cyber_threat_intelligence/actors/Locky
2023-10-27 13:52:44 +02:00
..
README.md Update October 2023 2023-10-27 13:52:44 +02:00

Locky - Cyber Threat Intelligence

These indicators were reported, collected, and generated during the VulDB CTI analysis of the actor known as Locky. The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, specific activities, expected intentions, emerging research, and ongoing attacks. Our unique predictive model uses big data to forecast activities and their characteristics.

Live data and more analysis capabilities are available at https://vuldb.com/?actor.locky

Countries

These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with Locky:

There are 9 more country items available. Please use our online service to access the data.

IOC - Indicator of Compromise

These indicators of compromise (IOC) indicate associated network resources which are known to be part of research and attack activities of Locky.

ID IP address Hostname Campaign Confidence
1 5.9.253.173 static.173.253.9.5.clients.your-server.de - High
2 5.34.180.135 - - High
3 5.34.183.21 - - High
4 5.34.183.40 medoc.yura - High
5 5.34.183.136 unallocated.layer6.net - High
6 5.34.183.195 unallocated.layer6.net - High
7 5.79.106.152 - - High
8 5.135.76.18 ip18.ip-5-135-76.eu - High
9 5.152.199.70 h5-152-199-70.vds.uapeer.eu - High
10 5.173.164.205 user-5-173-164-205.play-internet.pl - High
11 5.187.0.137 208593.fornex.cloud - High
12 5.187.5.171 dsde677-11781.fornex.org - High
13 5.188.63.23 - - High
14 5.188.63.30 - - High
15 5.196.99.239 buckwild.fr - High
16 5.196.200.229 u229.fogileve.com - High
17 5.196.200.247 - - High
18 13.107.21.200 - - High
19 31.41.44.21 vip-classic.example.com - High
20 31.41.44.45 lecw3.ru - High
21 31.41.44.130 free.cishost.ru - High
22 31.41.47.37 ip.cishost.ru - High
23 31.41.47.41 31.41.47.71 - High
24 31.41.47.50 free.cishost.ru - High
25 31.148.99.188 - - High
26 31.148.99.241 - - High
27 31.184.196.74 murder-selfer.bestvisions.net - High
28 31.184.196.75 - - High
29 31.184.196.78 - - High
30 31.184.197.72 java-signed.blissuser.com - High
31 31.184.197.119 - - High
32 31.184.197.126 blissuser.com - High
33 31.184.233.106 - - High
34 31.202.128.249 31-202-128-249-kh.maxnet.ua - High
35 31.202.130.9 31-202-130-9-kh.maxnet.ua - High
36 31.210.120.156 - - High
37 37.46.131.153 dima1.fvds.ru - High
38 37.139.2.214 showcase.fm - High
39 37.139.27.52 - - High
40 37.139.30.95 - - High
41 37.187.0.40 ns3108067.ip-37-187-0.eu - High
42 37.235.50.29 29.50.235.37.in-addr.arpa - High
43 37.235.53.18 18.53.235.37.in-addr.arpa - High
44 37.235.53.210 210.53.235.37.in-addr.arpa - High
45 45.55.192.133 - - High
46 46.4.239.76 static.76.239.4.46.clients.your-server.de - High
47 46.8.44.39 - - High
48 46.8.45.18 - - High
49 46.17.40.234 castle.uiosdhuy.cn - High
50 46.17.44.153 cower.enakovach.com - High
51 46.38.52.225 free.tel.ru - High
52 46.101.8.169 - - High
53 46.108.39.18 - - High
54 46.148.20.32 sa3.net.ua - High
55 46.148.20.46 ip-46-148-20-46.infiumhost.net - High
56 46.165.253.93 - - High
57 46.183.165.45 - - High
58 50.28.211.199 - - High
59 51.254.19.227 - - High
60 51.254.55.171 - - High
61 51.254.181.120 asiaecampaign.com - High
62 51.254.181.122 mail2.asiaecampaign.com - High
63 51.254.240.45 - - High
64 51.254.240.60 - - High
65 51.254.240.89 - - High
66 51.255.105.2 ip2.ip-51-255-105.eu - High
67 51.255.107.8 - - High
68 51.255.107.10 - - High
69 51.255.107.20 - - High
70 51.255.107.37 ip37.ip-51-255-107.eu - High
71 51.255.172.55 mail.bdubois.io - High
72 54.67.27.43 ec2-54-67-27-43.us-west-1.compute.amazonaws.com - Medium
73 62.84.69.75 FiberLink.69-75.lynx.net.lb - High
74 62.138.11.6 astra5187.startdedicated.de - High
75 64.22.100.95 ez22.ez-web-hosting.com - High
76 64.207.144.148 ip-64-207-144-148.ip.secureserver.net - High
77 66.147.244.210 box710.bluehost.com - High
78 67.23.226.139 super.nseasy.com - High
79 67.199.41.9 - - High
80 ... ... ... ...

There are 315 more IOC items available. Please use our online service to access the data.

TTP - Tactics, Techniques, Procedures

Tactics, techniques, and procedures (TTP) summarize the suspected MITRE ATT&CK techniques used by Locky. This data is unique as it uses our predictive model for actor profiling.

ID Technique Weakness Description Confidence
1 T1006 CWE-21, CWE-22, CWE-23, CWE-24 Pathname Traversal High
2 T1040 CWE-294, CWE-319 Authentication Bypass by Capture-replay High
3 T1055 CWE-74 Injection High
4 T1059 CWE-88, CWE-94, CWE-1321 Cross Site Scripting High
5 T1059.007 CWE-79, CWE-80 Cross Site Scripting High
6 ... ... ... ...

There are 20 more TTP items available. Please use our online service to access the data.

IOA - Indicator of Attack

These indicators of attack (IOA) list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by Locky. This data is unique as it uses our predictive model for actor profiling.

ID Type Indicator Confidence
1 File /?p=products Medium
2 File /admin.php/accessory/filesdel.html High
3 File /admin/?page=user/manage High
4 File /admin/add-new.php High
5 File /admin/doctors.php High
6 File /admin/reminders/manage_reminder.php High
7 File /alphaware/summary.php High
8 File /api/ Low
9 File /api/admin/store/product/list High
10 File /api/baskets/{name} High
11 File /api/stl/actions/search High
12 File /api/v2/cli/commands High
13 File /bin/ate Medium
14 File /boat/login.php High
15 File /booking/show_bookings/ High
16 File /CCMAdmin/serverlist.asp High
17 File /cgi-bin Medium
18 File /cgi-bin/wlogin.cgi High
19 File /cgi/get_param.cgi High
20 File /Content/Template/root/reverse-shell.aspx High
21 File /csms/admin/inquiries/view_details.php High
22 File /cstecgi.cgi Medium
23 File /dashboard/add-blog.php High
24 File /debug/pprof Medium
25 File /env Low
26 File /forms/doLogin High
27 File /forum/away.php High
28 File /group1/uploa High
29 File /include/chart_generator.php High
30 File /librarian/bookdetails.php High
31 File /messageboard/view.php High
32 File /out.php Medium
33 File /php-sms/admin/?page=user/manage_user High
34 File /reservation/add_message.php High
35 File /resources//../ High
36 File /rom-0 Low
37 File /ServletAPI/accounts/login High
38 File /SVFE2/pages/feegroups/country_group.jsf High
39 File /textpattern/index.php High
40 File /upfile.cgi Medium
41 File /user/updatePwd High
42 File /video-sharing-script/watch-video.php High
43 File /wireless/security.asp High
44 File /wordpress/wp-admin/admin.php High
45 File /wp-content/plugins/woocommerce/templates/emails/plain/ High
46 File account_footer.php High
47 File AcquisiAction.class.php High
48 File acs.exe Low
49 ... ... ...

There are 425 more IOA items available (file, library, argument, input value, pattern, network port). Please use our online service to access the data.

References

The following list contains external sources which discuss the actor and the associated activities:

Literature

The following articles explain our unique predictive cyber threat intelligence:

License

(c) 1997-2023 by vuldb.com. All data on this page is shared under the license CC BY-NC-SA 4.0. Questions? Check the FAQ, read the documentation or contact us!