Atomic Stealer 解析

IOB - Indicator of Behavior (135)

タイムライン

言語

en92
ru30
de6
it4
fr2

国・地域

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Devilz Clanportal4
Unisoc T6104
Unisoc T6064
Unisoc T7604
Linux Kernel2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1LogicBoard CMS away.php Redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.000002.09
2Indexu suggest_category.php クロスサイトスクリプティング3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000000.13
3DZCP deV!L`z Clanportal browser.php 情報の漏洩5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.027331.01CVE-2007-1167
4DZCP deV!L`z Clanportal config.php 特権昇格7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.49CVE-2010-0966
5Apple Mac OS X Server Wiki Server SQLインジェクション5.34.6$5k-$25k$0-$5kUnprovenOfficial Fix0.003391.18CVE-2015-5911
6PHP Link Directory Administration Page index.html クロスサイトスクリプティング4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.003740.33CVE-2007-0529
7LG SuperSign CMS Service Port 9080 reboot 特権昇格6.46.2$5k-$25k$0-$5kNot DefinedWorkaround0.001150.04CVE-2018-16706
8PHPizabi template.class.php assignuser 情報の漏洩4.34.2$0-$5k$0-$5kHighUnavailable0.005070.05CVE-2008-2018
9Joomla CMS com_easyblog SQLインジェクション6.36.1$5k-$25k$5k-$25kNot DefinedNot Defined0.000000.26
10TikiWiki tiki-register.php 特権昇格7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.010091.41CVE-2006-6168
11Citrix NetScaler ADC/NetScaler Gateway OpenID openid-configuration ns_aaa_oauthrp_send_openid_config CitrixBleed メモリ破損8.38.2$25k-$100k$0-$5kHighOfficial Fix0.968690.00CVE-2023-4966
12YaBB yabb.pl クロスサイトスクリプティング4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.012400.04CVE-2004-2402
13Devilz Clanportal index.php SQLインジェクション7.36.4$0-$5k$0-$5kProof-of-ConceptUnavailable0.007840.00CVE-2006-3347
14PHPGurukul Emergency Ambulance Hiring Portal Manage Ambulance Page manage-ambulance.php 未知の脆弱性4.33.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.06CVE-2024-3089
15Zimbra zm-admin-ajax Form Textbox Field Error XFormItem.js XFormItem.prototype.setError クロスサイトスクリプティング3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.07CVE-2017-20191
16Technicolor TC8715D User Defined Service managed_services_add.asp クロスサイトスクリプティング3.02.9$0-$5k$0-$5kNot DefinedNot Defined0.000430.04CVE-2024-28091
17Zoho ManageEngine Applications Manager FailOverHelperServlet 情報の漏洩5.35.2$0-$5k$0-$5kNot DefinedOfficial Fix0.003850.04CVE-2019-19800
18Netentsec NS-ASG Application Security Gateway listloginfo.php SQLインジェクション6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.06CVE-2024-3041
19SourceCodester Simple Subscription Website manage_plan.php SQLインジェクション6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.06CVE-2024-3015
20SourceCodester Complete File Management System Login Form index.php SQLインジェクション7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.20CVE-2024-1831

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (41)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/admin/manage-ambulance.phppredictive
2File/cgi-bin/system_mgr.cgipredictive
3File/display/mappredictive
4File/forum/away.phppredictive
5File/oauth/idp/.well-known/openid-configurationpredictive
6File/protocol/log/listloginfo.phppredictive
7File/xxx_xxxxxx/xxxxxx/xxxxxxpredictive
8Filexxxxxxxxx.xxxpredictive
9Filexxxxxx.xxxpredictive
10Filexxxxxxx/xxxxxxx/xxxx-xxxxxxx-xx.xpredictive
11Filexxx/xxxxxx.xxxpredictive
12Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictive
13Filexxxxxxx\xxxxxxx\xxxxxxx_xxxxx.xxxpredictive
14Filexxxxx.xxxxpredictive
15Filexxxxx.xxxpredictive
16Filexxxxxxx_xxxxxxxx_xxx.xxxpredictive
17Filexxxxxx_xxxx.xxxpredictive
18Filexxxxx_xxxxxx.xxxpredictive
19Filexxxxxxx_xxxxxxxx.xxxpredictive
20Filexxxxxxxx.xxxxx.xxxpredictive
21Filexxxx-xxxxx.xxxpredictive
22Filexxxx-xxxxxxxx.xxxpredictive
23Filexxxxx/xxxxx.xxxpredictive
24Filexxxxx/xxxxxxxx-xxxxxxxxx.xxxpredictive
25Filexxxxxxx/xx/xxxx/xxx/xxxxxx/xxxxxxxxx.xxpredictive
26Filexxxxxxxxxxxxxxxxxxxx.xxxxpredictive
27Filexxxx.xxpredictive
28Argumentxxxxxpredictive
29Argumentxxxxxxxxpredictive
30Argumentxxxxxpredictive
31Argumentxxxpredictive
32Argumentxxxxx_xxxpredictive
33Argumentxxxxpredictive
34Argumentxxxxxxxxxxxxpredictive
35Argumentxxpredictive
36Argumentxxxxxxxpredictive
37Argumentxxxpredictive
38Argumentxxxxpredictive
39Argumentxxxxxxx_xxxpredictive
40Argumentxxxxxxxxpredictive
41Input Valuexxxxxx%xx+xx+%xxx%xx+%xx+%xxx%xx+--+-predictive

参考 (4)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!