cyber_threat_intelligence/campaigns/BazarLoader/README.md

8.2 KiB

BazarLoader - Cyber Threat Intelligence

These indicators were reported, collected, and generated during the VulDB CTI analysis of the campaign known as BazarLoader. The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique predictive model uses big data to forecast activities and their characteristics.

Live data and more analysis capabilities are available at https://vuldb.com/?actor

Countries

These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with BazarLoader:

There are 1 more country items available. Please use our online service to access the data.

Actors

These actors are associated with BazarLoader or other actors linked to the campaign.

ID Actor Confidence
1 BazarLoader High
2 Conti High

IOC - Indicator of Compromise

These indicators of compromise (IOC) indicate associated network resources which are known to be part of research and attack activities of BazarLoader.

ID IP address Hostname Actor Confidence
1 3.101.57.185 ec2-3-101-57-185.us-west-1.compute.amazonaws.com BazarLoader Medium
2 13.56.161.214 ec2-13-56-161-214.us-west-1.compute.amazonaws.com Conti Medium
3 13.225.230.232 server-13-225-230-232.jfk51.r.cloudfront.net BazarLoader High
4 13.226.32.216 server-13-226-32-216.ewr53.r.cloudfront.net BazarLoader High
5 18.67.60.164 server-18-67-60-164.iad89.r.cloudfront.net BazarLoader High
6 23.56.10.219 a23-56-10-219.deploy.static.akamaitechnologies.com BazarLoader High
7 23.62.25.178 a23-62-25-178.deploy.static.akamaitechnologies.com BazarLoader High
8 23.82.19.173 - BazarLoader High
9 23.94.51.80 23-94-51-80-host.colocrossing.com BazarLoader High
10 23.95.238.122 23-95-238-122-host.colocrossing.com BazarLoader High
11 23.106.160.77 - BazarLoader High
12 23.106.215.61 - BazarLoader High
13 23.106.223.174 - BazarLoader High
14 23.152.0.22 anahiem.net BazarLoader High
15 23.160.193.217 unknown.ip-xfer.net BazarLoader High
16 23.193.217.119 a23-193-217-119.deploy.static.akamaitechnologies.com BazarLoader High
17 31.14.40.160 perico.cavepanel.com Conti High
18 31.171.251.118 ch.ns.mon0.li BazarLoader High
19 31.214.240.203 - BazarLoader High
20 34.209.40.84 ec2-34-209-40-84.us-west-2.compute.amazonaws.com BazarLoader Medium
21 34.210.71.206 ec2-34-210-71-206.us-west-2.compute.amazonaws.com BazarLoader Medium
22 34.219.130.241 ec2-34-219-130-241.us-west-2.compute.amazonaws.com Conti Medium
23 34.221.188.35 ec2-34-221-188-35.us-west-2.compute.amazonaws.com BazarLoader Medium
24 ... ... ... ...

There are 91 more IOC items available. Please use our online service to access the data.

TTP - Tactics, Techniques, Procedures

Tactics, techniques, and procedures (TTP) summarize the suspected MITRE ATT&CK techniques used within BazarLoader. This data is unique as it uses our predictive model for actor profiling.

ID Technique Weakness Description Confidence
1 T1059.007 CWE-79, CWE-80 Cross Site Scripting High
2 T1068 CWE-264, CWE-284 Execution with Unnecessary Privileges High
3 T1552 CWE-319, CWE-522 Unprotected Storage of Credentials High
4 ... ... ... ...

There are 1 more TTP items available. Please use our online service to access the data.

IOA - Indicator of Attack

These indicators of attack (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration during BazarLoader. This data is unique as it uses our predictive model for actor profiling.

ID Type Indicator Confidence
1 File /api Low
2 File /include/makecvs.php High
3 File /PluXml/core/admin/parametres_edittpl.php High
4 File /usr/local/psa/admin/sbin/wrapper High
5 File add.php Low
6 File admin/admin.shtml High
7 File cat.asp Low
8 File class.phpmailer.php High
9 ... ... ...

There are 66 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.

References

The following list contains external sources which discuss the campaign and the associated activities:

Literature

The following articles explain our unique predictive cyber threat intelligence:

License

(c) 1997-2022 by vuldb.com. All data on this page is shared under the license CC BY-NC-SA 4.0. Questions? Check the FAQ, read the documentation or contact us!