cyber_threat_intelligence/actors/Equation
2023-06-23 09:10:04 +02:00
..
README.md Update June 2023 2023-06-23 09:10:04 +02:00

Equation - Cyber Threat Intelligence

These indicators were reported, collected, and generated during the VulDB CTI analysis of the actor known as Equation. The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique predictive model uses big data to forecast activities and their characteristics.

Live data and more analysis capabilities are available at https://vuldb.com/?actor.equation

Campaigns

The following campaigns are known and can be associated with Equation:

  • Gauss

Countries

These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Equation:

There are 1 more country items available. Please use our online service to access the data.

IOC - Indicator of Compromise

These indicators of compromise (IOC) indicate associated network resources which are known to be part of research and attack activities of Equation.

ID IP address Hostname Campaign Confidence
1 41.222.35.70 70.35.static.rdns.co.za - High
2 61.0.0.46 - - High
3 61.0.0.71 - - High
4 61.1.64.45 - - High
5 61.1.128.17 - - High
6 61.1.128.71 - - High
7 62.56.174.152 - - High
8 62.76.114.22 - - High
9 62.116.144.147 live.onsite-it.net - High
10 62.116.144.150 onsite.onsite-it.net - High
11 62.116.144.190 acronistest.kuhlma-cloud.de - High
12 62.216.152.67 - - High
13 64.76.82.52 c647682-52.static.impsat.com.co - High
14 66.128.32.67 host-67-32-128-66.rev.itelsa.com.ar - High
15 66.128.32.68 host-68-32-128-66.rev.itelsa.com.ar - High
16 80.77.4.3 - - High
17 80.82.162.118 - - High
18 80.191.2.2 - - High
19 81.31.34.175 81-31-34-175.static.masterinter.net - High
20 81.31.36.174 vl504.sl509s.r1-3.dc1.4d.prg.masterinter.net - High
21 81.31.38.163 81-31-38-163.static.masterinter.net - High
22 81.31.38.166 81-31-38-166.static.masterinter.net - High
23 81.94.47.83 - - High
24 82.192.68.37 - - High
25 84.233.205.99 - - High
26 85.112.1.83 - - High
27 87.255.38.2 - - High
28 88.147.128.28 mail.san.ru - High
29 89.18.177.3 89-18-177-3.reasonnet.com - High
30 109.71.45.115 smtp-out.wisdomgroup.pt Gauss High
31 125.10.31.145 125-10-31-145.rev.home.ne.jp - High
32 129.187.244.204 mailrelay2.rz.fh-muenchen.de - High
33 129.194.41.4 - - High
34 129.194.49.47 - - High
35 129.194.97.8 - - High
36 130.34.115.132 ns2.chem.tohoku.ac.jp - High
37 130.134.115.132 - - High
38 130.237.234.3 milko.stacken.kth.se - High
39 130.237.234.17 ns.stacken.kth.se - High
40 130.237.234.51 - - High
41 130.237.234.53 ns53.stacken.kth.se - High
42 130.237.234.151 mount-kilimanjaro.stacken.kth.se - High
43 131.188.3.200 reserved.rrze.uni-erlangen.de - High
44 132.248.10.2 dns2.unam.mx - High
45 132.248.204.1 dns1.unam.mx - High
46 132.248.253.1 ve53.zc-dist.unam.mx - High
47 133.3.5.2 pfdsun.kuicr.kyoto-u.ac.jp - High
48 133.3.5.20 icrsun.kuicr.kyoto-u.ac.jp - High
49 133.3.5.30 - - High
50 133.3.5.33 sms.uji.kyoto-u.ac.jp - High
51 133.26.135.224 - - High
52 133.31.106.46 ci970000.ci.noda.sut.ac.jp - High
53 133.41.145.11 145-011.eduroam.hiroshima-u.ac.jp - High
54 ... ... ... ...

There are 211 more IOC items available. Please use our online service to access the data.

TTP - Tactics, Techniques, Procedures

Tactics, techniques, and procedures (TTP) summarize the suspected MITRE ATT&CK techniques used by Equation. This data is unique as it uses our predictive model for actor profiling.

ID Technique Weakness Description Confidence
1 T1006 CWE-22 Pathname Traversal High
2 T1055 CWE-74 Injection High
3 T1059 CWE-94 Cross Site Scripting High
4 ... ... ... ...

There are 13 more TTP items available. Please use our online service to access the data.

IOA - Indicator of Attack

These indicators of attack (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Equation. This data is unique as it uses our predictive model for actor profiling.

ID Type Indicator Confidence
1 File .htaccess Medium
2 File /.env Low
3 File /aux Low
4 File /cgi-bin/kerbynet High
5 File /cgi-bin/system_mgr.cgi High
6 File /cgi-bin/upload_vpntar High
7 File /edit-db.php Medium
8 File /EXCU_SHELL Medium
9 ... ... ...

There are 68 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.

References

The following list contains external sources which discuss the actor and the associated activities:

Literature

The following articles explain our unique predictive cyber threat intelligence:

License

(c) 1997-2023 by vuldb.com. All data on this page is shared under the license CC BY-NC-SA 4.0. Questions? Check the FAQ, read the documentation or contact us!