | myu0.cylipo.sbs | - | High
|
||||
96 | [46.105.114.137](https://vuldb.com/?ip.46.105.114.137) | ns3188253.ip-46-105-114.eu | - | High
|
||||
97 | [46.105.131.68](https://vuldb.com/?ip.46.105.131.68) | http.adven.fr | - | High
|
||||
98 | [46.105.131.79](https://vuldb.com/?ip.46.105.131.79) | relay.adven.fr | - | High
|
||||
99 | [46.105.131.87](https://vuldb.com/?ip.46.105.131.87) | pop.adven.fr | - | High
|
||||
100 | [46.105.236.18](https://vuldb.com/?ip.46.105.236.18) | - | - | High
|
||||
101 | [46.165.212.76](https://vuldb.com/?ip.46.165.212.76) | - | - | High
|
||||
102 | [46.165.254.206](https://vuldb.com/?ip.46.165.254.206) | - | - | High
|
||||
103 | [46.214.107.142](https://vuldb.com/?ip.46.214.107.142) | 46-214-107-142.next-gen.ro | - | High
|
||||
104 | [47.36.140.164](https://vuldb.com/?ip.47.36.140.164) | 047-036-140-164.res.spectrum.com | - | High
|
||||
105 | [47.146.39.147](https://vuldb.com/?ip.47.146.39.147) | - | - | High
|
||||
106 | [47.188.131.94](https://vuldb.com/?ip.47.188.131.94) | - | - | High
|
||||
107 | [47.246.24.225](https://vuldb.com/?ip.47.246.24.225) | - | - | High
|
||||
108 | [47.246.24.226](https://vuldb.com/?ip.47.246.24.226) | - | - | High
|
||||
109 | [47.246.24.230](https://vuldb.com/?ip.47.246.24.230) | - | - | High
|
||||
110 | [47.246.24.232](https://vuldb.com/?ip.47.246.24.232) | - | - | High
|
||||
111 | [49.12.121.47](https://vuldb.com/?ip.49.12.121.47) | filezilla-project.org | - | High
|
||||
112 | [49.50.209.131](https://vuldb.com/?ip.49.50.209.131) | 131.host-49-50-209.euba.megatel.co.nz | - | High
|
||||
113 | [49.212.135.76](https://vuldb.com/?ip.49.212.135.76) | os3-321-50322.vs.sakura.ne.jp | - | High
|
||||
114 | [49.212.155.94](https://vuldb.com/?ip.49.212.155.94) | os3-325-52340.vs.sakura.ne.jp | - | High
|
||||
115 | [50.28.51.143](https://vuldb.com/?ip.50.28.51.143) | - | - | High
|
||||
116 | [50.30.40.196](https://vuldb.com/?ip.50.30.40.196) | usve255301.serverprofi24.com | - | High
|
||||
117 | [50.31.146.101](https://vuldb.com/?ip.50.31.146.101) | mail.brillinjurylaw.com | - | High
|
||||
118 | [50.56.135.44](https://vuldb.com/?ip.50.56.135.44) | - | - | High
|
||||
119 | [50.91.114.38](https://vuldb.com/?ip.50.91.114.38) | 050-091-114-038.res.spectrum.com | - | High
|
||||
120 | [50.116.54.215](https://vuldb.com/?ip.50.116.54.215) | li440-215.members.linode.com | - | High
|
||||
121 | [50.116.78.109](https://vuldb.com/?ip.50.116.78.109) | intersearchmedia.com | - | High
|
||||
122 | [50.245.107.73](https://vuldb.com/?ip.50.245.107.73) | 50-245-107-73-static.hfc.comcastbusiness.net | - | High
|
||||
123 | [51.15.4.22](https://vuldb.com/?ip.51.15.4.22) | 51-15-4-22.rev.poneytelecom.eu | - | High
|
||||
124 | [51.15.7.145](https://vuldb.com/?ip.51.15.7.145) | 51-15-7-145.rev.poneytelecom.eu | - | High
|
||||
125 | [51.38.201.19](https://vuldb.com/?ip.51.38.201.19) | ip19.ip-51-38-201.eu | - | High
|
||||
126 | [51.75.33.120](https://vuldb.com/?ip.51.75.33.120) | ip120.ip-51-75-33.eu | - | High
|
||||
127 | [51.75.33.127](https://vuldb.com/?ip.51.75.33.127) | ip127.ip-51-75-33.eu | - | High
|
||||
128 | [51.89.36.180](https://vuldb.com/?ip.51.89.36.180) | ip180.ip-51-89-36.eu | - | High
|
||||
129 | [51.89.199.141](https://vuldb.com/?ip.51.89.199.141) | ip141.ip-51-89-199.eu | - | High
|
||||
130 | [51.91.7.5](https://vuldb.com/?ip.51.91.7.5) | ns3147667.ip-51-91-7.eu | - | High
|
||||
131 | [51.91.76.89](https://vuldb.com/?ip.51.91.76.89) | 89.ip-51-91-76.eu | - | High
|
||||
132 | [51.159.35.157](https://vuldb.com/?ip.51.159.35.157) | 51-159-35-157.rev.poneytelecom.eu | - | High
|
||||
133 | [51.254.140.238](https://vuldb.com/?ip.51.254.140.238) | 238.ip-51-254-140.eu | - | High
|
||||
134 | [51.255.50.164](https://vuldb.com/?ip.51.255.50.164) | vps-b6cfe010.vps.ovh.net | - | High
|
||||
135 | [51.255.165.160](https://vuldb.com/?ip.51.255.165.160) | 160.ip-51-255-165.eu | - | High
|
||||
136 | [52.66.202.63](https://vuldb.com/?ip.52.66.202.63) | ec2-52-66-202-63.ap-south-1.compute.amazonaws.com | - | Medium
|
||||
137 | [54.38.143.245](https://vuldb.com/?ip.54.38.143.245) | tools.inovato.me | - | High
|
||||
138 | [58.27.215.3](https://vuldb.com/?ip.58.27.215.3) | 58-27-215-3.wateen.net | - | High
|
||||
139 | [58.94.58.13](https://vuldb.com/?ip.58.94.58.13) | i58-94-58-13.s41.a014.ap.plala.or.jp | - | High
|
||||
140 | [58.216.16.130](https://vuldb.com/?ip.58.216.16.130) | - | - | High
|
||||
141 | [58.227.42.236](https://vuldb.com/?ip.58.227.42.236) | - | - | High
|
||||
142 | [59.148.253.194](https://vuldb.com/?ip.59.148.253.194) | 059148253194.ctinets.com | - | High
|
||||
143 | [60.93.23.51](https://vuldb.com/?ip.60.93.23.51) | softbank060093023051.bbtec.net | - | High
|
||||
144 | [60.108.128.186](https://vuldb.com/?ip.60.108.128.186) | softbank060108128186.bbtec.net | - | High
|
||||
145 | [60.125.114.64](https://vuldb.com/?ip.60.125.114.64) | softbank060125114064.bbtec.net | - | High
|
||||
146 | [60.249.78.226](https://vuldb.com/?ip.60.249.78.226) | 60-249-78-226.hinet-ip.hinet.net | - | High
|
||||
147 | [61.19.246.238](https://vuldb.com/?ip.61.19.246.238) | - | - | High
|
||||
148 | [62.30.7.67](https://vuldb.com/?ip.62.30.7.67) | 67.7-30-62.static.virginmediabusiness.co.uk | - | High
|
||||
149 | [62.75.141.82](https://vuldb.com/?ip.62.75.141.82) | static-ip-62-75-141-82.inaddr.ip-pool.com | - | High
|
||||
150 | [62.84.75.50](https://vuldb.com/?ip.62.84.75.50) | mail.saadegrp.com.lb | - | High
|
||||
151 | [62.171.142.179](https://vuldb.com/?ip.62.171.142.179) | vmi499457.contaboserver.net | - | High
|
||||
152 | [62.212.34.102](https://vuldb.com/?ip.62.212.34.102) | - | - | High
|
||||
153 | [64.190.63.136](https://vuldb.com/?ip.64.190.63.136) | - | - | High
|
||||
154 | [64.207.182.168](https://vuldb.com/?ip.64.207.182.168) | - | - | High
|
||||
155 | [66.54.51.172](https://vuldb.com/?ip.66.54.51.172) | - | - | High
|
||||
156 | [66.76.26.33](https://vuldb.com/?ip.66.76.26.33) | 66-76-26-33.hdsncmta01.com.sta.suddenlink.net | - | High
|
||||
157 | [66.209.69.165](https://vuldb.com/?ip.66.209.69.165) | - | - | High
|
||||
158 | [66.228.61.248](https://vuldb.com/?ip.66.228.61.248) | li318-248.members.linode.com | - | High
|
||||
159 | [67.19.105.107](https://vuldb.com/?ip.67.19.105.107) | ns2.datatrust.com.br | - | High
|
||||
160 | [67.170.250.203](https://vuldb.com/?ip.67.170.250.203) | c-67-170-250-203.hsd1.ca.comcast.net | - | High
|
||||
161 | [67.225.218.50](https://vuldb.com/?ip.67.225.218.50) | lb01.parklogic.com | - | High
|
||||
162 | [68.2.97.91](https://vuldb.com/?ip.68.2.97.91) | ip68-2-97-91.ph.ph.cox.net | - | High
|
||||
163 | [68.183.170.114](https://vuldb.com/?ip.68.183.170.114) | 68.183.170.114-e1-8080-keep-up | - | High
|
||||
164 | [68.183.190.199](https://vuldb.com/?ip.68.183.190.199) | 68.183.190.199-e1-8080-keep-up | - | High
|
||||
165 | [69.17.170.58](https://vuldb.com/?ip.69.17.170.58) | unallocated-static.rogers.com | - | High
|
||||
166 | [69.43.168.200](https://vuldb.com/?ip.69.43.168.200) | ns0.imunplugged.com | - | High
|
||||
167 | [69.45.19.251](https://vuldb.com/?ip.69.45.19.251) | coastinet.com | - | High
|
||||
168 | [69.163.33.82](https://vuldb.com/?ip.69.163.33.82) | - | - | High
|
||||
169 | [69.167.152.111](https://vuldb.com/?ip.69.167.152.111) | - | - | High
|
||||
170 | [69.198.17.49](https://vuldb.com/?ip.69.198.17.49) | 69-198-17-49.customerip.birch.net | - | High
|
||||
171 | [70.32.84.74](https://vuldb.com/?ip.70.32.84.74) | - | - | High
|
||||
172 | [70.32.89.105](https://vuldb.com/?ip.70.32.89.105) | parties-at-sea.com | - | High
|
||||
173 | [70.32.92.133](https://vuldb.com/?ip.70.32.92.133) | popdesigngroup.com | - | High
|
||||
174 | [70.32.115.157](https://vuldb.com/?ip.70.32.115.157) | harpotripofalifetime.com | - | High
|
||||
175 | [70.36.102.35](https://vuldb.com/?ip.70.36.102.35) | - | - | High
|
||||
176 | [70.168.7.6](https://vuldb.com/?ip.70.168.7.6) | wsip-70-168-7-6.ri.ri.cox.net | - | High
|
||||
177 | [70.182.77.184](https://vuldb.com/?ip.70.182.77.184) | wsip-70-182-77-184.ok.ok.cox.net | - | High
|
||||
178 | [70.184.125.132](https://vuldb.com/?ip.70.184.125.132) | wsip-70-184-125-132.ph.ph.cox.net | - | High
|
||||
179 | [71.15.245.148](https://vuldb.com/?ip.71.15.245.148) | 071-015-245-148.res.spectrum.com | - | High
|
||||
180 | [71.40.213.82](https://vuldb.com/?ip.71.40.213.82) | rrcs-71-40-213-82.sw.biz.rr.com | - | High
|
||||
181 | [71.197.211.156](https://vuldb.com/?ip.71.197.211.156) | c-71-197-211-156.hsd1.wa.comcast.net | - | High
|
||||
182 | [71.244.60.231](https://vuldb.com/?ip.71.244.60.231) | static-71-244-60-231.dllstx.fios.frontiernet.net | - | High
|
||||
183 | [72.10.49.117](https://vuldb.com/?ip.72.10.49.117) | rtw7-rfpn.accessdomain.com | - | High
|
||||
184 | [72.15.201.15](https://vuldb.com/?ip.72.15.201.15) | - | - | High
|
||||
185 | ... | ... | ... | ...
|
||||
|
||||
There are 630 more IOC items available. Please use our online service to access the data.
|
||||
There are 735 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -189,9 +215,9 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
1 | T1008 | CWE-757 | Algorithm Downgrade | High
|
||||
2 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
@ -202,20 +228,29 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.htaccess` | Medium
|
||||
2 | File | `/admin/ajax/avatar.php` | High
|
||||
3 | File | `/admin/uploads.php` | High
|
||||
4 | File | `/alerts/alertConfigField.php` | High
|
||||
5 | File | `/alerts/alertLightbox.php` | High
|
||||
6 | File | `/aqpg/users/login.php` | High
|
||||
7 | File | `/classes/ajax/Functions.php` | High
|
||||
8 | File | `/cwms/admin/?page=articles/view_article/` | High
|
||||
9 | File | `/cwms/classes/Master.php?f=save_contact` | High
|
||||
10 | File | `/i/:data/ipa.plist` | High
|
||||
11 | File | `/jquery_file_upload/server/php/index.php` | High
|
||||
12 | ... | ... | ...
|
||||
1 | File | `.htaccess` | Medium
|
||||
2 | File | `/admin.php/admin/plog/index.html` | High
|
||||
3 | File | `/admin.php/admin/ulog/index.html` | High
|
||||
4 | File | `/admin.php/admin/vod/data.html` | High
|
||||
5 | File | `/admin.php/admin/website/data.html` | High
|
||||
6 | File | `/admin/contenttemp` | High
|
||||
7 | File | `/admin/show.php` | High
|
||||
8 | File | `/api/crontab` | Medium
|
||||
9 | File | `/api/fetch` | Medium
|
||||
10 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
11 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
12 | File | `/config/list` | Medium
|
||||
13 | File | `/controller/Index.php` | High
|
||||
14 | File | `/core/conditions/AbstractWrapper.java` | High
|
||||
15 | File | `/data/sqldata` | High
|
||||
16 | File | `/DataHandler/HandlerEnergyType.ashx` | High
|
||||
17 | File | `/factor/avx-ecm/vecarith52.c` | High
|
||||
18 | File | `/goform/delAd` | High
|
||||
19 | File | `/goform/exeCommand` | High
|
||||
20 | File | `/goform/setAdInfoDetail` | High
|
||||
21 | ... | ... | ...
|
||||
|
||||
There are 95 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 169 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -234,11 +269,17 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
* https://blog.talosintelligence.com/2022/02/threat-roundup-0128-0204.html
|
||||
* https://blog.talosintelligence.com/2022/02/threat-roundup-0211-0218.html
|
||||
* https://blog.talosintelligence.com/2022/03/threat-roundup-0225-0304.html
|
||||
* https://blog.talosintelligence.com/2022/03/threat-roundup-0311-0318.html
|
||||
* https://blogs.blackberry.com/en/2017/12/threat-spotlight-emotet-infostealer-malware
|
||||
* https://community.blueliv.com/#!/s/5fb2ee2482df413eaf344b29
|
||||
* https://ddanchev.blogspot.com/2022/01/profiling-emotet-botnet-c.html
|
||||
* https://github.com/pr0xylife/Emotet/blob/main/e4_emotet_24.03.2022.txt
|
||||
* https://isc.sans.edu/forums/diary/Emotet+Returns/28044/
|
||||
* https://isc.sans.edu/forums/diary/Emotet+Stops+Using+0000+in+Spambot+Traffic/28270/
|
||||
* https://lawiet47.github.io/malware_writeups/Emotet/
|
||||
* https://pastebin.com/uPn1zM6b
|
||||
* https://unit42.paloaltonetworks.com/emotet-command-and-control/
|
||||
* https://www.cert.pl/en/posts/2017/05/analysis-of-emotet-v4/
|
||||
* https://www.trendmicro.com/en_us/research/22/a/emotet-spam-abuses-unconventional-ip-address-formats-spread-malware.html
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -36,7 +36,7 @@ There are 10 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Exchange Marauder_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Exchange Marauder_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -0,0 +1,51 @@
|
|||
# Exotic Lily - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Exotic Lily](https://vuldb.com/?actor.exotic_lily). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.exotic_lily](https://vuldb.com/?actor.exotic_lily)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following _campaigns_ are known and can be associated with Exotic Lily:
|
||||
|
||||
* BumbleBee
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Exotic Lily:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Exotic Lily.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [23.81.246.187](https://vuldb.com/?ip.23.81.246.187) | - | BumbleBee | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Exotic Lily_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -31,12 +31,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
|
|
@ -9,6 +9,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
The following _campaigns_ are known and can be associated with FIN6:
|
||||
|
||||
* MAZE
|
||||
* Point of Sale Thin Clients
|
||||
|
||||
## Countries
|
||||
|
||||
|
@ -19,7 +20,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [RU](https://vuldb.com/?country.ru)
|
||||
* ...
|
||||
|
||||
There are 12 more country items available. Please use our online service to access the data.
|
||||
There are 14 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -27,25 +28,28 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [5.199.167.188](https://vuldb.com/?ip.5.199.167.188) | - | MAZE | High
|
||||
2 | [31.220.45.151](https://vuldb.com/?ip.31.220.45.151) | - | - | High
|
||||
3 | [37.1.213.9](https://vuldb.com/?ip.37.1.213.9) | - | MAZE | High
|
||||
4 | [37.1.221.212](https://vuldb.com/?ip.37.1.221.212) | adspect.net | - | High
|
||||
5 | [37.252.7.142](https://vuldb.com/?ip.37.252.7.142) | - | MAZE | High
|
||||
6 | [46.4.113.237](https://vuldb.com/?ip.46.4.113.237) | static.237.113.4.46.clients.your-server.de | - | High
|
||||
7 | [46.166.173.109](https://vuldb.com/?ip.46.166.173.109) | - | - | High
|
||||
8 | [54.39.233.188](https://vuldb.com/?ip.54.39.233.188) | mail.ov120.slpmt.net | MAZE | High
|
||||
9 | [62.210.136.65](https://vuldb.com/?ip.62.210.136.65) | 62-210-136-65.rev.poneytelecom.eu | - | High
|
||||
10 | [89.105.194.236](https://vuldb.com/?ip.89.105.194.236) | - | - | High
|
||||
11 | [91.208.184.174](https://vuldb.com/?ip.91.208.184.174) | sell.mybeststore.club | MAZE | High
|
||||
12 | [91.218.114.4](https://vuldb.com/?ip.91.218.114.4) | - | MAZE | High
|
||||
13 | ... | ... | ... | ...
|
||||
1 | [2.72.0.200](https://vuldb.com/?ip.2.72.0.200) | 2-72-0-200.kcell.kz | Point of Sale Thin Clients | High
|
||||
2 | [5.39.219.15](https://vuldb.com/?ip.5.39.219.15) | - | Point of Sale Thin Clients | High
|
||||
3 | [5.199.167.188](https://vuldb.com/?ip.5.199.167.188) | - | MAZE | High
|
||||
4 | [31.220.45.151](https://vuldb.com/?ip.31.220.45.151) | - | - | High
|
||||
5 | [34.245.88.113](https://vuldb.com/?ip.34.245.88.113) | ec2-34-245-88-113.eu-west-1.compute.amazonaws.com | Point of Sale Thin Clients | Medium
|
||||
6 | [35.182.31.181](https://vuldb.com/?ip.35.182.31.181) | ec2-35-182-31-181.ca-central-1.compute.amazonaws.com | Point of Sale Thin Clients | Medium
|
||||
7 | [37.1.213.9](https://vuldb.com/?ip.37.1.213.9) | - | MAZE | High
|
||||
8 | [37.1.221.212](https://vuldb.com/?ip.37.1.221.212) | adspect.net | - | High
|
||||
9 | [37.139.21.20](https://vuldb.com/?ip.37.139.21.20) | - | Point of Sale Thin Clients | High
|
||||
10 | [37.252.7.142](https://vuldb.com/?ip.37.252.7.142) | - | MAZE | High
|
||||
11 | [45.247.22.27](https://vuldb.com/?ip.45.247.22.27) | - | Point of Sale Thin Clients | High
|
||||
12 | [46.4.113.237](https://vuldb.com/?ip.46.4.113.237) | static.237.113.4.46.clients.your-server.de | - | High
|
||||
13 | [46.166.173.109](https://vuldb.com/?ip.46.166.173.109) | - | - | High
|
||||
14 | [47.75.151.154](https://vuldb.com/?ip.47.75.151.154) | - | Point of Sale Thin Clients | High
|
||||
15 | [54.39.233.188](https://vuldb.com/?ip.54.39.233.188) | mail.ov120.slpmt.net | MAZE | High
|
||||
16 | ... | ... | ... | ...
|
||||
|
||||
There are 48 more IOC items available. Please use our online service to access the data.
|
||||
There are 61 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by FIN6. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _FIN6_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -54,7 +58,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -62,66 +66,68 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/accountancy/admin/accountmodel.php` | High
|
||||
2 | File | `/admin/setup` | Medium
|
||||
3 | File | `/advance_push/public/login` | High
|
||||
4 | File | `/ajax-files/postComment.php` | High
|
||||
5 | File | `/anony/mjpg.cgi` | High
|
||||
6 | File | `/bin/sh` | Low
|
||||
7 | File | `/catalog` | Medium
|
||||
8 | File | `/cgi-bin/ExportSettings.sh` | High
|
||||
9 | File | `/cgi-bin/login_action.cgi` | High
|
||||
10 | File | `/cgi-bin/webproc` | High
|
||||
11 | File | `/checkLogin.cgi` | High
|
||||
12 | File | `/classes/profile.class.php` | High
|
||||
13 | File | `/common/run_report.php` | High
|
||||
14 | File | `/data/inc/images.php` | High
|
||||
15 | File | `/data/syslog.filter.json` | High
|
||||
16 | File | `/data/wps.setup.json` | High
|
||||
17 | File | `/docs/captcha_(number).jpeg` | High
|
||||
18 | File | `/etc/config/rpcd` | High
|
||||
19 | File | `/etc/hosts` | Medium
|
||||
20 | File | `/forum/` | Low
|
||||
21 | File | `/goform/net\_Web\_get_value` | High
|
||||
22 | File | `/index.php` | Medium
|
||||
23 | File | `/index.php/weblinks-categories` | High
|
||||
24 | File | `/j_security_check` | High
|
||||
25 | File | `/login.html` | Medium
|
||||
26 | File | `/menu.html` | Medium
|
||||
27 | File | `/mics/j_spring_security_check` | High
|
||||
28 | File | `/mnt/sdcard/$PRO_NAME/upgrade.sh` | High
|
||||
29 | File | `/mnt/skyeye/mode_switch.sh` | High
|
||||
30 | File | `/mybb_1806/Upload/admin/index.php` | High
|
||||
31 | File | `/oauth/token` | Medium
|
||||
32 | File | `/plain` | Low
|
||||
33 | File | `/romfile.cfg` | Medium
|
||||
34 | File | `/scp/directory.php` | High
|
||||
35 | File | `/setSystemAdmin` | High
|
||||
36 | File | `/system/WCore/WHelper.php` | High
|
||||
37 | File | `/tmp/connlicj.bin` | High
|
||||
38 | File | `/uncpath/` | Medium
|
||||
39 | File | `/upload` | Low
|
||||
40 | File | `/userfs/bin/tcapi` | High
|
||||
41 | File | `/var/www/xms/application/config/config.php` | High
|
||||
42 | File | `/var/www/xms/application/controllers/gatherLogs.php` | High
|
||||
43 | File | `/var/www/xms/application/controllers/verifyLogin.php` | High
|
||||
44 | File | `/var/www/xms/cleanzip.sh` | High
|
||||
45 | File | `/vendor/phpdocumentor/reflection-docblock/tests/phpDocumentor/Reflection/DocBlock/Tag/LinkTagTeet.php` | High
|
||||
46 | File | `/websocket/exec` | High
|
||||
47 | File | `/workspaceCleanup` | High
|
||||
48 | File | `/wp-admin/admin-ajax.php?action=get_wdtable&table_id=1` | High
|
||||
49 | File | `account/gallery.php` | High
|
||||
50 | File | `add_edit_cat.asp` | High
|
||||
51 | File | `admin.htm` | Medium
|
||||
52 | File | `admin.php` | Medium
|
||||
53 | ... | ... | ...
|
||||
1 | File | `//` | Low
|
||||
2 | File | `/accountancy/admin/accountmodel.php` | High
|
||||
3 | File | `/admin/index.php?n=system&c=filept&a=doGetFileList` | High
|
||||
4 | File | `/admin/setup` | Medium
|
||||
5 | File | `/advance_push/public/login` | High
|
||||
6 | File | `/ajax-files/postComment.php` | High
|
||||
7 | File | `/anony/mjpg.cgi` | High
|
||||
8 | File | `/bin/sh` | Low
|
||||
9 | File | `/catalog` | Medium
|
||||
10 | File | `/cgi-bin/ExportSettings.sh` | High
|
||||
11 | File | `/cgi-bin/login_action.cgi` | High
|
||||
12 | File | `/cgi-bin/webproc` | High
|
||||
13 | File | `/checkLogin.cgi` | High
|
||||
14 | File | `/classes/profile.class.php` | High
|
||||
15 | File | `/common/run_report.php` | High
|
||||
16 | File | `/data/inc/images.php` | High
|
||||
17 | File | `/data/syslog.filter.json` | High
|
||||
18 | File | `/data/wps.setup.json` | High
|
||||
19 | File | `/docs/captcha_(number).jpeg` | High
|
||||
20 | File | `/etc/config/rpcd` | High
|
||||
21 | File | `/etc/hosts` | Medium
|
||||
22 | File | `/forum/` | Low
|
||||
23 | File | `/goform/net\_Web\_get_value` | High
|
||||
24 | File | `/index.php` | Medium
|
||||
25 | File | `/index.php/weblinks-categories` | High
|
||||
26 | File | `/j_security_check` | High
|
||||
27 | File | `/login.html` | Medium
|
||||
28 | File | `/menu.html` | Medium
|
||||
29 | File | `/mics/j_spring_security_check` | High
|
||||
30 | File | `/mnt/sdcard/$PRO_NAME/upgrade.sh` | High
|
||||
31 | File | `/mnt/skyeye/mode_switch.sh` | High
|
||||
32 | File | `/mybb_1806/Upload/admin/index.php` | High
|
||||
33 | File | `/oauth/token` | Medium
|
||||
34 | File | `/plain` | Low
|
||||
35 | File | `/public/login.htm` | High
|
||||
36 | File | `/romfile.cfg` | Medium
|
||||
37 | File | `/scp/directory.php` | High
|
||||
38 | File | `/setSystemAdmin` | High
|
||||
39 | File | `/system/WCore/WHelper.php` | High
|
||||
40 | File | `/tmp/connlicj.bin` | High
|
||||
41 | File | `/uncpath/` | Medium
|
||||
42 | File | `/upload` | Low
|
||||
43 | File | `/userfs/bin/tcapi` | High
|
||||
44 | File | `/var/www/xms/application/config/config.php` | High
|
||||
45 | File | `/var/www/xms/application/controllers/gatherLogs.php` | High
|
||||
46 | File | `/var/www/xms/application/controllers/verifyLogin.php` | High
|
||||
47 | File | `/var/www/xms/cleanzip.sh` | High
|
||||
48 | File | `/vendor/phpdocumentor/reflection-docblock/tests/phpDocumentor/Reflection/DocBlock/Tag/LinkTagTeet.php` | High
|
||||
49 | File | `/websocket/exec` | High
|
||||
50 | File | `/workspaceCleanup` | High
|
||||
51 | File | `/wp-admin/admin-ajax.php?action=get_wdtable&table_id=1` | High
|
||||
52 | File | `account/gallery.php` | High
|
||||
53 | File | `add_edit_cat.asp` | High
|
||||
54 | ... | ... | ...
|
||||
|
||||
There are 462 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 467 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* http://blog.morphisec.com/new-global-attack-on-point-of-sale-systems
|
||||
* https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/
|
||||
* https://usa.visa.com/dam/VCOM/global/support-legal/documents/fin6-cybercrime-group-expands-threat-To-ecommerce-merchants.pdf
|
||||
* https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html
|
||||
|
|
|
@ -137,17 +137,17 @@ ID | Type | Indicator | Confidence
|
|||
41 | File | `admin/write-post.php` | High
|
||||
42 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
43 | File | `admin_events.php` | High
|
||||
44 | File | `AjaxApplication.java` | High
|
||||
45 | File | `akocomments.php` | High
|
||||
46 | File | `allopass-error.php` | High
|
||||
47 | File | `AllowBindAppWidgetActivity.java` | High
|
||||
48 | File | `android/webkit/SearchBoxImpl.java` | High
|
||||
49 | File | `AndroidManifest.xml` | High
|
||||
50 | File | `api/settings/values` | High
|
||||
51 | File | `app/topic/action/admin/topic.php` | High
|
||||
44 | File | `aidl_const_expressions.cpp` | High
|
||||
45 | File | `ajax/include.php` | High
|
||||
46 | File | `AjaxApplication.java` | High
|
||||
47 | File | `akocomments.php` | High
|
||||
48 | File | `allopass-error.php` | High
|
||||
49 | File | `AllowBindAppWidgetActivity.java` | High
|
||||
50 | File | `android/webkit/SearchBoxImpl.java` | High
|
||||
51 | File | `AndroidManifest.xml` | High
|
||||
52 | ... | ... | ...
|
||||
|
||||
There are 449 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 455 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -45,7 +45,7 @@ ID | Type | Indicator | Confidence
|
|||
4 | File | `/var/log/nginx` | High
|
||||
5 | ... | ... | ...
|
||||
|
||||
There are 26 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 27 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -0,0 +1,36 @@
|
|||
# FinFisher - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [FinFisher](https://vuldb.com/?actor.finfisher). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.finfisher](https://vuldb.com/?actor.finfisher)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following _campaigns_ are known and can be associated with FinFisher:
|
||||
|
||||
* Turkey March for Justice
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of FinFisher.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [178.32.214.175](https://vuldb.com/?ip.178.32.214.175) | reverse.bilgi-islem.com | Turkey March for Justice | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.accessnow.org/cms/assets/uploads/2018/05/FinFisher-changes-tactics-to-hook-critics-AN.pdf
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with FritzFrog:
|
||||
|
||||
* [VN](https://vuldb.com/?country.vn)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [VN](https://vuldb.com/?country.vn)
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 13 more country items available. Please use our online service to access the data.
|
||||
There are 10 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -327,16 +327,16 @@ There are 1200 more IOC items available. Please use our online service to access
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _FritzFrog_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _FritzFrog_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -344,54 +344,46 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `%PROGRAMDATA%\ASUS\GamingCenterLib` | High
|
||||
2 | File | `/administrator/components/menu/` | High
|
||||
3 | File | `/apply_noauth.cgi` | High
|
||||
4 | File | `/cgi-bin/login` | High
|
||||
5 | File | `/CMD_ACCOUNT_ADMIN` | High
|
||||
6 | File | `/config/getuser` | High
|
||||
7 | File | `/core/admin/categories.php` | High
|
||||
8 | File | `/debug/pprof` | Medium
|
||||
9 | File | `/dev/cpu/*/msr` | High
|
||||
10 | File | `/filemanager/php/connector.php` | High
|
||||
11 | File | `/forum/away.php` | High
|
||||
12 | File | `/front/document.form.php` | High
|
||||
13 | File | `/ghost/preview` | High
|
||||
14 | File | `/horde/util/go.php` | High
|
||||
15 | File | `/include/chart_generator.php` | High
|
||||
16 | File | `/index.php` | Medium
|
||||
17 | File | `/member/index/login.html` | High
|
||||
18 | File | `/modx/manager/index.php` | High
|
||||
19 | File | `/MTFWU` | Low
|
||||
20 | File | `/my_photo_gallery/image.php` | High
|
||||
21 | File | `/products/details.asp` | High
|
||||
22 | File | `/public/admin.php` | High
|
||||
23 | File | `/public/login.htm?errormsg=&loginurl=%22%3E%3Csvg%20onload=prompt%28/XSS/%29%3E` | High
|
||||
24 | File | `/public/plugins/` | High
|
||||
25 | File | `/rest/api/1.0/render` | High
|
||||
26 | File | `/s/` | Low
|
||||
27 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
28 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
|
||||
29 | File | `/uncpath/` | Medium
|
||||
30 | File | `/user-utils/users/md5.json` | High
|
||||
31 | File | `/usr/bin/pkexec` | High
|
||||
32 | File | `/webhooks/aws` | High
|
||||
33 | File | `/x_program_center/jaxrs/invoke` | High
|
||||
34 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
35 | File | `add.exe` | Low
|
||||
36 | File | `admin.php?m=Food&a=addsave` | High
|
||||
37 | File | `admin.remository.php` | High
|
||||
38 | File | `admin/conf_users_edit.php` | High
|
||||
39 | File | `admin/index.php` | High
|
||||
40 | File | `admin/login.asp` | High
|
||||
41 | File | `adminpanel/modules/pro/inc/ajax.php` | High
|
||||
42 | File | `admin\db\DoSql.php` | High
|
||||
43 | File | `affich.php` | Medium
|
||||
44 | File | `ajax/kanban.php` | High
|
||||
45 | File | `ajax_calls.php` | High
|
||||
46 | ... | ... | ...
|
||||
1 | File | `%PROGRAMDATA%\checkmk\agent\local` | High
|
||||
2 | File | `.htaccess` | Medium
|
||||
3 | File | `/../conf/config.properties` | High
|
||||
4 | File | `//` | Low
|
||||
5 | File | `/admin.php?action=themeinstall` | High
|
||||
6 | File | `/admin/login.php` | High
|
||||
7 | File | `/api/crontab` | Medium
|
||||
8 | File | `/apply_noauth.cgi` | High
|
||||
9 | File | `/as/authorization.oauth2` | High
|
||||
10 | File | `/audit/log/log_management.php` | High
|
||||
11 | File | `/bin/login` | Medium
|
||||
12 | File | `/cgi-bin/delete_CA` | High
|
||||
13 | File | `/cgi-bin/login` | High
|
||||
14 | File | `/classes/profile.class.php` | High
|
||||
15 | File | `/cloud_config/router_post/check_reg_verify_code` | High
|
||||
16 | File | `/config/getuser` | High
|
||||
17 | File | `/dev/tty` | Medium
|
||||
18 | File | `/export` | Low
|
||||
19 | File | `/ghost/preview` | High
|
||||
20 | File | `/index.php` | Medium
|
||||
21 | File | `/member/index/login.html` | High
|
||||
22 | File | `/products/details.asp` | High
|
||||
23 | File | `/ptms/classes/Users.php` | High
|
||||
24 | File | `/public/login.htm` | High
|
||||
25 | File | `/ScadaBR/login.htm` | High
|
||||
26 | File | `/system/tool/ping.php` | High
|
||||
27 | File | `/uncpath/` | Medium
|
||||
28 | File | `/uploads/dede` | High
|
||||
29 | File | `/usr/bin/at` | Medium
|
||||
30 | File | `/usr/bin/pkexec` | High
|
||||
31 | File | `/wp-admin/admin-ajax.php` | High
|
||||
32 | File | `/_matrix/client/r0/auth/m.login.recaptcha` | High
|
||||
33 | File | `?location=search` | High
|
||||
34 | File | `account/login.php` | High
|
||||
35 | File | `accountrecoveryendpoint/recoverpassword.do` | High
|
||||
36 | File | `acrord32.exe` | Medium
|
||||
37 | File | `admin.php` | Medium
|
||||
38 | ... | ... | ...
|
||||
|
||||
There are 399 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 329 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -0,0 +1,30 @@
|
|||
# Gh0stCringe - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Gh0stCringe](https://vuldb.com/?actor.gh0stcringe). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.gh0stcringe](https://vuldb.com/?actor.gh0stcringe)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Gh0stCringe.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [172.86.127.224](https://vuldb.com/?ip.172.86.127.224) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.malwarebytes.com/trojans/2022/03/gh0stcringe-rat-makes-database-servers-squeal-for-protection/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -60,7 +60,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -69,40 +69,40 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/+CSCOE+/logon.html` | High
|
||||
2 | File | `/.env` | Low
|
||||
3 | File | `/.ssh/authorized_keys` | High
|
||||
4 | File | `/admin.php?&m=Public&a=login` | High
|
||||
5 | File | `/ajax/networking/get_netcfg.php` | High
|
||||
6 | File | `/car.php` | Medium
|
||||
7 | File | `/CMD_ACCOUNT_ADMIN` | High
|
||||
8 | File | `/concat?/%2557EB-INF/web.xml` | High
|
||||
9 | File | `/core/admin/categories.php` | High
|
||||
10 | File | `/dashboards/#` | High
|
||||
11 | File | `/data/remove` | Medium
|
||||
12 | File | `/etc/controller-agent/agent.conf` | High
|
||||
13 | File | `/etc/sudoers` | Medium
|
||||
14 | File | `/etc/tomcat8/Catalina/attack` | High
|
||||
15 | File | `/filemanager/php/connector.php` | High
|
||||
16 | File | `/forum/away.php` | High
|
||||
17 | File | `/fudforum/adm/hlplist.php` | High
|
||||
18 | File | `/GponForm/fsetup_Form` | High
|
||||
19 | File | `/log_download.cgi` | High
|
||||
20 | File | `/modules/profile/index.php` | High
|
||||
21 | File | `/MTFWU` | Low
|
||||
22 | File | `/navigate/navigate_download.php` | High
|
||||
23 | File | `/out.php` | Medium
|
||||
24 | File | `/password.html` | High
|
||||
25 | File | `/property-list/property_view.php` | High
|
||||
26 | File | `/public/plugins/` | High
|
||||
27 | File | `/rest/api/2/search` | High
|
||||
28 | File | `/s/` | Low
|
||||
29 | File | `/scripts/cpan_config` | High
|
||||
30 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
31 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
32 | File | `/server-info` | Medium
|
||||
33 | File | `/tmp` | Low
|
||||
34 | File | `/tmp/app/.env` | High
|
||||
35 | File | `/tmp/kamailio_ctl` | High
|
||||
2 | File | `/.ssh/authorized_keys` | High
|
||||
3 | File | `/admin.php?&m=Public&a=login` | High
|
||||
4 | File | `/ajax/networking/get_netcfg.php` | High
|
||||
5 | File | `/car.php` | Medium
|
||||
6 | File | `/CMD_ACCOUNT_ADMIN` | High
|
||||
7 | File | `/concat?/%2557EB-INF/web.xml` | High
|
||||
8 | File | `/core/admin/categories.php` | High
|
||||
9 | File | `/dashboards/#` | High
|
||||
10 | File | `/data/remove` | Medium
|
||||
11 | File | `/etc/controller-agent/agent.conf` | High
|
||||
12 | File | `/etc/sudoers` | Medium
|
||||
13 | File | `/filemanager/php/connector.php` | High
|
||||
14 | File | `/forum/away.php` | High
|
||||
15 | File | `/fudforum/adm/hlplist.php` | High
|
||||
16 | File | `/GponForm/fsetup_Form` | High
|
||||
17 | File | `/log_download.cgi` | High
|
||||
18 | File | `/modules/profile/index.php` | High
|
||||
19 | File | `/MTFWU` | Low
|
||||
20 | File | `/navigate/navigate_download.php` | High
|
||||
21 | File | `/out.php` | Medium
|
||||
22 | File | `/password.html` | High
|
||||
23 | File | `/property-list/property_view.php` | High
|
||||
24 | File | `/ptms/classes/Users.php` | High
|
||||
25 | File | `/public/plugins/` | High
|
||||
26 | File | `/rest/api/2/search` | High
|
||||
27 | File | `/s/` | Low
|
||||
28 | File | `/scripts/cpan_config` | High
|
||||
29 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
30 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
31 | File | `/server-info` | Medium
|
||||
32 | File | `/tmp` | Low
|
||||
33 | File | `/tmp/kamailio_ctl` | High
|
||||
34 | File | `/tmp/kamailio_fifo` | High
|
||||
35 | File | `/ucms/index.php?do=list_edit` | High
|
||||
36 | ... | ... | ...
|
||||
|
||||
There are 307 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
|
|
@ -0,0 +1,75 @@
|
|||
# GhostEmperor - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [GhostEmperor](https://vuldb.com/?actor.ghostemperor). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.ghostemperor](https://vuldb.com/?actor.ghostemperor)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with GhostEmperor:
|
||||
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of GhostEmperor.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [27.102.113.57](https://vuldb.com/?ip.27.102.113.57) | yukonpick.net | - | High
|
||||
2 | [27.102.113.240](https://vuldb.com/?ip.27.102.113.240) | power.playtimeins.net | - | High
|
||||
3 | [27.102.114.55](https://vuldb.com/?ip.27.102.114.55) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _GhostEmperor_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by GhostEmperor. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.env` | Low
|
||||
2 | File | `/admin/index.php` | High
|
||||
3 | File | `/login.html` | Medium
|
||||
4 | File | `/new` | Low
|
||||
5 | File | `/system?action=ServiceAdmin` | High
|
||||
6 | File | `/tlogin.cgi` | Medium
|
||||
7 | File | `/userRpm/popupSiteSurveyRpm.html` | High
|
||||
8 | File | `/var/log/nginx` | High
|
||||
9 | File | `add_vhost.php` | High
|
||||
10 | ... | ... | ...
|
||||
|
||||
There are 79 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://securelist.com/ghostemperor-from-proxylogon-to-kernel-mode/104407/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -0,0 +1,60 @@
|
|||
# GoldBrute - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [GoldBrute](https://vuldb.com/?actor.goldbrute). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.goldbrute](https://vuldb.com/?actor.goldbrute)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with GoldBrute:
|
||||
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of GoldBrute.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [104.156.249.231](https://vuldb.com/?ip.104.156.249.231) | 104.156.249.231.vultrusercontent.com | - | High
|
||||
2 | [104.248.167.144](https://vuldb.com/?ip.104.248.167.144) | - | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _GoldBrute_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by GoldBrute. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/cgi-bin/login_action.cgi` | High
|
||||
2 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
3 | File | `cgi-bin/mft/wireless_mft.cgi` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 11 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://morphuslabs.com/goldbrute-botnet-brute-forcing-1-5-million-rdp-servers-371f219ec37d
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -49,44 +49,44 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/?module=users§ion=cpanel&page=list` | High
|
||||
2 | File | `/admin/powerline` | High
|
||||
3 | File | `/admin/syslog` | High
|
||||
4 | File | `/api/upload` | Medium
|
||||
5 | File | `/cgi-bin` | Medium
|
||||
6 | File | `/cgi-bin/kerbynet` | High
|
||||
7 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
8 | File | `/fudforum/adm/hlplist.php` | High
|
||||
9 | File | `/login` | Low
|
||||
10 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
11 | File | `/monitoring` | Medium
|
||||
12 | File | `/new` | Low
|
||||
13 | File | `/proc/<pid>/status` | High
|
||||
14 | File | `/public/plugins/` | High
|
||||
15 | File | `/REBOOTSYSTEM` | High
|
||||
16 | File | `/rom` | Low
|
||||
17 | File | `/scripts/killpvhost` | High
|
||||
18 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
19 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
20 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
21 | File | `/tmp` | Low
|
||||
22 | File | `/tmp/redis.ds` | High
|
||||
23 | File | `/uncpath/` | Medium
|
||||
24 | File | `/wp-admin` | Medium
|
||||
25 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
26 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
27 | File | `AccountManagerService.java` | High
|
||||
28 | File | `actions/CompanyDetailsSave.php` | High
|
||||
29 | File | `ActiveServices.java` | High
|
||||
30 | File | `ActivityManagerService.java` | High
|
||||
31 | File | `admin.php` | Medium
|
||||
32 | File | `admin/?n=user&c=admin_user&a=doGetUserInfo` | High
|
||||
33 | File | `admin/add-glossary.php` | High
|
||||
34 | File | `admin/conf_users_edit.php` | High
|
||||
35 | File | `admin/edit-comments.php` | High
|
||||
1 | File | `//` | Low
|
||||
2 | File | `/?module=users§ion=cpanel&page=list` | High
|
||||
3 | File | `/admin/powerline` | High
|
||||
4 | File | `/admin/syslog` | High
|
||||
5 | File | `/api/upload` | Medium
|
||||
6 | File | `/cgi-bin` | Medium
|
||||
7 | File | `/cgi-bin/kerbynet` | High
|
||||
8 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
9 | File | `/fudforum/adm/hlplist.php` | High
|
||||
10 | File | `/login` | Low
|
||||
11 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
12 | File | `/monitoring` | Medium
|
||||
13 | File | `/new` | Low
|
||||
14 | File | `/proc/<pid>/status` | High
|
||||
15 | File | `/public/plugins/` | High
|
||||
16 | File | `/REBOOTSYSTEM` | High
|
||||
17 | File | `/rom` | Low
|
||||
18 | File | `/scripts/killpvhost` | High
|
||||
19 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
20 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
21 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
22 | File | `/tmp` | Low
|
||||
23 | File | `/tmp/redis.ds` | High
|
||||
24 | File | `/uncpath/` | Medium
|
||||
25 | File | `/wp-admin` | Medium
|
||||
26 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
27 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
28 | File | `AccountManagerService.java` | High
|
||||
29 | File | `actions/CompanyDetailsSave.php` | High
|
||||
30 | File | `ActiveServices.java` | High
|
||||
31 | File | `ActivityManagerService.java` | High
|
||||
32 | File | `admin.php` | Medium
|
||||
33 | File | `admin/?n=user&c=admin_user&a=doGetUserInfo` | High
|
||||
34 | File | `admin/add-glossary.php` | High
|
||||
35 | File | `admin/conf_users_edit.php` | High
|
||||
36 | ... | ... | ...
|
||||
|
||||
There are 306 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 312 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* ...
|
||||
|
||||
There are 17 more country items available. Please use our online service to access the data.
|
||||
There are 18 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -169,38 +169,40 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.env` | Low
|
||||
2 | File | `/admin-panel1.php` | High
|
||||
3 | File | `/admin/configure.php` | High
|
||||
4 | File | `/admin/doctors/view_doctor.php` | High
|
||||
5 | File | `/admin/index.php?lfj=mysql&action=del` | High
|
||||
6 | File | `/cgi-bin/luci/rc` | High
|
||||
7 | File | `/cms/ajax.php` | High
|
||||
8 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
9 | File | `/dev/dri/card1` | High
|
||||
10 | File | `/domain/service/.ewell-known/caldav` | High
|
||||
11 | File | `/download` | Medium
|
||||
12 | File | `/file?action=download&file` | High
|
||||
13 | File | `/formWlanSetup` | High
|
||||
2 | File | `//` | Low
|
||||
3 | File | `/admin-panel1.php` | High
|
||||
4 | File | `/admin.php/admin/ulog/index.html` | High
|
||||
5 | File | `/admin/configure.php` | High
|
||||
6 | File | `/admin/doctors/view_doctor.php` | High
|
||||
7 | File | `/admin/index.php?lfj=mysql&action=del` | High
|
||||
8 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
9 | File | `/cms/ajax.php` | High
|
||||
10 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
11 | File | `/dev/dri/card1` | High
|
||||
12 | File | `/download` | Medium
|
||||
13 | File | `/file?action=download&file` | High
|
||||
14 | File | `/goform/setIPv6Status` | High
|
||||
15 | File | `/images` | Low
|
||||
16 | File | `/include/chart_generator.php` | High
|
||||
17 | File | `/InternalPages/ExecuteTask.aspx` | High
|
||||
18 | File | `/modules/profile/index.php` | High
|
||||
19 | File | `/music/ajax.php` | High
|
||||
20 | File | `/pandora_console/ajax.php` | High
|
||||
21 | File | `/plugins/servlet/audit/resource` | High
|
||||
22 | File | `/plugins/servlet/project-config/PROJECT/roles` | High
|
||||
23 | File | `/proc/<pid>/status` | High
|
||||
24 | File | `/public/plugins/` | High
|
||||
25 | File | `/rest/api/1.0/render` | High
|
||||
26 | File | `/RestAPI` | Medium
|
||||
27 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
28 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
29 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
30 | File | `/tmp` | Low
|
||||
31 | ... | ... | ...
|
||||
18 | File | `/music/ajax.php` | High
|
||||
19 | File | `/pandora_console/ajax.php` | High
|
||||
20 | File | `/principals` | Medium
|
||||
21 | File | `/public/plugins/` | High
|
||||
22 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
23 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
24 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
25 | File | `/system/bin/osi_bin` | High
|
||||
26 | File | `/tmp` | Low
|
||||
27 | File | `/TMS/admin/setting/mail/createorupdate` | High
|
||||
28 | File | `/uncpath/` | Medium
|
||||
29 | File | `/var/log/nginx` | High
|
||||
30 | File | `/web/MCmsAction.java` | High
|
||||
31 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
32 | File | `account.php` | Medium
|
||||
33 | ... | ... | ...
|
||||
|
||||
There are 267 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 285 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -0,0 +1,104 @@
|
|||
# Hancitor - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Hancitor](https://vuldb.com/?actor.hancitor). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.hancitor](https://vuldb.com/?actor.hancitor)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Hancitor:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* ...
|
||||
|
||||
There are 8 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Hancitor.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [8.209.119.208](https://vuldb.com/?ip.8.209.119.208) | - | - | High
|
||||
2 | [8.211.241.0](https://vuldb.com/?ip.8.211.241.0) | - | - | High
|
||||
3 | [23.236.75.32](https://vuldb.com/?ip.23.236.75.32) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 14 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Hancitor_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Hancitor. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `.htpasswd` | Medium
|
||||
2 | File | `/../conf/config.properties` | High
|
||||
3 | File | `/drivers/infiniband/core/cm.c` | High
|
||||
4 | File | `/forum/away.php` | High
|
||||
5 | File | `/horde/util/go.php` | High
|
||||
6 | File | `/images/` | Medium
|
||||
7 | File | `/inc/parser/xhtml.php` | High
|
||||
8 | File | `/login` | Low
|
||||
9 | File | `/mgmt/shared/authz/users/` | High
|
||||
10 | File | `/modules/profile/index.php` | High
|
||||
11 | File | `/objects/getImageMP4.php` | High
|
||||
12 | File | `/one_church/userregister.php` | High
|
||||
13 | File | `/out.php` | Medium
|
||||
14 | File | `/public/plugins/` | High
|
||||
15 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
16 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
17 | File | `/secure/admin/ViewInstrumentation.jspa` | High
|
||||
18 | File | `/SSOPOST/metaAlias/%realm%/idpv2` | High
|
||||
19 | File | `/system/proxy` | High
|
||||
20 | File | `/tmp/phpglibccheck` | High
|
||||
21 | File | `/uncpath/` | Medium
|
||||
22 | File | `adclick.php` | Medium
|
||||
23 | File | `add.php` | Low
|
||||
24 | File | `addentry.php` | Medium
|
||||
25 | File | `addressbookprovider.php` | High
|
||||
26 | File | `admin.jcomments.php` | High
|
||||
27 | File | `admin.php` | Medium
|
||||
28 | File | `admin/pageUploadCSV.php` | High
|
||||
29 | File | `ajax_udf.php` | Medium
|
||||
30 | File | `AppCompatCache.exe` | High
|
||||
31 | File | `application.js.php` | High
|
||||
32 | File | `arm/lithium-codegen-arm.cc` | High
|
||||
33 | File | `authenticate.c` | High
|
||||
34 | ... | ... | ...
|
||||
|
||||
There are 288 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://isc.sans.edu/forums/diary/Hancitor+activity+resumes+after+a+hoilday+break/26980/
|
||||
* https://isc.sans.edu/forums/diary/Hancitor+tries+XLL+as+initial+malware+file/27618/
|
||||
* https://isc.sans.edu/forums/diary/June+2021+Forensic+Contest+Answers+and+Analysis/27582/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -0,0 +1,54 @@
|
|||
# HiddenWasp - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [HiddenWasp](https://vuldb.com/?actor.hiddenwasp). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.hiddenwasp](https://vuldb.com/?actor.hiddenwasp)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with HiddenWasp:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of HiddenWasp.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [103.206.122.245](https://vuldb.com/?ip.103.206.122.245) | thinkdream.com | - | High
|
||||
2 | [103.206.123.13](https://vuldb.com/?ip.103.206.123.13) | thinkdream.com | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _HiddenWasp_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by HiddenWasp. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `data/gbconfiguration.dat` | High
|
||||
2 | File | `index.html` | Medium
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.intezer.com/blog/malware-analysis/hiddenwasp-malware-targeting-linux-systems/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,6 +1,6 @@
|
|||
# IcedID - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [IcedID](https://vuldb.com/?actor.icedid). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [IcedID](https://vuldb.com/?actor.icedid). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.icedid](https://vuldb.com/?actor.icedid)
|
||||
|
||||
|
@ -8,12 +8,12 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with IcedID:
|
||||
|
||||
* US
|
||||
* SC
|
||||
* PW
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [SC](https://vuldb.com/?country.sc)
|
||||
* [PW](https://vuldb.com/?country.pw)
|
||||
* ...
|
||||
|
||||
There are 12 more country items available. Please use our online service to access the data.
|
||||
There are 16 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -21,23 +21,24 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 5.149.252.179 | hnh7.arenal.xyz | - | High
|
||||
2 | 31.24.228.170 | 31.24.228.170.static.midphase.com | - | High
|
||||
3 | 31.184.199.11 | dalesmanager.com | - | High
|
||||
4 | 45.129.99.241 | 354851-vds-mamozw.gmhost.pp.ua | - | High
|
||||
5 | 45.138.172.179 | - | - | High
|
||||
6 | 45.147.228.198 | - | - | High
|
||||
7 | 45.147.230.82 | - | - | High
|
||||
8 | 45.147.230.88 | mailnode7.bulletproof-mail.biz | - | High
|
||||
9 | 45.147.231.113 | - | - | High
|
||||
10 | 45.153.240.135 | - | - | High
|
||||
11 | ... | ... | ... | ...
|
||||
1 | [5.149.252.179](https://vuldb.com/?ip.5.149.252.179) | hnh7.arenal.xyz | - | High
|
||||
2 | [31.24.228.170](https://vuldb.com/?ip.31.24.228.170) | 31.24.228.170.static.midphase.com | - | High
|
||||
3 | [31.184.199.11](https://vuldb.com/?ip.31.184.199.11) | dalesmanager.com | - | High
|
||||
4 | [45.129.99.241](https://vuldb.com/?ip.45.129.99.241) | 354851-vds-mamozw.gmhost.pp.ua | - | High
|
||||
5 | [45.138.172.179](https://vuldb.com/?ip.45.138.172.179) | - | - | High
|
||||
6 | [45.147.228.198](https://vuldb.com/?ip.45.147.228.198) | - | - | High
|
||||
7 | [45.147.230.82](https://vuldb.com/?ip.45.147.230.82) | - | - | High
|
||||
8 | [45.147.230.88](https://vuldb.com/?ip.45.147.230.88) | mailnode7.bulletproof-mail.biz | - | High
|
||||
9 | [45.147.231.113](https://vuldb.com/?ip.45.147.231.113) | - | - | High
|
||||
10 | [45.153.240.135](https://vuldb.com/?ip.45.153.240.135) | - | - | High
|
||||
11 | [45.153.241.115](https://vuldb.com/?ip.45.153.241.115) | - | - | High
|
||||
12 | ... | ... | ... | ...
|
||||
|
||||
There are 42 more IOC items available. Please use our online service to access the data.
|
||||
There are 46 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by IcedID. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _IcedID_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -55,31 +56,35 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.vnc/sesman_${username}_passwd` | High
|
||||
2 | File | `/anony/mjpg.cgi` | High
|
||||
3 | File | `/cgi-bin` | Medium
|
||||
4 | File | `/cgi-bin/editBookmark` | High
|
||||
5 | File | `/EXCU_SHELL` | Medium
|
||||
6 | File | `/export` | Low
|
||||
7 | File | `/GetSimpleCMS-3.3.15/admin/log.php` | High
|
||||
8 | File | `/goform/addressNat` | High
|
||||
9 | File | `/include/menu_v.inc.php` | High
|
||||
10 | File | `/lms/admin.php` | High
|
||||
11 | File | `/mc` | Low
|
||||
12 | File | `/opt/IBM/es/lib/libffq.cryptionjni.so` | High
|
||||
13 | File | `/out.php` | Medium
|
||||
14 | File | `/proc/pid/syscall` | High
|
||||
15 | File | `/uncpath/` | Medium
|
||||
16 | File | `/var/log/pcp/configs.sh` | High
|
||||
17 | File | `/webconsole/APIController` | High
|
||||
18 | File | `admin/adminsignin.html` | High
|
||||
19 | ... | ... | ...
|
||||
2 | File | `/admin/index.php` | High
|
||||
3 | File | `/anony/mjpg.cgi` | High
|
||||
4 | File | `/cgi-bin` | Medium
|
||||
5 | File | `/cgi-bin/editBookmark` | High
|
||||
6 | File | `/etc/shadow` | Medium
|
||||
7 | File | `/EXCU_SHELL` | Medium
|
||||
8 | File | `/export` | Low
|
||||
9 | File | `/GetSimpleCMS-3.3.15/admin/log.php` | High
|
||||
10 | File | `/goform/addressNat` | High
|
||||
11 | File | `/include/menu_v.inc.php` | High
|
||||
12 | File | `/lms/admin.php` | High
|
||||
13 | File | `/mc` | Low
|
||||
14 | File | `/opt/IBM/es/lib/libffq.cryptionjni.so` | High
|
||||
15 | File | `/out.php` | Medium
|
||||
16 | File | `/proc/pid/syscall` | High
|
||||
17 | File | `/uncpath/` | Medium
|
||||
18 | File | `/var/log/pcp/configs.sh` | High
|
||||
19 | File | `/webconsole/APIController` | High
|
||||
20 | File | `add_comment.php` | High
|
||||
21 | File | `admin.jcomments.php` | High
|
||||
22 | ... | ... | ...
|
||||
|
||||
There are 155 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 180 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://isc.sans.edu/forums/diary/Analysis+from+March+2021+Traffic+Analysis+Quiz/27232/
|
||||
* https://research.checkpoint.com/2021/melting-ice-tracking-icedid-servers-with-a-few-simple-steps/
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -19,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [PL](https://vuldb.com/?country.pl)
|
||||
* ...
|
||||
|
||||
There are 4 more country items available. Please use our online service to access the data.
|
||||
There are 5 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -55,29 +55,31 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `/admin/news/news_mod.php` | High
|
||||
2 | File | `/admin/page_edit/3` | High
|
||||
3 | File | `/api/notify.php` | High
|
||||
3 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
4 | File | `/domain/service/.ewell-known/caldav` | High
|
||||
5 | File | `/formAdvFirewall` | High
|
||||
6 | File | `/mobile/SelectUsers.jsp` | High
|
||||
7 | File | `/ProteinArraySignificanceTest.json` | High
|
||||
8 | File | `/system/bin/osi_bin` | High
|
||||
9 | File | `/usr/local/bin/mjs` | High
|
||||
10 | File | `/web` | Low
|
||||
11 | File | `admin/bad.php` | High
|
||||
12 | File | `admin/dl_sendmail.php` | High
|
||||
13 | File | `admin/pages/useredit.php` | High
|
||||
14 | File | `AdminBaseController.class.php` | High
|
||||
15 | File | `AlertReceiver.java` | High
|
||||
16 | File | `alfresco/s/admin/admin-nodebrowser` | High
|
||||
17 | File | `AndroidFuture.java` | High
|
||||
18 | File | `AndroidManifest.xml` | High
|
||||
19 | File | `api/info.php` | Medium
|
||||
20 | File | `attach.c` | Medium
|
||||
21 | File | `box_code_apple.c` | High
|
||||
22 | File | `bug_actiongroup.php` | High
|
||||
23 | ... | ... | ...
|
||||
6 | File | `/jquery_file_upload/server/php/index.php` | High
|
||||
7 | File | `/mobile/SelectUsers.jsp` | High
|
||||
8 | File | `/ProteinArraySignificanceTest.json` | High
|
||||
9 | File | `/ptms/classes/Users.php` | High
|
||||
10 | File | `/system/bin/osi_bin` | High
|
||||
11 | File | `/usr/local/bin/mjs` | High
|
||||
12 | File | `admin/bad.php` | High
|
||||
13 | File | `admin/dl_sendmail.php` | High
|
||||
14 | File | `admin/pages/useredit.php` | High
|
||||
15 | File | `AdminBaseController.class.php` | High
|
||||
16 | File | `AlertReceiver.java` | High
|
||||
17 | File | `alfresco/s/admin/admin-nodebrowser` | High
|
||||
18 | File | `anchor/routes/posts.php` | High
|
||||
19 | File | `AndroidFuture.java` | High
|
||||
20 | File | `AndroidManifest.xml` | High
|
||||
21 | File | `api/info.php` | Medium
|
||||
22 | File | `app/admin/subnets/find_free_section_subnets.php` | High
|
||||
23 | File | `attach.c` | Medium
|
||||
24 | File | `blocking.cgi` | Medium
|
||||
25 | ... | ... | ...
|
||||
|
||||
There are 194 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 205 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -10,10 +10,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [VN](https://vuldb.com/?country.vn)
|
||||
* [NZ](https://vuldb.com/?country.nz)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [HK](https://vuldb.com/?country.hk)
|
||||
* ...
|
||||
|
||||
There are 3 more country items available. Please use our online service to access the data.
|
||||
There are 4 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -292,7 +292,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -300,17 +300,23 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.htaccess` | Medium
|
||||
2 | File | `/admin/link/link_ok.php` | High
|
||||
3 | File | `/admin/upload/upload` | High
|
||||
4 | File | `/api/appInternals/1.0/agent/configuration` | High
|
||||
5 | File | `/api/appInternals/1.0/agent/da/pcf` | High
|
||||
6 | File | `/api/appInternals/1.0/agent/diagnostic/logs` | High
|
||||
7 | File | `/api/appInternals/1.0/plugin/pmx` | High
|
||||
8 | File | `/api/eventinstance` | High
|
||||
9 | ... | ... | ...
|
||||
1 | File | `.htaccess` | Medium
|
||||
2 | File | `/admin/contenttemp` | High
|
||||
3 | File | `/api/crontab` | Medium
|
||||
4 | File | `/api/fetch` | Medium
|
||||
5 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
6 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
7 | File | `/controller/Index.php` | High
|
||||
8 | File | `/core/conditions/AbstractWrapper.java` | High
|
||||
9 | File | `/DataHandler/HandlerEnergyType.ashx` | High
|
||||
10 | File | `/factor/avx-ecm/vecarith52.c` | High
|
||||
11 | File | `/goform/exeCommand` | High
|
||||
12 | File | `/goform/SetLanInfo` | High
|
||||
13 | File | `/goform/setWorkmode` | High
|
||||
14 | File | `/mims/app/addcustomerHandler.php` | High
|
||||
15 | ... | ... | ...
|
||||
|
||||
There are 61 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 122 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -4,6 +4,12 @@ These _indicators_ were reported, collected, and generated during the [VulDB CTI
|
|||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.invisimole](https://vuldb.com/?actor.invisimole)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following _campaigns_ are known and can be associated with InvisiMole:
|
||||
|
||||
* Ukraine
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with InvisiMole:
|
||||
|
@ -13,7 +19,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [ES](https://vuldb.com/?country.es)
|
||||
* ...
|
||||
|
||||
There are 18 more country items available. Please use our online service to access the data.
|
||||
There are 19 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -21,16 +27,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [46.165.230.241](https://vuldb.com/?ip.46.165.230.241) | - | - | High
|
||||
2 | [46.165.231.85](https://vuldb.com/?ip.46.165.231.85) | - | - | High
|
||||
3 | [46.165.241.129](https://vuldb.com/?ip.46.165.241.129) | - | - | High
|
||||
1 | [45.95.11.34](https://vuldb.com/?ip.45.95.11.34) | vds2103.zevshost.net | Ukraine | High
|
||||
2 | [46.165.230.241](https://vuldb.com/?ip.46.165.230.241) | - | - | High
|
||||
3 | [46.165.231.85](https://vuldb.com/?ip.46.165.231.85) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more IOC items available. Please use our online service to access the data.
|
||||
There are 10 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by InvisiMole. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _InvisiMole_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -39,7 +45,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1068 | CWE-264, CWE-266, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 9 more TTP items available. Please use our online service to access the data.
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -79,37 +85,40 @@ ID | Type | Indicator | Confidence
|
|||
30 | File | `/uncpath/` | Medium
|
||||
31 | File | `/userRpm/MediaServerFoldersCfgRpm.htm` | High
|
||||
32 | File | `/usr/local/ssl/openssl.cnf` | High
|
||||
33 | File | `/var/log/nginx` | High
|
||||
34 | File | `/wp-admin` | Medium
|
||||
35 | File | `/xampp/guestbook-en.pl` | High
|
||||
36 | File | `abook_database.php` | High
|
||||
37 | File | `AccountStatus.jsp` | High
|
||||
38 | File | `action/usermanager.htm` | High
|
||||
39 | File | `add.php` | Low
|
||||
40 | File | `add_comment.php` | High
|
||||
41 | File | `admin.cgi?action=config_restore` | High
|
||||
42 | File | `admin.php3` | Medium
|
||||
43 | File | `admin/add-news.php` | High
|
||||
44 | File | `admin/ajax/op_kandidat.php` | High
|
||||
45 | File | `admin/gv_mail.php` | High
|
||||
46 | File | `admin/manage-articles.php` | High
|
||||
47 | File | `admin/manage-departments.php` | High
|
||||
48 | File | `admin/systemOutOfBand.do` | High
|
||||
49 | File | `ajax.php` | Medium
|
||||
50 | File | `and/or` | Low
|
||||
51 | File | `Annot.cc` | Medium
|
||||
52 | File | `aoutx.h` | Low
|
||||
53 | File | `app/application.cpp` | High
|
||||
54 | File | `apply.cgi` | Medium
|
||||
55 | ... | ... | ...
|
||||
33 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
|
||||
34 | File | `/var/log/nginx` | High
|
||||
35 | File | `/wp-admin` | Medium
|
||||
36 | File | `/xampp/guestbook-en.pl` | High
|
||||
37 | File | `abook_database.php` | High
|
||||
38 | File | `AccountStatus.jsp` | High
|
||||
39 | File | `action/usermanager.htm` | High
|
||||
40 | File | `add.php` | Low
|
||||
41 | File | `add_comment.php` | High
|
||||
42 | File | `admin.cgi?action=config_restore` | High
|
||||
43 | File | `admin.php3` | Medium
|
||||
44 | File | `admin/add-news.php` | High
|
||||
45 | File | `admin/ajax/op_kandidat.php` | High
|
||||
46 | File | `admin/gv_mail.php` | High
|
||||
47 | File | `admin/manage-articles.php` | High
|
||||
48 | File | `admin/manage-departments.php` | High
|
||||
49 | File | `admin/systemOutOfBand.do` | High
|
||||
50 | File | `ajax.php` | Medium
|
||||
51 | File | `and/or` | Low
|
||||
52 | File | `Annot.cc` | Medium
|
||||
53 | File | `aoutx.h` | Low
|
||||
54 | File | `app/application.cpp` | High
|
||||
55 | File | `apply.cgi` | Medium
|
||||
56 | ... | ... | ...
|
||||
|
||||
There are 483 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 484 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://cert.gov.ua/article/37829
|
||||
* https://github.com/eset/malware-ioc/tree/master/invisimole
|
||||
* https://github.com/eset/malware-ioc/tree/master/quarterly_reports/2020_Q4
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
|
@ -1,46 +1,46 @@
|
|||
# Iron - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Iron](https://vuldb.com/?actor.iron). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Iron](https://vuldb.com/?actor.iron). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.iron](https://vuldb.com/?actor.iron)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.iron](https://vuldb.com/?actor.iron)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with Iron:
|
||||
The following _campaigns_ are known and can be associated with Iron:
|
||||
|
||||
* XBash
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Iron:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Iron:
|
||||
|
||||
* ES
|
||||
* [ES](https://vuldb.com/?country.es)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Iron.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Iron.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 142.44.215.177 | ns554604.ip-142-44-215.net | High
|
||||
2 | 144.217.61.147 | ip147.ip-144-217-61.net | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [142.44.215.177](https://vuldb.com/?ip.142.44.215.177) | ns554604.ip-142-44-215.net | XBash | High
|
||||
2 | [144.217.61.147](https://vuldb.com/?ip.144.217.61.147) | ip147.ip-144-217-61.net | XBash | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Iron. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Iron_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1008 | Algorithm Downgrade | High
|
||||
2 | T1040 | Authentication Bypass by Capture-replay | High
|
||||
3 | T1059.007 | Cross Site Scripting | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1008 | CWE-757 | Algorithm Downgrade | High
|
||||
2 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
3 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 11 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Iron. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Iron. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -53,42 +53,42 @@ ID | Type | Indicator | Confidence
|
|||
7 | File | `/cgi-bin/cgiServer.exx` | High
|
||||
8 | File | `/cgi?1&5` | Medium
|
||||
9 | File | `/clients/editclient.php` | High
|
||||
10 | File | `/device/device=140/tab=wifi/view` | High
|
||||
11 | File | `/dl/dl_sendmail.php` | High
|
||||
12 | File | `/downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language` | High
|
||||
13 | File | `/formStaticDHCP` | High
|
||||
14 | File | `/formVirtualApp` | High
|
||||
15 | File | `/formVirtualServ` | High
|
||||
16 | File | `/jsonrpc` | Medium
|
||||
17 | File | `/magnoliaAuthor/.magnolia/` | High
|
||||
18 | File | `/master/core/PostHandler.php` | High
|
||||
19 | File | `/medianet/sgcontentset.aspx` | High
|
||||
20 | File | `/Nodes-Traffic.php` | High
|
||||
21 | File | `/proc` | Low
|
||||
22 | File | `/proc/pid/syscall` | High
|
||||
23 | File | `/restapi/v1/certificates/FFM-SSLInspect` | High
|
||||
24 | File | `/rss.xml` | Medium
|
||||
25 | File | `/send_join` | Medium
|
||||
26 | File | `/settings/profile` | High
|
||||
27 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/charger_ic/oppo_mp2650.c` | High
|
||||
28 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_charger.c` | High
|
||||
29 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_vooc.c` | High
|
||||
30 | File | `/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c` | High
|
||||
31 | File | `/sysworkflow/en/neoclassic/reportTables/reportTables_Ajax` | High
|
||||
32 | File | `/tools/network-trace` | High
|
||||
10 | File | `/dl/dl_sendmail.php` | High
|
||||
11 | File | `/downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language` | High
|
||||
12 | File | `/formStaticDHCP` | High
|
||||
13 | File | `/formVirtualApp` | High
|
||||
14 | File | `/formVirtualServ` | High
|
||||
15 | File | `/jsonrpc` | Medium
|
||||
16 | File | `/magnoliaAuthor/.magnolia/` | High
|
||||
17 | File | `/master/core/PostHandler.php` | High
|
||||
18 | File | `/medianet/sgcontentset.aspx` | High
|
||||
19 | File | `/Nodes-Traffic.php` | High
|
||||
20 | File | `/proc` | Low
|
||||
21 | File | `/proc/pid/syscall` | High
|
||||
22 | File | `/restapi/v1/certificates/FFM-SSLInspect` | High
|
||||
23 | File | `/rss.xml` | Medium
|
||||
24 | File | `/send_join` | Medium
|
||||
25 | File | `/settings/profile` | High
|
||||
26 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/charger_ic/oppo_mp2650.c` | High
|
||||
27 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_charger.c` | High
|
||||
28 | File | `/SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_vooc.c` | High
|
||||
29 | File | `/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c` | High
|
||||
30 | File | `/sysworkflow/en/neoclassic/reportTables/reportTables_Ajax` | High
|
||||
31 | File | `/tools/network-trace` | High
|
||||
32 | File | `/user/release.html` | High
|
||||
33 | ... | ... | ...
|
||||
|
||||
There are 277 more IOA items available. Please use our online service to access the data.
|
||||
There are 283 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,32 +1,32 @@
|
|||
# KRBanker - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [KRBanker](https://vuldb.com/?actor.krbanker). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [KRBanker](https://vuldb.com/?actor.krbanker). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.krbanker](https://vuldb.com/?actor.krbanker)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.krbanker](https://vuldb.com/?actor.krbanker)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with KRBanker:
|
||||
The following _campaigns_ are known and can be associated with KRBanker:
|
||||
|
||||
* KaiXin/NEWSPOT
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of KRBanker.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of KRBanker.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 23.107.204.38 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [23.107.204.38](https://vuldb.com/?ip.23.107.204.38) | - | KaiXin/NEWSPOT | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/unit42-krbanker-targets-south-korea-through-adware-and-exploit-kits-2/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,27 +1,27 @@
|
|||
# KasperAgent - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [KasperAgent](https://vuldb.com/?actor.kasperagent). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [KasperAgent](https://vuldb.com/?actor.kasperagent). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.kasperagent](https://vuldb.com/?actor.kasperagent)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.kasperagent](https://vuldb.com/?actor.kasperagent)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with KasperAgent:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with KasperAgent:
|
||||
|
||||
* DE
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of KasperAgent.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of KasperAgent.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 148.251.135.117 | server.pogled.ba | High
|
||||
2 | 195.154.110.237 | 195-154-110-237.rev.poneytelecom.eu | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [148.251.135.117](https://vuldb.com/?ip.148.251.135.117) | server.pogled.ba | - | High
|
||||
2 | [195.154.110.237](https://vuldb.com/?ip.195.154.110.237) | 195-154-110-237.rev.poneytelecom.eu | - | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by KasperAgent. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by KasperAgent. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -30,14 +30,14 @@ ID | Type | Indicator | Confidence
|
|||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/unit42-badpatch/
|
||||
* https://www.threatminer.org/report.php?q=KASPERAGENTMalwareCampaignresurfacesinMayElection-ThreatConnect.pdf&y=2017
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -9,6 +9,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
The following _campaigns_ are known and can be associated with Kimsuky:
|
||||
|
||||
* AppleSeed
|
||||
* PebbleDash
|
||||
|
||||
## Countries
|
||||
|
||||
|
@ -16,10 +17,10 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [JP](https://vuldb.com/?country.jp)
|
||||
* [MN](https://vuldb.com/?country.mn)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
There are 4 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -27,12 +28,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [27.102.107.63](https://vuldb.com/?ip.27.102.107.63) | - | AppleSeed | High
|
||||
2 | [27.102.114.89](https://vuldb.com/?ip.27.102.114.89) | - | AppleSeed | High
|
||||
3 | [45.13.135.103](https://vuldb.com/?ip.45.13.135.103) | - | AppleSeed | High
|
||||
4 | ... | ... | ... | ...
|
||||
1 | [23.106.122.239](https://vuldb.com/?ip.23.106.122.239) | - | - | High
|
||||
2 | [27.102.102.70](https://vuldb.com/?ip.27.102.102.70) | - | - | High
|
||||
3 | [27.102.107.63](https://vuldb.com/?ip.27.102.107.63) | - | AppleSeed | High
|
||||
4 | [27.102.112.44](https://vuldb.com/?ip.27.102.112.44) | - | - | High
|
||||
5 | [27.102.112.58](https://vuldb.com/?ip.27.102.112.58) | - | - | High
|
||||
6 | [27.102.114.63](https://vuldb.com/?ip.27.102.114.63) | - | - | High
|
||||
7 | [27.102.114.79](https://vuldb.com/?ip.27.102.114.79) | - | - | High
|
||||
8 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more IOC items available. Please use our online service to access the data.
|
||||
There are 28 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -45,7 +50,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -55,26 +60,40 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.env` | Low
|
||||
2 | File | `/?/admin/snippet/add` | High
|
||||
3 | File | `/bin/false` | Medium
|
||||
4 | File | `/cgi-bin/webproc` | High
|
||||
5 | File | `/expert_wizard.php` | High
|
||||
6 | File | `/images/browserslide.jpg` | High
|
||||
7 | File | `/includes/lib/get.php` | High
|
||||
8 | File | `/main?cmd=invalid_browser` | High
|
||||
9 | File | `/manager?action=getlogcat` | High
|
||||
10 | File | `/mc` | Low
|
||||
11 | File | `/rest/jpo/1.0/hierarchyConfiguration` | High
|
||||
12 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
13 | ... | ... | ...
|
||||
3 | File | `/assets/something/services/AppModule.class` | High
|
||||
4 | File | `/bin/false` | Medium
|
||||
5 | File | `/cgi-bin/webproc` | High
|
||||
6 | File | `/editsettings` | High
|
||||
7 | File | `/expert_wizard.php` | High
|
||||
8 | File | `/forum/away.php` | High
|
||||
9 | File | `/images/browserslide.jpg` | High
|
||||
10 | File | `/includes/lib/get.php` | High
|
||||
11 | File | `/login` | Low
|
||||
12 | File | `/main?cmd=invalid_browser` | High
|
||||
13 | File | `/manager?action=getlogcat` | High
|
||||
14 | File | `/mc` | Low
|
||||
15 | File | `/plugins/Dashboard/Controller.php` | High
|
||||
16 | File | `/public/plugins/` | High
|
||||
17 | File | `/rest/jpo/1.0/hierarchyConfiguration` | High
|
||||
18 | File | `/SASWebReportStudio/logonAndRender.do` | High
|
||||
19 | File | `/tlogin.cgi` | Medium
|
||||
20 | File | `/tmp/scfgdndf` | High
|
||||
21 | File | `/uncpath/` | Medium
|
||||
22 | File | `/upload` | Low
|
||||
23 | File | `/usr/ucb/mail` | High
|
||||
24 | ... | ... | ...
|
||||
|
||||
There are 99 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 201 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://asec.ahnlab.com/en/30532/
|
||||
* https://blog.alyac.co.kr/2234
|
||||
* https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/
|
||||
* https://twitter.com/shadowchasing1/status/1500778382966939653
|
||||
* https://twitter.com/souiten/status/1473862308132651011
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
|
@ -43,7 +43,7 @@ There are 42 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _Kinsing_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Kinsing_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -93,11 +93,12 @@ ID | Type | Indicator | Confidence
|
|||
31 | File | `application/modules/admin/views/ecommerce/products.php` | High
|
||||
32 | File | `ArchiveNews.aspx` | High
|
||||
33 | File | `ashnews.php/ashheadlines.php` | High
|
||||
34 | File | `blog.php` | Medium
|
||||
35 | File | `board.php` | Medium
|
||||
36 | ... | ... | ...
|
||||
34 | File | `base/ErrorHandler.php` | High
|
||||
35 | File | `blog.php` | Medium
|
||||
36 | File | `board.php` | Medium
|
||||
37 | ... | ... | ...
|
||||
|
||||
There are 310 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 314 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -20,11 +20,11 @@ There are 5 more campaign items available. Please use our online service to acce
|
|||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Lazarus:
|
||||
|
||||
* [VN](https://vuldb.com/?country.vn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [IN](https://vuldb.com/?country.in)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
There are 3 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -222,12 +222,12 @@ _Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK
|
|||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
1 | T1040 | CWE-294 | Authentication Bypass by Capture-replay | High
|
||||
2 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -235,18 +235,23 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.htaccess` | Medium
|
||||
2 | File | `/admin/link/link_ok.php` | High
|
||||
3 | File | `/alerts/alertConfigField.php` | High
|
||||
4 | File | `/alerts/alertLightbox.php` | High
|
||||
5 | File | `/aqpg/users/login.php` | High
|
||||
6 | File | `/cwms/admin/?page=articles/view_article/` | High
|
||||
7 | File | `/cwms/classes/Master.php?f=save_contact` | High
|
||||
8 | File | `/download/` | Medium
|
||||
9 | File | `/i/:data/ipa.plist` | High
|
||||
10 | ... | ... | ...
|
||||
1 | File | `.htaccess` | Medium
|
||||
2 | File | `/admin/contenttemp` | High
|
||||
3 | File | `/admin/maintenance_actions.php` | High
|
||||
4 | File | `/api/crontab` | Medium
|
||||
5 | File | `/api/fetch` | Medium
|
||||
6 | File | `/audit/log/log_management.php` | High
|
||||
7 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
8 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
9 | File | `/controller/Index.php` | High
|
||||
10 | File | `/core/conditions/AbstractWrapper.java` | High
|
||||
11 | File | `/factor/avx-ecm/vecarith52.c` | High
|
||||
12 | File | `/goform/exeCommand` | High
|
||||
13 | File | `/goform/SetLanInfo` | High
|
||||
14 | File | `/goform/setWorkmode` | High
|
||||
15 | ... | ... | ...
|
||||
|
||||
There are 71 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 116 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,46 +1,46 @@
|
|||
# Lebanese Cedar - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Lebanese Cedar](https://vuldb.com/?actor.lebanese_cedar). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Lebanese Cedar](https://vuldb.com/?actor.lebanese_cedar). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.lebanese_cedar](https://vuldb.com/?actor.lebanese_cedar)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.lebanese_cedar](https://vuldb.com/?actor.lebanese_cedar)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Lebanese Cedar:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Lebanese Cedar:
|
||||
|
||||
* US
|
||||
* FR
|
||||
* DE
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Lebanese Cedar.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Lebanese Cedar.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 68.65.122.109 | server172-1.web-hosting.com | High
|
||||
2 | 74.208.73.149 | thevarsity.com | High
|
||||
3 | 169.50.13.61 | 3d.0d.32a9.ip4.static.sl-reverse.com | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [68.65.122.109](https://vuldb.com/?ip.68.65.122.109) | server172-1.web-hosting.com | - | High
|
||||
2 | [74.208.73.149](https://vuldb.com/?ip.74.208.73.149) | thevarsity.com | - | High
|
||||
3 | [169.50.13.61](https://vuldb.com/?ip.169.50.13.61) | 3d.0d.32a9.ip4.static.sl-reverse.com | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Lebanese Cedar. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Lebanese Cedar_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1600 | Cryptographic Issues | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1600 | CWE-310 | Cryptographic Issues | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Lebanese Cedar. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Lebanese Cedar. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
|
@ -49,17 +49,17 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `/ajax-files/postComment.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 24 more IOA items available. Please use our online service to access the data.
|
||||
There are 24 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://vxug.fakedoma.in/archive/APTs/2021/2021.01.28/Lebanese%20Cedar%20APT.pdf
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,26 +1,26 @@
|
|||
# Lilith RAT - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Lilith RAT](https://vuldb.com/?actor.lilith_rat). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Lilith RAT](https://vuldb.com/?actor.lilith_rat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.lilith_rat](https://vuldb.com/?actor.lilith_rat)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.lilith_rat](https://vuldb.com/?actor.lilith_rat)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Lilith RAT.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Lilith RAT.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 173.249.50.230 | vmi626137.contaboserver.net | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [173.249.50.230](https://vuldb.com/?ip.173.249.50.230) | vmi626137.contaboserver.net | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/594/original/Network_IOCs_list_for_coverage.txt?1625657479
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -22,31 +22,35 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [2.57.186.170](https://vuldb.com/?ip.2.57.186.170) | - | - | High
|
||||
2 | [13.107.21.200](https://vuldb.com/?ip.13.107.21.200) | - | - | High
|
||||
3 | [15.197.142.173](https://vuldb.com/?ip.15.197.142.173) | a4ec4c6ea1c92e2e6.awsglobalaccelerator.com | - | High
|
||||
4 | [20.189.173.20](https://vuldb.com/?ip.20.189.173.20) | - | - | High
|
||||
5 | [23.21.173.155](https://vuldb.com/?ip.23.21.173.155) | ec2-23-21-173-155.compute-1.amazonaws.com | - | Medium
|
||||
6 | [23.21.211.162](https://vuldb.com/?ip.23.21.211.162) | ec2-23-21-211-162.compute-1.amazonaws.com | - | Medium
|
||||
7 | [23.95.132.48](https://vuldb.com/?ip.23.95.132.48) | 23-95-132-48-host.colocrossing.com | - | High
|
||||
8 | [23.205.105.153](https://vuldb.com/?ip.23.205.105.153) | a23-205-105-153.deploy.static.akamaitechnologies.com | - | High
|
||||
9 | [23.205.105.157](https://vuldb.com/?ip.23.205.105.157) | a23-205-105-157.deploy.static.akamaitechnologies.com | - | High
|
||||
10 | [23.222.5.37](https://vuldb.com/?ip.23.222.5.37) | a23-222-5-37.deploy.static.akamaitechnologies.com | - | High
|
||||
11 | [31.41.46.120](https://vuldb.com/?ip.31.41.46.120) | maldova873.example.com | - | High
|
||||
12 | [31.220.52.219](https://vuldb.com/?ip.31.220.52.219) | workshop.piguno.com | - | High
|
||||
13 | [34.102.136.180](https://vuldb.com/?ip.34.102.136.180) | 180.136.102.34.bc.googleusercontent.com | - | Medium
|
||||
14 | [35.247.234.230](https://vuldb.com/?ip.35.247.234.230) | 230.234.247.35.bc.googleusercontent.com | - | Medium
|
||||
15 | [37.235.1.174](https://vuldb.com/?ip.37.235.1.174) | resolver1.freedns.zone.powered.by.virtexxa.com | - | High
|
||||
16 | [37.235.1.177](https://vuldb.com/?ip.37.235.1.177) | resolver2.freedns.zone.powered.by.virtexxa.com | - | High
|
||||
17 | [45.33.83.75](https://vuldb.com/?ip.45.33.83.75) | li1029-75.members.linode.com | - | High
|
||||
18 | [45.128.184.132](https://vuldb.com/?ip.45.128.184.132) | vds107519.mgn-host.ru | - | High
|
||||
19 | [45.147.229.85](https://vuldb.com/?ip.45.147.229.85) | - | - | High
|
||||
20 | [45.154.253.150](https://vuldb.com/?ip.45.154.253.150) | shared04.cust05.proxy.is | - | High
|
||||
21 | [45.154.253.152](https://vuldb.com/?ip.45.154.253.152) | shared06.cust05.proxy.is | - | High
|
||||
22 | [50.16.216.118](https://vuldb.com/?ip.50.16.216.118) | ec2-50-16-216-118.compute-1.amazonaws.com | - | Medium
|
||||
23 | [50.19.92.227](https://vuldb.com/?ip.50.19.92.227) | ec2-50-19-92-227.compute-1.amazonaws.com | - | Medium
|
||||
24 | ... | ... | ... | ...
|
||||
2 | [3.220.57.224](https://vuldb.com/?ip.3.220.57.224) | ec2-3-220-57-224.compute-1.amazonaws.com | - | Medium
|
||||
3 | [3.232.242.170](https://vuldb.com/?ip.3.232.242.170) | ec2-3-232-242-170.compute-1.amazonaws.com | - | Medium
|
||||
4 | [13.107.21.200](https://vuldb.com/?ip.13.107.21.200) | - | - | High
|
||||
5 | [15.197.142.173](https://vuldb.com/?ip.15.197.142.173) | a4ec4c6ea1c92e2e6.awsglobalaccelerator.com | - | High
|
||||
6 | [18.116.152.12](https://vuldb.com/?ip.18.116.152.12) | ec2-18-116-152-12.us-east-2.compute.amazonaws.com | - | Medium
|
||||
7 | [18.188.18.34](https://vuldb.com/?ip.18.188.18.34) | ec2-18-188-18-34.us-east-2.compute.amazonaws.com | - | Medium
|
||||
8 | [20.189.173.20](https://vuldb.com/?ip.20.189.173.20) | - | - | High
|
||||
9 | [23.21.173.155](https://vuldb.com/?ip.23.21.173.155) | ec2-23-21-173-155.compute-1.amazonaws.com | - | Medium
|
||||
10 | [23.21.211.162](https://vuldb.com/?ip.23.21.211.162) | ec2-23-21-211-162.compute-1.amazonaws.com | - | Medium
|
||||
11 | [23.95.132.48](https://vuldb.com/?ip.23.95.132.48) | 23-95-132-48-host.colocrossing.com | - | High
|
||||
12 | [23.205.105.153](https://vuldb.com/?ip.23.205.105.153) | a23-205-105-153.deploy.static.akamaitechnologies.com | - | High
|
||||
13 | [23.205.105.157](https://vuldb.com/?ip.23.205.105.157) | a23-205-105-157.deploy.static.akamaitechnologies.com | - | High
|
||||
14 | [23.222.5.37](https://vuldb.com/?ip.23.222.5.37) | a23-222-5-37.deploy.static.akamaitechnologies.com | - | High
|
||||
15 | [31.41.46.120](https://vuldb.com/?ip.31.41.46.120) | maldova873.example.com | - | High
|
||||
16 | [31.220.52.219](https://vuldb.com/?ip.31.220.52.219) | workshop.piguno.com | - | High
|
||||
17 | [34.98.99.30](https://vuldb.com/?ip.34.98.99.30) | 30.99.98.34.bc.googleusercontent.com | - | Medium
|
||||
18 | [34.102.136.180](https://vuldb.com/?ip.34.102.136.180) | 180.136.102.34.bc.googleusercontent.com | - | Medium
|
||||
19 | [34.117.168.233](https://vuldb.com/?ip.34.117.168.233) | 233.168.117.34.bc.googleusercontent.com | - | Medium
|
||||
20 | [35.186.238.101](https://vuldb.com/?ip.35.186.238.101) | 101.238.186.35.bc.googleusercontent.com | - | Medium
|
||||
21 | [35.247.234.230](https://vuldb.com/?ip.35.247.234.230) | 230.234.247.35.bc.googleusercontent.com | - | Medium
|
||||
22 | [37.235.1.174](https://vuldb.com/?ip.37.235.1.174) | resolver1.freedns.zone.powered.by.virtexxa.com | - | High
|
||||
23 | [37.235.1.177](https://vuldb.com/?ip.37.235.1.177) | resolver2.freedns.zone.powered.by.virtexxa.com | - | High
|
||||
24 | [45.33.83.75](https://vuldb.com/?ip.45.33.83.75) | li1029-75.members.linode.com | - | High
|
||||
25 | [45.128.184.132](https://vuldb.com/?ip.45.128.184.132) | vds107519.mgn-host.ru | - | High
|
||||
26 | [45.147.229.85](https://vuldb.com/?ip.45.147.229.85) | - | - | High
|
||||
27 | [45.154.253.150](https://vuldb.com/?ip.45.154.253.150) | shared04.cust05.proxy.is | - | High
|
||||
28 | ... | ... | ... | ...
|
||||
|
||||
There are 91 more IOC items available. Please use our online service to access the data.
|
||||
There are 109 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -59,7 +63,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -72,33 +76,33 @@ ID | Type | Indicator | Confidence
|
|||
3 | File | `/car.php` | Medium
|
||||
4 | File | `/CMD_ACCOUNT_ADMIN` | High
|
||||
5 | File | `/config/getuser` | High
|
||||
6 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
7 | File | `/core/admin/categories.php` | High
|
||||
8 | File | `/dashboards/#` | High
|
||||
9 | File | `/etc/controller-agent/agent.conf` | High
|
||||
10 | File | `/etc/postfix/sender_login` | High
|
||||
11 | File | `/etc/sudoers` | Medium
|
||||
12 | File | `/etc/tomcat8/Catalina/attack` | High
|
||||
13 | File | `/filemanager/php/connector.php` | High
|
||||
14 | File | `/forum/away.php` | High
|
||||
15 | File | `/fudforum/adm/hlplist.php` | High
|
||||
16 | File | `/GponForm/fsetup_Form` | High
|
||||
17 | File | `/log_download.cgi` | High
|
||||
18 | File | `/modules/profile/index.php` | High
|
||||
19 | File | `/MTFWU` | Low
|
||||
20 | File | `/out.php` | Medium
|
||||
21 | File | `/public/plugins/` | High
|
||||
22 | File | `/s/` | Low
|
||||
23 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
24 | File | `/server-info` | Medium
|
||||
25 | File | `/tmp` | Low
|
||||
26 | File | `/tmp/app/.env` | High
|
||||
27 | File | `/tmp/kamailio_ctl` | High
|
||||
28 | File | `/tmp/kamailio_fifo` | High
|
||||
29 | File | `/uncpath/` | Medium
|
||||
30 | File | `/updown/upload.cgi` | High
|
||||
31 | File | `/usr/bin/at` | Medium
|
||||
32 | File | `/usr/bin/pkexec` | High
|
||||
6 | File | `/core/admin/categories.php` | High
|
||||
7 | File | `/dashboards/#` | High
|
||||
8 | File | `/etc/controller-agent/agent.conf` | High
|
||||
9 | File | `/etc/postfix/sender_login` | High
|
||||
10 | File | `/etc/sudoers` | Medium
|
||||
11 | File | `/etc/tomcat8/Catalina/attack` | High
|
||||
12 | File | `/filemanager/php/connector.php` | High
|
||||
13 | File | `/forum/away.php` | High
|
||||
14 | File | `/fudforum/adm/hlplist.php` | High
|
||||
15 | File | `/GponForm/fsetup_Form` | High
|
||||
16 | File | `/log_download.cgi` | High
|
||||
17 | File | `/modules/profile/index.php` | High
|
||||
18 | File | `/MTFWU` | Low
|
||||
19 | File | `/out.php` | Medium
|
||||
20 | File | `/public/plugins/` | High
|
||||
21 | File | `/s/` | Low
|
||||
22 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
23 | File | `/server-info` | Medium
|
||||
24 | File | `/tmp` | Low
|
||||
25 | File | `/tmp/app/.env` | High
|
||||
26 | File | `/tmp/kamailio_ctl` | High
|
||||
27 | File | `/tmp/kamailio_fifo` | High
|
||||
28 | File | `/uncpath/` | Medium
|
||||
29 | File | `/updown/upload.cgi` | High
|
||||
30 | File | `/usr/bin/pkexec` | High
|
||||
31 | File | `/way4acs/enroll` | High
|
||||
32 | File | `/WEB-INF/web.xml` | High
|
||||
33 | ... | ... | ...
|
||||
|
||||
There are 282 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
@ -119,6 +123,7 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
* https://blog.talosintelligence.com/2022/01/threat-roundup-0121-0128.html
|
||||
* https://blog.talosintelligence.com/2022/02/threat-roundup-0204-0211.html
|
||||
* https://blog.talosintelligence.com/2022/03/threat-roundup-0304-0311.html
|
||||
* https://blog.talosintelligence.com/2022/03/threat-roundup-0311-0318.html
|
||||
* https://vxug.fakedoma.in/archive/APTs/2021/2021.01.06(1)/LokiBot%20Infection%20Chain.pdf
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -13,7 +13,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [IT](https://vuldb.com/?country.it)
|
||||
* ...
|
||||
|
||||
There are 14 more country items available. Please use our online service to access the data.
|
||||
There are 13 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -60,26 +60,26 @@ ID | Type | Indicator | Confidence
|
|||
7 | File | `/cloud_config/router_post/check_reg_verify_code` | High
|
||||
8 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
9 | File | `/data-service/users/` | High
|
||||
10 | File | `/Hospital-Management-System-master/func.php` | High
|
||||
11 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
12 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
|
||||
13 | File | `/js/app.js` | Medium
|
||||
14 | File | `/ManageRoute/postRoute` | High
|
||||
15 | File | `/message-bus/_diagnostics` | High
|
||||
16 | File | `/ms/cms/content/list.do` | High
|
||||
17 | File | `/plugin/jcapture/applet.php` | High
|
||||
18 | File | `/preferences/tags` | High
|
||||
19 | File | `/proc/<pid>/status` | High
|
||||
20 | File | `/public/plugins/` | High
|
||||
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
22 | File | `/secure/EditSubscription.jspa` | High
|
||||
23 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
24 | File | `/tmp` | Low
|
||||
25 | File | `/uncpath/` | Medium
|
||||
26 | File | `1.2.2.pl4` | Medium
|
||||
10 | File | `/etc/config/rpcd` | High
|
||||
11 | File | `/Hospital-Management-System-master/func.php` | High
|
||||
12 | File | `/jeecg-boot/sys/user/queryUserByDepId` | High
|
||||
13 | File | `/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c` | High
|
||||
14 | File | `/js/app.js` | Medium
|
||||
15 | File | `/ManageRoute/postRoute` | High
|
||||
16 | File | `/message-bus/_diagnostics` | High
|
||||
17 | File | `/ms/cms/content/list.do` | High
|
||||
18 | File | `/plugin/jcapture/applet.php` | High
|
||||
19 | File | `/preferences/tags` | High
|
||||
20 | File | `/proc/<pid>/status` | High
|
||||
21 | File | `/public/plugins/` | High
|
||||
22 | File | `/rest-service-fecru/server-v1` | High
|
||||
23 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
24 | File | `/secure/EditSubscription.jspa` | High
|
||||
25 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
26 | File | `/tmp` | Low
|
||||
27 | ... | ... | ...
|
||||
|
||||
There are 227 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 225 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# MargulasRAT - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [MargulasRAT](https://vuldb.com/?actor.margulasrat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [MargulasRAT](https://vuldb.com/?actor.margulasrat). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.margulasrat](https://vuldb.com/?actor.margulasrat)
|
||||
|
||||
|
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with MargulasRAT:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -16,11 +16,11 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 149.248.52.61 | 149.248.52.61.vultr.com | - | Medium
|
||||
1 | [149.248.52.61](https://vuldb.com/?ip.149.248.52.61) | 149.248.52.61.vultr.com | - | Medium
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by MargulasRAT. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _MargulasRAT_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Mars Stealer - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Mars Stealer](https://vuldb.com/?actor.mars_stealer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Mars Stealer](https://vuldb.com/?actor.mars_stealer). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.mars_stealer](https://vuldb.com/?actor.mars_stealer)
|
||||
|
||||
|
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Mars Stealer:
|
||||
|
||||
* US
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -16,11 +16,12 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 159.65.9.223 | - | - | High
|
||||
1 | [5.63.155.126](https://vuldb.com/?ip.5.63.155.126) | 5-63-155-126.cloudvps.regruhosting.ru | - | High
|
||||
2 | [159.65.9.223](https://vuldb.com/?ip.159.65.9.223) | - | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Mars Stealer. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Mars Stealer_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -44,6 +45,7 @@ There are 2 more IOA items available (file, library, argument, input value, patt
|
|||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://gist.github.com/viriback/362a91ed9601ba906d8a17c8102a68bb
|
||||
* https://isc.sans.edu/forums/diary/Arkei+Variants+From+Vidar+to+Mars+Stealer/28468/
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
|
@ -0,0 +1,45 @@
|
|||
# Mining Multitool - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Mining Multitool](https://vuldb.com/?actor.mining_multitool). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.mining_multitool](https://vuldb.com/?actor.mining_multitool)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Mining Multitool:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Mining Multitool.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [185.128.43.62](https://vuldb.com/?ip.185.128.43.62) | - | - | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Mining Multitool. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `inc/config.php` | High
|
||||
2 | Argument | `basePath` | Medium
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://securelist.com/a-mining-multitool/86950/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -0,0 +1,57 @@
|
|||
# Miori - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Miori](https://vuldb.com/?actor.miori). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.miori](https://vuldb.com/?actor.miori)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Miori:
|
||||
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [KR](https://vuldb.com/?country.kr)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Miori.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [94.177.226.227](https://vuldb.com/?ip.94.177.226.227) | host227-226-177-94.static.arubacloud.de | - | High
|
||||
2 | [144.202.49.126](https://vuldb.com/?ip.144.202.49.126) | 144.202.49.126.vultrusercontent.com | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Miori_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-284 | Execution with Unnecessary Privileges | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Miori. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `Advanced_ASUSDDNS_Content.asp` | High
|
||||
2 | File | `data/gbconfiguration.dat` | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blog.trendmicro.com/trendlabs-security-intelligence/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -8,6 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
The following _campaigns_ are known and can be associated with Mirai:
|
||||
|
||||
* CVE-2020-9054
|
||||
* DDoS Ukraine
|
||||
* Log4Shell
|
||||
|
||||
|
@ -20,7 +21,7 @@ These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. acce
|
|||
* [CN](https://vuldb.com/?country.cn)
|
||||
* ...
|
||||
|
||||
There are 7 more country items available. Please use our online service to access the data.
|
||||
There are 8 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -33,7 +34,8 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
3 | [34.80.131.135](https://vuldb.com/?ip.34.80.131.135) | 135.131.80.34.bc.googleusercontent.com | - | Medium
|
||||
4 | [45.61.136.130](https://vuldb.com/?ip.45.61.136.130) | - | DDoS Ukraine | High
|
||||
5 | [45.61.186.13](https://vuldb.com/?ip.45.61.186.13) | - | DDoS Ukraine | High
|
||||
6 | ... | ... | ... | ...
|
||||
6 | [45.88.181.46](https://vuldb.com/?ip.45.88.181.46) | pelko.incifios.org.uk | - | High
|
||||
7 | ... | ... | ... | ...
|
||||
|
||||
There are 22 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
|
@ -66,14 +68,14 @@ ID | Type | Indicator | Confidence
|
|||
8 | File | `/rest/api/2/search` | High
|
||||
9 | File | `/rom-0` | Low
|
||||
10 | File | `/thruk/#cgi-bin/extinfo.cgi?type=2` | High
|
||||
11 | File | `/uncpath/` | Medium
|
||||
12 | File | `/usr/sbin/httpd` | High
|
||||
13 | File | `adclick.php` | Medium
|
||||
14 | File | `admin.php` | Medium
|
||||
15 | File | `admin/scripts/FileUploader/php.php` | High
|
||||
11 | File | `/tmp` | Low
|
||||
12 | File | `/uncpath/` | Medium
|
||||
13 | File | `/usr/sbin/httpd` | High
|
||||
14 | File | `adclick.php` | Medium
|
||||
15 | File | `admin.php` | Medium
|
||||
16 | ... | ... | ...
|
||||
|
||||
There are 129 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 132 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -86,6 +88,7 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
* https://blog.netlab.360.com/wei-xie-kuai-xun-log4jlou-dong-yi-jing-bei-yong-lai-zu-jian-botnet-zhen-dui-linuxshe-bei/
|
||||
* https://blog.netlab.360.com/wo-men-kan-dao-de-wu-ke-lan-bei-ddosgong-ji-xi-jie/
|
||||
* https://blogs.infoblox.com/cyber-threat-intelligence/cyber-campaign-briefs/log4j-indicators-of-compromise-to-date/
|
||||
* https://isc.sans.edu/forums/diary/Zyxel+Network+Storage+Devices+Hunted+By+Mirai+Variant/28324/
|
||||
* https://urlhaus.abuse.ch/host/185.243.56.167/
|
||||
|
||||
## Literature
|
||||
|
|
|
@ -45,13 +45,14 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
11 | [46.166.129.159](https://vuldb.com/?ip.46.166.129.159) | gcn.warrirge.com | - | High
|
||||
12 | [66.219.22.235](https://vuldb.com/?ip.66.219.22.235) | core96.hostingmadeeasy.com | - | High
|
||||
13 | [78.129.139.134](https://vuldb.com/?ip.78.129.139.134) | der134.creditloanlenders.com | - | High
|
||||
14 | ... | ... | ... | ...
|
||||
14 | [78.129.139.147](https://vuldb.com/?ip.78.129.139.147) | - | - | High
|
||||
15 | ... | ... | ... | ...
|
||||
|
||||
There are 50 more IOC items available. Please use our online service to access the data.
|
||||
There are 54 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by _MuddyWater_. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _MuddyWater_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -82,21 +83,20 @@ ID | Type | Indicator | Confidence
|
|||
12 | File | `/hdf5/src/H5T.c` | High
|
||||
13 | File | `/include/chart_generator.php` | High
|
||||
14 | File | `/jerry-core/parser/js/js-scanner-util.c` | High
|
||||
15 | File | `/modules/profile/index.php` | High
|
||||
16 | File | `/music/ajax.php` | High
|
||||
17 | File | `/opensis/functions/GetStuListFnc.php` | High
|
||||
18 | File | `/owa/auth/logon.aspx` | High
|
||||
19 | File | `/post/editing` | High
|
||||
20 | File | `/product.php` | Medium
|
||||
21 | File | `/product_list.php` | High
|
||||
22 | File | `/public/plugins/` | High
|
||||
23 | File | `/RestAPI` | Medium
|
||||
24 | File | `/rsms/` | Low
|
||||
25 | File | `/secure/admin/ViewInstrumentation.jspa` | High
|
||||
26 | File | `/userRpm/PingIframeRpm.htm` | High
|
||||
27 | ... | ... | ...
|
||||
15 | File | `/music/ajax.php` | High
|
||||
16 | File | `/opensis/functions/GetStuListFnc.php` | High
|
||||
17 | File | `/post/editing` | High
|
||||
18 | File | `/product.php` | Medium
|
||||
19 | File | `/product_list.php` | High
|
||||
20 | File | `/ptms/classes/Users.php` | High
|
||||
21 | File | `/public/plugins/` | High
|
||||
22 | File | `/RestAPI` | Medium
|
||||
23 | File | `/rsms/` | Low
|
||||
24 | File | `/secure/admin/ViewInstrumentation.jspa` | High
|
||||
25 | File | `/userRpm/PingIframeRpm.htm` | High
|
||||
26 | ... | ... | ...
|
||||
|
||||
There are 223 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 216 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -104,9 +104,11 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
|
||||
* https://blog.talosintelligence.com/2019/05/recent-muddywater-associated-blackwater.html
|
||||
* https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html
|
||||
* https://blog.talosintelligence.com/2022/03/iranian-supergroup-muddywater.html
|
||||
* https://reaqta.com/2017/11/muddywater-apt-targeting-middle-east/
|
||||
* https://securelist.com/muddywater/88059/
|
||||
* https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/seedworm-espionage-group
|
||||
* https://twitter.com/ShadowChasing1/status/1481621068255137794
|
||||
* https://unit42.paloaltonetworks.com/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/
|
||||
* https://www.cisa.gov/uscert/ncas/alerts/aa22-055a
|
||||
* https://www.clearskysec.com/wp-content/uploads/2019/06/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdf
|
||||
|
|
|
@ -49,7 +49,7 @@ There are 56 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Muhstik. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Muhstik_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -58,7 +58,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -89,7 +89,7 @@ ID | Type | Indicator | Confidence
|
|||
21 | File | `adm1n/admin_config.php` | High
|
||||
22 | ... | ... | ...
|
||||
|
||||
There are 184 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 187 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -9,14 +9,18 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
The following _campaigns_ are known and can be associated with Mustang Panda:
|
||||
|
||||
* Diànxùn
|
||||
* Hodur
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Mustang Panda:
|
||||
|
||||
* [DE](https://vuldb.com/?country.de)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -26,12 +30,15 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [42.99.117.95](https://vuldb.com/?ip.42.99.117.95) | - | - | High
|
||||
2 | [43.254.217.67](https://vuldb.com/?ip.43.254.217.67) | - | - | High
|
||||
3 | [45.32.50.150](https://vuldb.com/?ip.45.32.50.150) | 45.32.50.150.vultr.com | - | Medium
|
||||
4 | [45.77.184.12](https://vuldb.com/?ip.45.77.184.12) | comm.phiu.pw | - | High
|
||||
5 | [45.248.87.14](https://vuldb.com/?ip.45.248.87.14) | - | - | High
|
||||
6 | ... | ... | ... | ...
|
||||
3 | [43.254.218.42](https://vuldb.com/?ip.43.254.218.42) | - | Hodur | High
|
||||
4 | [45.32.50.150](https://vuldb.com/?ip.45.32.50.150) | 45.32.50.150.vultr.com | - | Medium
|
||||
5 | [45.77.184.12](https://vuldb.com/?ip.45.77.184.12) | comm.phiu.pw | - | High
|
||||
6 | [45.131.179.179](https://vuldb.com/?ip.45.131.179.179) | - | Hodur | High
|
||||
7 | [45.154.14.235](https://vuldb.com/?ip.45.154.14.235) | - | Hodur | High
|
||||
8 | [45.248.87.14](https://vuldb.com/?ip.45.248.87.14) | - | - | High
|
||||
9 | ... | ... | ... | ...
|
||||
|
||||
There are 22 more IOC items available. Please use our online service to access the data.
|
||||
There are 32 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -65,7 +72,7 @@ ID | Type | Indicator | Confidence
|
|||
11 | File | `/webtools/control/httpService` | High
|
||||
12 | ... | ... | ...
|
||||
|
||||
There are 89 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 93 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -75,6 +82,7 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
* https://twitter.com/ESETresearch/status/1400165861973966854
|
||||
* https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
|
||||
* https://www.mcafee.com/enterprise/en-us/assets/reports/rp-operation-dianxun.pdf
|
||||
* https://www.welivesecurity.com/2022/03/23/mustang-panda-hodur-old-tricks-new-korplug-variant/
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
|
@ -0,0 +1,110 @@
|
|||
# Mylobot - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Mylobot](https://vuldb.com/?actor.mylobot). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.mylobot](https://vuldb.com/?actor.mylobot)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Mylobot:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [NL](https://vuldb.com/?country.nl)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* ...
|
||||
|
||||
There are 28 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Mylobot.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [46.166.173.180](https://vuldb.com/?ip.46.166.173.180) | - | - | High
|
||||
2 | [70.36.107.38](https://vuldb.com/?ip.70.36.107.38) | - | - | High
|
||||
3 | [70.36.107.39](https://vuldb.com/?ip.70.36.107.39) | - | - | High
|
||||
4 | [74.222.19.63](https://vuldb.com/?ip.74.222.19.63) | - | - | High
|
||||
5 | ... | ... | ... | ...
|
||||
|
||||
There are 18 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Mylobot_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Mylobot. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `.procmailrc` | Medium
|
||||
2 | File | `/../conf/config.properties` | High
|
||||
3 | File | `/addnews.html` | High
|
||||
4 | File | `/admin/` | Low
|
||||
5 | File | `/api/2.0/rest/aggregator/xml` | High
|
||||
6 | File | `/api/blade-log/api/list` | High
|
||||
7 | File | `/cgi-bin/webviewer_login_page` | High
|
||||
8 | File | `/Config/SaveUploadedHotspotLogoFile` | High
|
||||
9 | File | `/core/vendor/meenie/javascript-packer/example-inline.php` | High
|
||||
10 | File | `/etc/config/rpcd` | High
|
||||
11 | File | `/exponent_constants.php` | High
|
||||
12 | File | `/forum/away.php` | High
|
||||
13 | File | `/goform/formLogin` | High
|
||||
14 | File | `/hub/api/user` | High
|
||||
15 | File | `/mfaslmf/nolicense` | High
|
||||
16 | File | `/opt/bin/cli` | Medium
|
||||
17 | File | `/plain` | Low
|
||||
18 | File | `/proc` | Low
|
||||
19 | File | `/proc/ioports` | High
|
||||
20 | File | `/products/details.asp` | High
|
||||
21 | File | `/public/plugins/` | High
|
||||
22 | File | `/RestAPI` | Medium
|
||||
23 | File | `/tmp` | Low
|
||||
24 | File | `/uncpath/` | Medium
|
||||
25 | File | `/User/saveUser` | High
|
||||
26 | File | `/ViewUserHover.jspa` | High
|
||||
27 | File | `/WEB-INF/web.xml` | High
|
||||
28 | File | `/wp-admin/admin-ajax.php` | High
|
||||
29 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
30 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
31 | File | `abc-pcie.c` | Medium
|
||||
32 | File | `accountmanagement.php` | High
|
||||
33 | File | `addentry.php` | Medium
|
||||
34 | File | `adherents/subscription/info.php` | High
|
||||
35 | File | `admin.joomlaflashfun.php` | High
|
||||
36 | File | `admin.joomlaradiov5.php` | High
|
||||
37 | File | `admin.panoramic.php` | High
|
||||
38 | File | `admin.php` | Medium
|
||||
39 | File | `admin/change-password.php` | High
|
||||
40 | File | `admin/index.php` | High
|
||||
41 | ... | ... | ...
|
||||
|
||||
There are 358 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://ioc.hatenablog.com/entry/2018/11/14/000000
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -1,88 +1,115 @@
|
|||
# NSA - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NSA](https://vuldb.com/?actor.nsa). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NSA](https://vuldb.com/?actor.nsa). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.nsa](https://vuldb.com/?actor.nsa)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.nsa](https://vuldb.com/?actor.nsa)
|
||||
|
||||
## Campaigns
|
||||
|
||||
The following campaigns are known and can be associated with NSA:
|
||||
The following _campaigns_ are known and can be associated with NSA:
|
||||
|
||||
* BOUNDLESS INFORMANT
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with NSA:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with NSA:
|
||||
|
||||
* US
|
||||
* CN
|
||||
* IR
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* ...
|
||||
|
||||
There are 12 more country items available. Please use our online service to access the data.
|
||||
There are 25 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of NSA.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of NSA.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 31.6.17.94 | - | High
|
||||
2 | 37.72.168.84 | 84.168.72.37.static.swiftway.net | High
|
||||
3 | 37.130.229.100 | uk.server | High
|
||||
4 | 37.130.229.101 | uk.server | High
|
||||
5 | 37.220.10.28 | h37-220-10-28.host.redstation.co.uk | High
|
||||
6 | 50.115.118.140 | sfaaa.net | High
|
||||
7 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [31.6.17.94](https://vuldb.com/?ip.31.6.17.94) | - | BOUNDLESS INFORMANT | High
|
||||
2 | [37.72.168.84](https://vuldb.com/?ip.37.72.168.84) | 84.168.72.37.static.swiftway.net | BOUNDLESS INFORMANT | High
|
||||
3 | [37.130.229.100](https://vuldb.com/?ip.37.130.229.100) | uk.server | BOUNDLESS INFORMANT | High
|
||||
4 | [37.130.229.101](https://vuldb.com/?ip.37.130.229.101) | uk.server | BOUNDLESS INFORMANT | High
|
||||
5 | [37.220.10.28](https://vuldb.com/?ip.37.220.10.28) | h37-220-10-28.host.redstation.co.uk | BOUNDLESS INFORMANT | High
|
||||
6 | [50.115.118.140](https://vuldb.com/?ip.50.115.118.140) | sfaaa.net | BOUNDLESS INFORMANT | High
|
||||
7 | ... | ... | ... | ...
|
||||
|
||||
There are 25 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by NSA. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _NSA_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ...
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more TTP items available. Please use our online service to access the data.
|
||||
There are 4 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by NSA. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by NSA. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.ssh/authorized_keys2` | High
|
||||
2 | File | `/anony/mjpg.cgi` | High
|
||||
3 | File | `/filemanager/upload.php` | High
|
||||
4 | File | `/html/device-id` | High
|
||||
5 | File | `/uncpath/` | Medium
|
||||
6 | File | `actbar3.ocx` | Medium
|
||||
7 | File | `adclick.php` | Medium
|
||||
8 | File | `admin.php` | Medium
|
||||
9 | File | `admin/users/add` | High
|
||||
10 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
11 | File | `ajax-actions.php` | High
|
||||
12 | File | `ajaxRequest/methodCall.do` | High
|
||||
13 | File | `apply.cgi` | Medium
|
||||
14 | File | `BKESimmgr.exe` | High
|
||||
15 | ... | ... | ...
|
||||
1 | File | `.procmailrc` | Medium
|
||||
2 | File | `/.ssh/authorized_keys2` | High
|
||||
3 | File | `/admin-ajax.php?action=eps_redirect_save` | High
|
||||
4 | File | `/anony/mjpg.cgi` | High
|
||||
5 | File | `/auth` | Low
|
||||
6 | File | `/dashboard/view-chair-list.php` | High
|
||||
7 | File | `/etc/hosts` | Medium
|
||||
8 | File | `/filemanager/upload.php` | High
|
||||
9 | File | `/GponForm/device_Form?script/` | High
|
||||
10 | File | `/GponForm/fsetup_Form` | High
|
||||
11 | File | `/GponForm/usb_restore_Form?script/` | High
|
||||
12 | File | `/html/device-id` | High
|
||||
13 | File | `/includes/decorators/global-translations.jsp` | High
|
||||
14 | File | `/index.php` | Medium
|
||||
15 | File | `/product_list.php` | High
|
||||
16 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
17 | File | `/see_more_details.php` | High
|
||||
18 | File | `/server-status` | High
|
||||
19 | File | `/setSystemAdmin` | High
|
||||
20 | File | `/uncpath/` | Medium
|
||||
21 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
|
||||
22 | File | `/WEB-INF/web.xml` | High
|
||||
23 | File | `actbar3.ocx` | Medium
|
||||
24 | File | `adclick.php` | Medium
|
||||
25 | File | `addentry.php` | Medium
|
||||
26 | File | `admin.php` | Medium
|
||||
27 | File | `admin/executar_login.php` | High
|
||||
28 | File | `admin/mcart_xls_import.php` | High
|
||||
29 | File | `admin/setting.php` | High
|
||||
30 | File | `admin/src/containers/InputModalStepperProvider/index.js` | High
|
||||
31 | File | `admin/users/add` | High
|
||||
32 | File | `administrator/components/com_media/helpers/media.php` | High
|
||||
33 | File | `admin_ranks.php` | High
|
||||
34 | File | `ajax-actions.php` | High
|
||||
35 | File | `ajaxRequest/methodCall.do` | High
|
||||
36 | File | `alipay/alipayapi.php` | High
|
||||
37 | File | `apcupsd.exe` | Medium
|
||||
38 | File | `apply.cgi` | Medium
|
||||
39 | File | `auth.inc.php` | Medium
|
||||
40 | File | `auth.py` | Low
|
||||
41 | File | `auth2-gss.c` | Medium
|
||||
42 | ... | ... | ...
|
||||
|
||||
There are 118 more IOA items available. Please use our online service to access the data.
|
||||
There are 367 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://medium.com/@danchodanchev/how-the-nsa-utilized-iranian-cyber-proxies-to-participate-in-the-boundless-informant-program-e82045d44848
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -15,6 +15,7 @@ The following _campaigns_ are known and can be associated with Naikon:
|
|||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Naikon:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [FR](https://vuldb.com/?country.fr)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
@ -51,18 +52,20 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `%windir%\Internet Logs\` | High
|
||||
2 | File | `/crypto_keyfile.bin` | High
|
||||
3 | File | `/show_news.php` | High
|
||||
4 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
|
||||
5 | File | `/squashfs-root/www/HNAP1/control/SetWizardConfig.php` | High
|
||||
6 | File | `500page.jsp` | Medium
|
||||
7 | File | `admin/admin_process.php` | High
|
||||
8 | File | `admin/user_activate_submit.php` | High
|
||||
9 | File | `browse-scategory.php` | High
|
||||
10 | File | `classes/Visualizer/Gutenberg/Block.php` | High
|
||||
11 | ... | ... | ...
|
||||
2 | File | `/admin.php/admin/website/data.html` | High
|
||||
3 | File | `/aqpg/users/login.php` | High
|
||||
4 | File | `/crypto_keyfile.bin` | High
|
||||
5 | File | `/cwms/admin/?page=articles/view_article/` | High
|
||||
6 | File | `/cwms/classes/Master.php?f=save_contact` | High
|
||||
7 | File | `/mims/app/addcustomerHandler.php` | High
|
||||
8 | File | `/one_church/userregister.php` | High
|
||||
9 | File | `/show_news.php` | High
|
||||
10 | File | `/siteminderagent/pwcgi/smpwservicescgi.exe` | High
|
||||
11 | File | `/squashfs-root/www/HNAP1/control/SetWizardConfig.php` | High
|
||||
12 | File | `500page.jsp` | Medium
|
||||
13 | ... | ... | ...
|
||||
|
||||
There are 83 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 106 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Necro - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Necro](https://vuldb.com/?actor.necro). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Necro](https://vuldb.com/?actor.necro). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.necro](https://vuldb.com/?actor.necro)
|
||||
|
||||
|
@ -8,9 +8,9 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Necro:
|
||||
|
||||
* US
|
||||
* RU
|
||||
* SI
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
* [SI](https://vuldb.com/?country.si)
|
||||
* ...
|
||||
|
||||
There are 7 more country items available. Please use our online service to access the data.
|
||||
|
@ -21,23 +21,22 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 45.145.185.83 | - | - | High
|
||||
2 | 45.145.185.229 | - | - | High
|
||||
3 | 52.3.115.71 | ec2-52-3-115-71.compute-1.amazonaws.com | - | Medium
|
||||
4 | 54.161.239.214 | ec2-54-161-239-214.compute-1.amazonaws.com | - | Medium
|
||||
1 | [45.145.185.83](https://vuldb.com/?ip.45.145.185.83) | - | - | High
|
||||
2 | [45.145.185.229](https://vuldb.com/?ip.45.145.185.229) | - | - | High
|
||||
3 | [52.3.115.71](https://vuldb.com/?ip.52.3.115.71) | ec2-52-3-115-71.compute-1.amazonaws.com | - | Medium
|
||||
4 | [54.161.239.214](https://vuldb.com/?ip.54.161.239.214) | ec2-54-161-239-214.compute-1.amazonaws.com | - | Medium
|
||||
5 | ... | ... | ... | ...
|
||||
|
||||
There are 16 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Necro. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Necro_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264 | Execution with Unnecessary Privileges | High
|
||||
3 | T1499 | CWE-404 | Resource Consumption | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
|
|
@ -1,65 +1,100 @@
|
|||
# Nemucod - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Nemucod](https://vuldb.com/?actor.nemucod). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Nemucod](https://vuldb.com/?actor.nemucod). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.nemucod](https://vuldb.com/?actor.nemucod)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.nemucod](https://vuldb.com/?actor.nemucod)
|
||||
|
||||
## Countries
|
||||
|
||||
These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Nemucod:
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Nemucod:
|
||||
|
||||
* US
|
||||
* RU
|
||||
* CN
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [GB](https://vuldb.com/?country.gb)
|
||||
* ...
|
||||
|
||||
There are 1 more country items available. Please use our online service to access the data.
|
||||
There are 25 more country items available. Please use our online service to access the data.
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of Nemucod.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Nemucod.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 185.130.104.156 | . | High
|
||||
2 | 185.130.104.178 | mail.instadavance.com | High
|
||||
3 | 185.159.82.11 | customer.clientshostname.com | High
|
||||
4 | ... | ... | ...
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [185.130.104.156](https://vuldb.com/?ip.185.130.104.156) | . | - | High
|
||||
2 | [185.130.104.178](https://vuldb.com/?ip.185.130.104.178) | mail.instadavance.com | - | High
|
||||
3 | [185.159.82.11](https://vuldb.com/?ip.185.159.82.11) | customer.clientshostname.com | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 2 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by Nemucod. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Nemucod_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Description | Confidence
|
||||
-- | --------- | ----------- | ----------
|
||||
1 | T1059.007 | Cross Site Scripting | High
|
||||
2 | T1068 | Execution with Unnecessary Privileges | High
|
||||
3 | T1211 | 7PK Security Features | High
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-266, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1110.001 | CWE-307, CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 5 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Nemucod. This data is unique as it uses our predictive model for actor profiling.
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Nemucod. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/anony/mjpg.cgi` | High
|
||||
2 | File | `/plain` | Low
|
||||
3 | File | `awstats.pl` | Medium
|
||||
4 | ... | ... | ...
|
||||
1 | File | `/?module=users§ion=cpanel&page=list` | High
|
||||
2 | File | `/admin/powerline` | High
|
||||
3 | File | `/admin/syslog` | High
|
||||
4 | File | `/api/upload` | Medium
|
||||
5 | File | `/cgi-bin` | Medium
|
||||
6 | File | `/cgi-bin/kerbynet` | High
|
||||
7 | File | `/context/%2e/WEB-INF/web.xml` | High
|
||||
8 | File | `/dcim/sites/add/` | High
|
||||
9 | File | `/EXCU_SHELL` | Medium
|
||||
10 | File | `/forum/away.php` | High
|
||||
11 | File | `/fudforum/adm/hlplist.php` | High
|
||||
12 | File | `/login` | Low
|
||||
13 | File | `/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asp` | High
|
||||
14 | File | `/monitoring` | Medium
|
||||
15 | File | `/new` | Low
|
||||
16 | File | `/proc/<pid>/status` | High
|
||||
17 | File | `/public/login.htm` | High
|
||||
18 | File | `/public/plugins/` | High
|
||||
19 | File | `/rom` | Low
|
||||
20 | File | `/scripts/killpvhost` | High
|
||||
21 | File | `/secure/admin/InsightDefaultCustomFieldConfig.jspa` | High
|
||||
22 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
23 | File | `/src/main/java/com/dotmarketing/filters/CMSFilter.java` | High
|
||||
24 | File | `/tmp` | Low
|
||||
25 | File | `/tmp/redis.ds` | High
|
||||
26 | File | `/uncpath/` | Medium
|
||||
27 | File | `/ViewUserHover.jspa` | High
|
||||
28 | File | `/wp-admin` | Medium
|
||||
29 | File | `/wp-json/wc/v3/webhooks` | High
|
||||
30 | File | `14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgi` | High
|
||||
31 | File | `AccountManagerService.java` | High
|
||||
32 | File | `actions/CompanyDetailsSave.php` | High
|
||||
33 | File | `ActiveServices.java` | High
|
||||
34 | File | `ActivityManagerService.java` | High
|
||||
35 | File | `addlink.php` | Medium
|
||||
36 | ... | ... | ...
|
||||
|
||||
There are 14 more IOA items available. Please use our online service to access the data.
|
||||
There are 313 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://unit42.paloaltonetworks.com/unit42-practice-makes-perfect-nemucod-evolves-delivery-obfuscation-techniques-harvest-credentials/
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,27 +1,70 @@
|
|||
# NetTraveler - Cyber Threat Intelligence
|
||||
|
||||
The indicators are related to [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NetTraveler](https://vuldb.com/?actor.nettraveler). The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NetTraveler](https://vuldb.com/?actor.nettraveler). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
Live data and more analysis capabilities are available at [https://vuldb.com/?actor.nettraveler](https://vuldb.com/?actor.nettraveler)
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.nettraveler](https://vuldb.com/?actor.nettraveler)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with NetTraveler:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of NetTraveler.
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of NetTraveler.
|
||||
|
||||
ID | IP address | Hostname | Confidence
|
||||
-- | ---------- | -------- | ----------
|
||||
1 | 122.10.17.130 | - | High
|
||||
2 | 216.83.32.29 | - | High
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [61.178.77.111](https://vuldb.com/?ip.61.178.77.111) | - | - | High
|
||||
2 | [67.198.140.148](https://vuldb.com/?ip.67.198.140.148) | 67.198.140.148.static.krypt.com | - | High
|
||||
3 | [96.44.179.26](https://vuldb.com/?ip.96.44.179.26) | 96.44.179.26.static.quadranet.com | - | High
|
||||
4 | [96.46.4.237](https://vuldb.com/?ip.96.46.4.237) | 96-46-4-237.res.trstrm.net | - | High
|
||||
5 | ... | ... | ... | ...
|
||||
|
||||
There are 15 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _NetTraveler_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79, CWE-80 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1587.003 | CWE-295 | Improper Certificate Validation | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
These _indicators of attack_ (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by NetTraveler. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/bin/login.php` | High
|
||||
2 | File | `/see_more_details.php` | High
|
||||
3 | File | `/start-stop` | Medium
|
||||
4 | File | `/uncpath/` | Medium
|
||||
5 | File | `/webmail/` | Medium
|
||||
6 | File | `addentry.php` | Medium
|
||||
7 | File | `admin.remository.php` | High
|
||||
8 | File | `admin/index.php` | High
|
||||
9 | ... | ... | ...
|
||||
|
||||
There are 68 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains external sources which discuss the actor and the associated activities:
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://ioc.hatenablog.com/entry/2011/04/28/000000
|
||||
* https://www.threatminer.org/report.php?q=NetTraveler_Makeover_10th_Birthday.pdf&y=2014
|
||||
|
||||
## Literature
|
||||
|
||||
The following articles explain our unique predictive cyber threat intelligence:
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# NightScout - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NightScout](https://vuldb.com/?actor.nightscout). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [NightScout](https://vuldb.com/?actor.nightscout). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.nightscout](https://vuldb.com/?actor.nightscout)
|
||||
|
||||
|
@ -14,8 +14,8 @@ The following _campaigns_ are known and can be associated with NightScout:
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with NightScout:
|
||||
|
||||
* CN
|
||||
* US
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -23,16 +23,16 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 45.158.32.65 | - | NightScout | High
|
||||
2 | 103.255.177.138 | - | NightScout | High
|
||||
3 | 185.239.226.172 | - | NightScout | High
|
||||
1 | [45.158.32.65](https://vuldb.com/?ip.45.158.32.65) | - | NightScout | High
|
||||
2 | [103.255.177.138](https://vuldb.com/?ip.103.255.177.138) | - | NightScout | High
|
||||
3 | [185.239.226.172](https://vuldb.com/?ip.185.239.226.172) | - | NightScout | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 1 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by NightScout. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _NightScout_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -77,7 +77,7 @@ ID | Type | Indicator | Confidence
|
|||
25 | File | `AndroidManifest.xml` | High
|
||||
26 | ... | ... | ...
|
||||
|
||||
There are 220 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 223 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -29,37 +29,38 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [37.59.198.130](https://vuldb.com/?ip.37.59.198.130) | - | - | High
|
||||
2 | [37.59.198.131](https://vuldb.com/?ip.37.59.198.131) | - | - | High
|
||||
3 | [45.32.100.179](https://vuldb.com/?ip.45.32.100.179) | 45.32.100.179.vultr.com | - | Medium
|
||||
4 | [45.32.114.49](https://vuldb.com/?ip.45.32.114.49) | 45.32.114.49.vultr.com | - | Medium
|
||||
5 | [45.76.179.28](https://vuldb.com/?ip.45.76.179.28) | 45.76.179.28.vultr.com | - | Medium
|
||||
6 | [45.76.179.151](https://vuldb.com/?ip.45.76.179.151) | 45.76.179.151.vultr.com | - | Medium
|
||||
7 | [45.114.117.164](https://vuldb.com/?ip.45.114.117.164) | folien.reisnart.com | - | High
|
||||
8 | [46.183.220.81](https://vuldb.com/?ip.46.183.220.81) | ip-220-81.dataclub.info | - | High
|
||||
9 | [46.183.220.82](https://vuldb.com/?ip.46.183.220.82) | ip-220-82.dataclub.info | - | High
|
||||
10 | [46.183.222.82](https://vuldb.com/?ip.46.183.222.82) | ip-222-82.dataclub.info | - | High
|
||||
11 | [46.183.222.83](https://vuldb.com/?ip.46.183.222.83) | ip-222-83.dataclub.info | - | High
|
||||
12 | [46.183.222.84](https://vuldb.com/?ip.46.183.222.84) | ip-222-84.dataclub.info | - | High
|
||||
13 | [46.183.223.106](https://vuldb.com/?ip.46.183.223.106) | ip-223-106.dataclub.info | - | High
|
||||
14 | [46.183.223.107](https://vuldb.com/?ip.46.183.223.107) | ip-223-107.dataclub.info | - | High
|
||||
15 | [62.113.238.135](https://vuldb.com/?ip.62.113.238.135) | hosted-by.securefastserver.com | - | High
|
||||
16 | [64.62.174.9](https://vuldb.com/?ip.64.62.174.9) | agent2.jenkins.aoindustries.com | - | High
|
||||
17 | [64.62.174.16](https://vuldb.com/?ip.64.62.174.16) | unassigned16.net2.fc.aoindustries.com | - | High
|
||||
18 | [64.62.174.17](https://vuldb.com/?ip.64.62.174.17) | unassigned17.net2.fc.aoindustries.com | - | High
|
||||
19 | [64.62.174.21](https://vuldb.com/?ip.64.62.174.21) | unassigned21.net2.fc.aoindustries.com | - | High
|
||||
20 | [64.62.174.41](https://vuldb.com/?ip.64.62.174.41) | dev1.plant-orbit.com | - | High
|
||||
21 | ... | ... | ... | ...
|
||||
3 | [45.9.239.34](https://vuldb.com/?ip.45.9.239.34) | 45.9.239.34.deltahost-ptr | - | High
|
||||
4 | [45.9.239.45](https://vuldb.com/?ip.45.9.239.45) | 45.9.239.45.deltahost-ptr | - | High
|
||||
5 | [45.9.239.77](https://vuldb.com/?ip.45.9.239.77) | 45.9.239.77.deltahost-ptr | - | High
|
||||
6 | [45.9.239.110](https://vuldb.com/?ip.45.9.239.110) | 45.9.239.110.deltahost-ptr | - | High
|
||||
7 | [45.9.239.139](https://vuldb.com/?ip.45.9.239.139) | 45.9.239.139.deltahost-ptr | - | High
|
||||
8 | [45.32.100.179](https://vuldb.com/?ip.45.32.100.179) | 45.32.100.179.vultr.com | - | Medium
|
||||
9 | [45.32.114.49](https://vuldb.com/?ip.45.32.114.49) | 45.32.114.49.vultr.com | - | Medium
|
||||
10 | [45.76.179.28](https://vuldb.com/?ip.45.76.179.28) | 45.76.179.28.vultr.com | - | Medium
|
||||
11 | [45.76.179.151](https://vuldb.com/?ip.45.76.179.151) | 45.76.179.151.vultr.com | - | Medium
|
||||
12 | [45.114.117.164](https://vuldb.com/?ip.45.114.117.164) | folien.reisnart.com | - | High
|
||||
13 | [46.183.220.81](https://vuldb.com/?ip.46.183.220.81) | ip-220-81.dataclub.info | - | High
|
||||
14 | [46.183.220.82](https://vuldb.com/?ip.46.183.220.82) | ip-220-82.dataclub.info | - | High
|
||||
15 | [46.183.221.188](https://vuldb.com/?ip.46.183.221.188) | ip-221-188.dataclub.info | - | High
|
||||
16 | [46.183.221.189](https://vuldb.com/?ip.46.183.221.189) | ip-221-189.dataclub.info | - | High
|
||||
17 | [46.183.221.190](https://vuldb.com/?ip.46.183.221.190) | ip-221-190.dataclub.info | - | High
|
||||
18 | [46.183.222.82](https://vuldb.com/?ip.46.183.222.82) | ip-222-82.dataclub.info | - | High
|
||||
19 | [46.183.222.83](https://vuldb.com/?ip.46.183.222.83) | ip-222-83.dataclub.info | - | High
|
||||
20 | [46.183.222.84](https://vuldb.com/?ip.46.183.222.84) | ip-222-84.dataclub.info | - | High
|
||||
21 | [46.183.223.106](https://vuldb.com/?ip.46.183.223.106) | ip-223-106.dataclub.info | - | High
|
||||
22 | [46.183.223.107](https://vuldb.com/?ip.46.183.223.107) | ip-223-107.dataclub.info | - | High
|
||||
23 | ... | ... | ... | ...
|
||||
|
||||
There are 81 more IOC items available. Please use our online service to access the data.
|
||||
There are 90 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by OceanLotus. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _OceanLotus_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
2 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
3 | T1499 | CWE-404 | Resource Consumption | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -78,6 +79,7 @@ There are 10 more IOA items available (file, library, argument, input value, pat
|
|||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blogs.blackberry.com/en/2019/10/mobile-malware-and-apt-espionage-prolific-pervasive-and-cross-platform
|
||||
* https://github.com/eset/malware-ioc/tree/master/oceanlotus
|
||||
* https://www.threatminer.org/report.php?q=ESET_OceanLotus.pdf&y=2018
|
||||
* https://www.threatminer.org/report.php?q=OceanLotusBlossoms_MassDigitalSurveillanceandAttacksTargetingASEAN,AsianNations,theMedia,HumanRightsGroups,andCivilSociety_Volexity.pdf&y=2017
|
||||
|
|
|
@ -0,0 +1,30 @@
|
|||
# Oski - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Oski](https://vuldb.com/?actor.oski). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.oski](https://vuldb.com/?actor.oski)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Oski.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [2.56.57.108](https://vuldb.com/?ip.2.56.57.108) | - | - | High
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://isc.sans.edu/forums/diary/Arkei+Variants+From+Vidar+to+Mars+Stealer/28468/
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -99,7 +99,7 @@ ID | IP address | Hostname | Campaign | Confidence
|
|||
69 | [46.165.248.240](https://vuldb.com/?ip.46.165.248.240) | - | - | High
|
||||
70 | ... | ... | ... | ...
|
||||
|
||||
There are 274 more IOC items available. Please use our online service to access the data.
|
||||
There are 275 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
|
@ -128,19 +128,19 @@ ID | Type | Indicator | Confidence
|
|||
6 | File | `/ajax/networking/get_netcfg.php` | High
|
||||
7 | File | `/apply_noauth.cgi` | High
|
||||
8 | File | `/assets/ctx` | Medium
|
||||
9 | File | `/cgi-bin/user/Config.cgi` | High
|
||||
10 | File | `/cgi-bin/wapopen` | High
|
||||
11 | File | `/cms/print.php` | High
|
||||
12 | File | `/concat?/%2557EB-INF/web.xml` | High
|
||||
13 | File | `/data/remove` | Medium
|
||||
14 | File | `/etc/passwd` | Medium
|
||||
15 | File | `/htdocs/cgibin` | High
|
||||
16 | File | `/login` | Low
|
||||
17 | File | `/navigate/navigate_download.php` | High
|
||||
18 | File | `/owa/auth/logon.aspx` | High
|
||||
19 | File | `/password.html` | High
|
||||
20 | File | `/proc/ioports` | High
|
||||
21 | File | `/property-list/property_view.php` | High
|
||||
9 | File | `/cgi-bin/wapopen` | High
|
||||
10 | File | `/cms/print.php` | High
|
||||
11 | File | `/concat?/%2557EB-INF/web.xml` | High
|
||||
12 | File | `/data/remove` | Medium
|
||||
13 | File | `/etc/passwd` | Medium
|
||||
14 | File | `/htdocs/cgibin` | High
|
||||
15 | File | `/login` | Low
|
||||
16 | File | `/navigate/navigate_download.php` | High
|
||||
17 | File | `/owa/auth/logon.aspx` | High
|
||||
18 | File | `/password.html` | High
|
||||
19 | File | `/proc/ioports` | High
|
||||
20 | File | `/property-list/property_view.php` | High
|
||||
21 | File | `/ptms/classes/Users.php` | High
|
||||
22 | File | `/rest` | Low
|
||||
23 | File | `/rest/api/2/search` | High
|
||||
24 | File | `/s/` | Low
|
||||
|
@ -174,7 +174,7 @@ ID | Type | Indicator | Confidence
|
|||
52 | File | `admin/media/rename.php` | High
|
||||
53 | ... | ... | ...
|
||||
|
||||
There are 465 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 466 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
@ -183,6 +183,7 @@ The following list contains _external sources_ which discuss the actor and the a
|
|||
* https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=09308982-77bd-41e0-8269-f2cc9ce3266e&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
|
||||
* https://github.com/faisalusuf/ThreatIntelligence/blob/main/Patchwork/Tracking-Patchwork-IOCs.csv
|
||||
* https://securelist.com/the-dropping-elephant-actor/75328/
|
||||
* https://twitter.com/souiten/status/1473142851798114312
|
||||
* https://unit42.paloaltonetworks.com/unit42-patchwork-continues-deliver-badnews-indian-subcontinent/
|
||||
* https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/
|
||||
* https://vxug.fakedoma.in/archive/APTs/2021/2021.01.20(1)/Patchwork.pdf
|
||||
|
|
|
@ -0,0 +1,41 @@
|
|||
# Pitty Panda - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Pitty Panda](https://vuldb.com/?actor.pitty_panda). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.pitty_panda](https://vuldb.com/?actor.pitty_panda)
|
||||
|
||||
## Countries
|
||||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Pitty Panda:
|
||||
|
||||
* [US](https://vuldb.com/?country.us)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of Pitty Panda.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [61.145.112.78](https://vuldb.com/?ip.61.145.112.78) | - | - | High
|
||||
2 | [63.251.83.36](https://vuldb.com/?ip.63.251.83.36) | - | - | High
|
||||
3 | [64.74.96.242](https://vuldb.com/?ip.64.74.96.242) | - | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 4 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://ioc.hatenablog.com/entry/2014/07/15/000000
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -0,0 +1,30 @@
|
|||
# PoshC2 - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [PoshC2](https://vuldb.com/?actor.poshc2). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.poshc2](https://vuldb.com/?actor.poshc2)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
These _indicators of compromise_ (IOC) indicate associated network resources which are known to be part of research and attack activities of PoshC2.
|
||||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | [35.202.253.45](https://vuldb.com/?ip.35.202.253.45) | 45.253.202.35.bc.googleusercontent.com | - | Medium
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://www.lac.co.jp/lacwatch/people/20190213_001770.html
|
||||
|
||||
## Literature
|
||||
|
||||
The following _articles_ explain our unique predictive cyber threat intelligence:
|
||||
|
||||
* [VulDB Cyber Threat Intelligence Documentation](https://vuldb.com/?kb.cti)
|
||||
* [Cyber Threat Intelligence - Early Anticipation of Attacks](https://www.scip.ch/en/?labs.20201022)
|
||||
|
||||
## License
|
||||
|
||||
(c) [1997-2022](https://vuldb.com/?kb.changelog) by [vuldb.com](https://vuldb.com/?kb.about). All data on this page is shared under the license [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/). Questions? Check the [FAQ](https://vuldb.com/?kb.faq), read the [documentation](https://vuldb.com/?kb) or [contact us](https://vuldb.com/?contact)!
|
|
@ -51,7 +51,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1068 | CWE-264, CWE-284 | Execution with Unnecessary Privileges | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 8 more TTP items available. Please use our online service to access the data.
|
||||
There are 9 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -61,29 +61,30 @@ ID | Type | Indicator | Confidence
|
|||
-- | ---- | --------- | ----------
|
||||
1 | File | `/.htaccess` | Medium
|
||||
2 | File | `/admin-panel1.php` | High
|
||||
3 | File | `/admin/?page=members/view_member` | High
|
||||
4 | File | `/admin/file-manager/` | High
|
||||
5 | File | `/admin/login.php` | High
|
||||
6 | File | `/admin/news/news_mod.php` | High
|
||||
7 | File | `/admin/page_edit/3` | High
|
||||
8 | File | `/admin/templates/template_manage.php` | High
|
||||
9 | File | `/admin_page/all-files-update-ajax.php` | High
|
||||
10 | File | `/api/servers` | Medium
|
||||
11 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
|
||||
12 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
13 | File | `/cloud_config/router_post/register` | High
|
||||
14 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
15 | File | `/DataPackageTable` | High
|
||||
16 | File | `/download/` | Medium
|
||||
17 | File | `/etc/cobbler` | Medium
|
||||
18 | File | `/etc/passwd` | Medium
|
||||
19 | File | `/goform/SetPptpServerCfg` | High
|
||||
20 | File | `/i/:data/ipa.plist` | High
|
||||
21 | File | `/languages/index.php` | High
|
||||
22 | File | `/mdiy/dict/listExcludeApp` | High
|
||||
23 | ... | ... | ...
|
||||
3 | File | `/admin.php/admin/ulog/index.html` | High
|
||||
4 | File | `/admin.php/admin/vod/data.html` | High
|
||||
5 | File | `/admin/?page=members/view_member` | High
|
||||
6 | File | `/admin/login.php` | High
|
||||
7 | File | `/admin/news/news_mod.php` | High
|
||||
8 | File | `/admin/page_edit/3` | High
|
||||
9 | File | `/admin/templates/template_manage.php` | High
|
||||
10 | File | `/admin_page/all-files-update-ajax.php` | High
|
||||
11 | File | `/api/crontab` | Medium
|
||||
12 | File | `/api/servers` | Medium
|
||||
13 | File | `/aya/module/admin/ust_tab_e.inc.php` | High
|
||||
14 | File | `/cgi-bin/uploadAccessCodePic` | High
|
||||
15 | File | `/cgi-bin/uploadWeiXinPic` | High
|
||||
16 | File | `/cloud_config/router_post/check_reset_pwd_verify_code` | High
|
||||
17 | File | `/cloud_config/router_post/register` | High
|
||||
18 | File | `/cloud_config/router_post/upgrade_info` | High
|
||||
19 | File | `/config/list` | Medium
|
||||
20 | File | `/controller/Index.php` | High
|
||||
21 | File | `/data/sqldata` | High
|
||||
22 | File | `/DataPackageTable` | High
|
||||
23 | File | `/download/` | Medium
|
||||
24 | ... | ... | ...
|
||||
|
||||
There are 194 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 205 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Prowli - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Prowli](https://vuldb.com/?actor.prowli). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Prowli](https://vuldb.com/?actor.prowli). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.prowli](https://vuldb.com/?actor.prowli)
|
||||
|
||||
|
@ -8,7 +8,7 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Prowli:
|
||||
|
||||
* RU
|
||||
* [RU](https://vuldb.com/?country.ru)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -16,11 +16,11 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 185.212.128.154 | free.ptr1.ru | - | High
|
||||
1 | [185.212.128.154](https://vuldb.com/?ip.185.212.128.154) | free.ptr1.ru | - | High
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by Prowli. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Prowli_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
|
|
@ -41,7 +41,7 @@ There are 55 more IOC items available. Please use our online service to access t
|
|||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected ATT&CK techniques used by PsiXBot. This data is unique as it uses our predictive model for actor profiling.
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _PsiXBot_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
|
@ -50,7 +50,7 @@ ID | Technique | Weakness | Description | Confidence
|
|||
3 | T1110.001 | CWE-798 | Improper Restriction of Excessive Authentication Attempts | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 7 more TTP items available. Please use our online service to access the data.
|
||||
There are 6 more TTP items available. Please use our online service to access the data.
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -59,46 +59,46 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `/?Page=Node/OBJ=/System/DeviceFolder/DeviceFolder/DateTime/Action=Submit` | High
|
||||
2 | File | `/bin/boa` | Medium
|
||||
3 | File | `/config/getuser` | High
|
||||
4 | File | `/de/cgi/dfs_guest/` | High
|
||||
5 | File | `/download` | Medium
|
||||
6 | File | `/etc/gsissh/sshd_config` | High
|
||||
7 | File | `/etc/passwd` | Medium
|
||||
8 | File | `/etc/quantum/quantum.conf` | High
|
||||
9 | File | `/etc/shadow` | Medium
|
||||
10 | File | `/forum/away.php` | High
|
||||
11 | File | `/getcfg.php` | Medium
|
||||
12 | File | `/goform/telnet` | High
|
||||
13 | File | `/goform/WanParameterSetting` | High
|
||||
14 | File | `/inc/extensions.php` | High
|
||||
15 | File | `/include/makecvs.php` | High
|
||||
16 | File | `/modules/profile/index.php` | High
|
||||
17 | File | `/modules/tasks/summary.inc.php` | High
|
||||
18 | File | `/payu/icpcheckout/` | High
|
||||
19 | File | `/property-list/property_view.php` | High
|
||||
20 | File | `/public/login.htm` | High
|
||||
21 | File | `/req_password_user.php` | High
|
||||
22 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
|
||||
23 | File | `/resourceNode/resources.jsf` | High
|
||||
24 | File | `/rest/project-templates/1.0/createshared` | High
|
||||
25 | File | `/rom-0` | Low
|
||||
26 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
27 | File | `/trx_addons/v2/get/sc_layout` | High
|
||||
28 | File | `/uncpath/` | Medium
|
||||
29 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
|
||||
30 | File | `/usr/syno/etc/mount.conf` | High
|
||||
31 | File | `/var/log/nginx` | High
|
||||
32 | File | `/var/WEB-GUI/cgi-bin/telnet.cgi` | High
|
||||
33 | File | `/WEB-INF/web.xml` | High
|
||||
34 | File | `/_next` | Low
|
||||
35 | File | `3.6.cpj` | Low
|
||||
36 | File | `404.php` | Low
|
||||
37 | File | `a-b-membres.php` | High
|
||||
38 | File | `ActionsAndOperations` | High
|
||||
39 | File | `adclick.php` | Medium
|
||||
40 | File | `add_2_basket.asp` | High
|
||||
41 | File | `add_vhost.php` | High
|
||||
2 | File | `/admin/news/news_ok.php` | High
|
||||
3 | File | `/bin/boa` | Medium
|
||||
4 | File | `/config/getuser` | High
|
||||
5 | File | `/de/cgi/dfs_guest/` | High
|
||||
6 | File | `/download` | Medium
|
||||
7 | File | `/etc/gsissh/sshd_config` | High
|
||||
8 | File | `/etc/passwd` | Medium
|
||||
9 | File | `/etc/quantum/quantum.conf` | High
|
||||
10 | File | `/etc/shadow` | Medium
|
||||
11 | File | `/forum/away.php` | High
|
||||
12 | File | `/getcfg.php` | Medium
|
||||
13 | File | `/goform/telnet` | High
|
||||
14 | File | `/goform/WanParameterSetting` | High
|
||||
15 | File | `/inc/extensions.php` | High
|
||||
16 | File | `/include/makecvs.php` | High
|
||||
17 | File | `/modules/profile/index.php` | High
|
||||
18 | File | `/modules/tasks/summary.inc.php` | High
|
||||
19 | File | `/payu/icpcheckout/` | High
|
||||
20 | File | `/property-list/property_view.php` | High
|
||||
21 | File | `/public/login.htm` | High
|
||||
22 | File | `/req_password_user.php` | High
|
||||
23 | File | `/resourceNode/jdbcResourceEdit.jsf` | High
|
||||
24 | File | `/resourceNode/resources.jsf` | High
|
||||
25 | File | `/rest/project-templates/1.0/createshared` | High
|
||||
26 | File | `/rom-0` | Low
|
||||
27 | File | `/secure/QueryComponent!Default.jspa` | High
|
||||
28 | File | `/trx_addons/v2/get/sc_layout` | High
|
||||
29 | File | `/uncpath/` | Medium
|
||||
30 | File | `/usr/local/WowzaStreamingEngine/bin/` | High
|
||||
31 | File | `/usr/syno/etc/mount.conf` | High
|
||||
32 | File | `/var/log/nginx` | High
|
||||
33 | File | `/var/WEB-GUI/cgi-bin/telnet.cgi` | High
|
||||
34 | File | `/WEB-INF/web.xml` | High
|
||||
35 | File | `/_next` | Low
|
||||
36 | File | `3.6.cpj` | Low
|
||||
37 | File | `404.php` | Low
|
||||
38 | File | `a-b-membres.php` | High
|
||||
39 | File | `ActionsAndOperations` | High
|
||||
40 | File | `adclick.php` | Medium
|
||||
41 | File | `add_2_basket.asp` | High
|
||||
42 | File | `admin.asp` | Medium
|
||||
43 | File | `admin.aspx` | Medium
|
||||
44 | File | `admin.php` | Medium
|
||||
|
@ -106,15 +106,15 @@ ID | Type | Indicator | Confidence
|
|||
46 | File | `admin/member_details.php` | High
|
||||
47 | File | `admin_chatconfig.php` | High
|
||||
48 | File | `ajaxp.php` | Medium
|
||||
49 | File | `alphabet.php` | Medium
|
||||
50 | File | `article2/comments.inc.php` | High
|
||||
51 | File | `articles/edit.php` | High
|
||||
52 | File | `assp.pl` | Low
|
||||
53 | File | `auth-gss2.c` | Medium
|
||||
54 | File | `authent.php4` | Medium
|
||||
49 | File | `ajax_calls.php` | High
|
||||
50 | File | `alphabet.php` | Medium
|
||||
51 | File | `article2/comments.inc.php` | High
|
||||
52 | File | `articles/edit.php` | High
|
||||
53 | File | `assp.pl` | Low
|
||||
54 | File | `auth-gss2.c` | Medium
|
||||
55 | ... | ... | ...
|
||||
|
||||
There are 479 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
There are 477 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Purple Fox - Cyber Threat Intelligence
|
||||
|
||||
These _indicators_ were collected during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Purple Fox](https://vuldb.com/?actor.purple_fox). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ is able to forecast activities and their characteristics.
|
||||
These _indicators_ were reported, collected, and generated during the [VulDB CTI analysis](https://vuldb.com/?kb.cti) of the actor known as [Purple Fox](https://vuldb.com/?actor.purple_fox). The _activity monitoring_ correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique _predictive model_ uses _big data_ to forecast activities and their characteristics.
|
||||
|
||||
_Live data_ and more _analysis capabilities_ are available at [https://vuldb.com/?actor.purple_fox](https://vuldb.com/?actor.purple_fox)
|
||||
|
||||
|
@ -8,7 +8,8 @@ _Live data_ and more _analysis capabilities_ are available at [https://vuldb.com
|
|||
|
||||
These _countries_ are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Purple Fox:
|
||||
|
||||
* CN
|
||||
* [CN](https://vuldb.com/?country.cn)
|
||||
* [KZ](https://vuldb.com/?country.kz)
|
||||
|
||||
## IOC - Indicator of Compromise
|
||||
|
||||
|
@ -16,8 +17,20 @@ These _indicators of compromise_ (IOC) indicate associated network resources whi
|
|||
|
||||
ID | IP address | Hostname | Campaign | Confidence
|
||||
-- | ---------- | -------- | -------- | ----------
|
||||
1 | 144.48.243.79 | - | - | High
|
||||
2 | 193.164.223.77 | - | - | High
|
||||
1 | [57.167.200.174](https://vuldb.com/?ip.57.167.200.174) | - | - | High
|
||||
2 | [60.174.95.143](https://vuldb.com/?ip.60.174.95.143) | - | - | High
|
||||
3 | [65.113.192.79](https://vuldb.com/?ip.65.113.192.79) | 65-113-192-79.dia.static.qwest.net | - | High
|
||||
4 | ... | ... | ... | ...
|
||||
|
||||
There are 13 more IOC items available. Please use our online service to access the data.
|
||||
|
||||
## TTP - Tactics, Techniques, Procedures
|
||||
|
||||
_Tactics, techniques, and procedures_ (TTP) summarize the suspected MITRE ATT&CK techniques used by _Purple Fox_. This data is unique as it uses our predictive model for actor profiling.
|
||||
|
||||
ID | Technique | Weakness | Description | Confidence
|
||||
-- | --------- | -------- | ----------- | ----------
|
||||
1 | T1059.007 | CWE-79 | Cross Site Scripting | High
|
||||
|
||||
## IOA - Indicator of Attack
|
||||
|
||||
|
@ -25,13 +38,20 @@ These _indicators of attack_ (IOA) list the potential fragments used for technic
|
|||
|
||||
ID | Type | Indicator | Confidence
|
||||
-- | ---- | --------- | ----------
|
||||
1 | File | `web/jquery/uploader/uploadify.php` | High
|
||||
1 | File | `index.php` | Medium
|
||||
2 | File | `web/jquery/uploader/uploadify.php` | High
|
||||
3 | File | `wp-admin/options-general.php` | High
|
||||
4 | ... | ... | ...
|
||||
|
||||
There are 3 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.
|
||||
|
||||
## References
|
||||
|
||||
The following list contains _external sources_ which discuss the actor and the associated activities:
|
||||
|
||||
* https://blogs.blackberry.com/en/2022/01/threat-thursday-purple-fox-rootkit
|
||||
* https://github.com/guardicore/labs_campaigns/tree/master/Purple_Fox
|
||||
* https://www.trendmicro.com/en_us/research/21/l/a-look-into-purple-fox-server-infrastructure.html
|
||||
|
||||
## Literature
|
||||
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue