cyber_threat_intelligence/Lokibot
2022-01-27 15:47:14 +01:00
..
README.md Update 2022-01-27 15:47:14 +01:00

LokiBot - Cyber Threat Intelligence

The indicators are related to VulDB CTI analysis of the actor known as LokiBot. The activity monitoring correlates data from social media, forums, chat rooms, and darknet markets. It helps to determine associated actors, activities, intentions, emerging research, and attacks. Our unique predictive model is able to forecast activities and their characteristics.

Live data and more analysis capabilities are available at https://vuldb.com/?actor.lokibot

Countries

These countries are directly (e.g. origin of attacks) or indirectly (e.g. access by proxy) associated with LokiBot:

  • ES
  • US
  • CN
  • ...

There are 12 more country items available. Please use our online service to access the data.

IOC - Indicator of Compromise

These indicators of compromise indicate associated network ressources which are known to be part of research and attack activities of LokiBot.

ID IP address Hostname Confidence
1 15.197.142.173 a4ec4c6ea1c92e2e6.awsglobalaccelerator.com High
2 23.21.173.155 ec2-23-21-173-155.compute-1.amazonaws.com Medium
3 23.21.211.162 ec2-23-21-211-162.compute-1.amazonaws.com Medium
4 23.95.132.48 23-95-132-48-host.colocrossing.com High
5 31.220.52.219 workshop.piguno.com High
6 34.102.136.180 180.136.102.34.bc.googleusercontent.com Medium
7 35.247.234.230 230.234.247.35.bc.googleusercontent.com Medium
8 37.235.1.174 resolver1.freedns.zone.powered.by.virtexxa.com High
9 37.235.1.177 resolver2.freedns.zone.powered.by.virtexxa.com High
10 45.33.83.75 li1029-75.members.linode.com High
11 45.147.229.85 - High
12 50.16.216.118 ec2-50-16-216-118.compute-1.amazonaws.com Medium
13 50.19.92.227 ec2-50-19-92-227.compute-1.amazonaws.com Medium
14 52.60.87.163 ec2-52-60-87-163.ca-central-1.compute.amazonaws.com Medium
15 54.225.78.40 ec2-54-225-78-40.compute-1.amazonaws.com Medium
16 54.225.165.85 ec2-54-225-165-85.compute-1.amazonaws.com Medium
17 54.225.245.108 ec2-54-225-245-108.compute-1.amazonaws.com Medium
18 ... ... ...

There are 68 more IOC items available. Please use our online service to access the data.

TTP - Tactics, Techniques, Procedures

Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used by LokiBot. This data is unique as it uses our predictive model for actor profiling.

ID Technique Description Confidence
1 T1059.007 Cross Site Scripting High
2 T1068 Execution with Unnecessary Privileges High
3 T1110.001 Improper Restriction of Excessive Authentication Attempts High
4 ... ... ...

There are 8 more TTP items available. Please use our online service to access the data.

IOA - Indicator of Attack

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration by LokiBot. This data is unique as it uses our predictive model for actor profiling.

ID Type Indicator Confidence
1 File /.htpasswd Medium
2 File /1/?type=productinfo&S_id=140 High
3 File /academico/aluno/esqueci-minha-senha/ High
4 File /admin/config.php?display=disa&view=form High
5 File /admin/syslog High
6 File /api/blade-log/api/list High
7 File /api/resource/Item?fields High
8 File /aterm_httpif.cgi/negotiate High
9 File /attachments.php High
10 File /category_view.php High
11 File /cgi-bin/wapopen High
12 File /cms?section=manage_settings&action=edit High
13 File /contingency/servlet/ServletFileDownload High
14 File /data/inc/images.php High
15 File /docs/captcha_(number).jpeg High
16 File /etc/keystone/user-project-map.json High
17 File /etc/sysctl.d/10-ptrace.conf High
18 File /forum/ Low
19 File /goform/SystemCommand High
20 File /index.php/admin/admin_manage/add.html High
21 File /index.php/newsletter/subscriber/new/ High
22 File /knowage/restful-services/documentnotes/saveNote High
23 File /magnoliaAuthor/.magnolia/ High
24 File /main.php Medium
25 File /newsDia.php Medium
26 File /objects/getSpiritsFromVideo.php High
27 File /owa/auth/logon.aspx High
28 File /product Medium
29 File /reports-viewScriptReport.view High
30 File /restapi/v1/certificates/FFM-SSLInspect High
31 File /romfile.cfg Medium
32 File /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet High
33 File /system/WCore/WHelper.php High
34 File /tmp Low
35 File /tmp/speedtest_urls.xml High
36 File /uncpath/ Medium
37 File /var/www/xms/cleanzip.sh High
38 File /vendor/phpdocumentor/reflection-docblock/tests/phpDocumentor/Reflection/DocBlock/Tag/LinkTagTeet.php High
39 File /webconsole/APIController High
40 File /webconsole/Controller High
41 File AACExtractor.cpp High
42 File add_comment.php High
43 File admin.htm Medium
44 ... ... ...

There are 384 more IOA items available. Please use our online service to access the data.

References

The following list contains external sources which discuss the actor and the associated activities:

Literature

The following articles explain our unique predictive cyber threat intelligence:

License

(c) 1997-2022 by vuldb.com. All data on this page is shared under the license CC BY-NC-SA 4.0. Questions? Check the FAQ, read the documentation or contact us!