DoppelDridex 解析

IOB - Indicator of Behavior (35)

タイムライン

言語

en14
fr8
it4
sv2
de2

国・地域

de34
us2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Orion Application Server4
Pramati Server2
rtf2latex2e2
Macromedia JRun2
IBM Rational Collaborative Lifecycle Management2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash 情報の漏洩5.35.2$5k-$25k計算中HighWorkaround0.020160.00CVE-2007-1192
2Drupal File Module Upload クロスサイトスクリプティング4.44.4$0-$5k$0-$5kNot DefinedOfficial Fix0.682300.04CVE-2019-6341
3ClamAV HFS+ Partition Scanning メモリ破損9.89.6$0-$5k$0-$5kNot DefinedOfficial Fix0.002900.04CVE-2023-20032
4HAProxy Header Field 特権昇格8.28.0$0-$5k$0-$5kNot DefinedOfficial Fix0.002070.04CVE-2023-25725
5Frank Mcingvale luxman Libraries メモリ破損9.38.4$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000420.05CVE-2005-0385
6rtf2latex2e reader.c readfonttbl メモリ破損10.010.0$0-$5k$0-$5kNot DefinedNot Defined0.022160.00CVE-2004-1293
7Microsoft Skype Remote Code Execution7.37.0$25k-$100k$0-$5kNot DefinedOfficial Fix0.000000.00
8VMware Zimbra Collection Suite Web Application 弱い認証5.44.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.001570.00CVE-2013-5119
9Apple Mac OS X Installer 特権昇格9.89.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.003090.00CVE-2013-1027
10Juniper Junos Express Path サービス拒否6.86.8$5k-$25k$0-$5kNot DefinedNot Defined0.001050.00CVE-2017-10619
11Orion Application Server Error Page クロスサイトスクリプティング4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.001310.00CVE-2005-2981
12Macromedia JRun web-inf 特権昇格5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.002070.04CVE-2002-1855
13Lars Ellingsen Guestserver guestserver.cgi 特権昇格9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002660.07CVE-2001-0180
14Oracle Application Server web-inf 特権昇格5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.002000.00CVE-2002-1858
15Pramati Server web-inf 特権昇格5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001990.00CVE-2002-1860
16Jo Webserver web-inf 特権昇格5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.006910.00CVE-2002-1857
17Orion Application Server web-inf 特権昇格5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.004890.00CVE-2002-1859
18Oracle WebLogic Server WLS Security 特権昇格9.08.9$25k-$100k$0-$5kHighOfficial Fix0.974260.04CVE-2017-10271
19PHP unserialize メモリ破損7.36.6$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.954810.00CVE-2015-0273
20Microsoft Edge 特権昇格6.46.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001250.00CVE-2019-0764

IOC - Indicator of Compromise (6)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (14)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1Filedata/gbconfiguration.datpredictive
2Filefull-profile.phppredictive
3Fileguestserver.cgipredictive
4Filexxx/xxxxxx.xxxpredictive
5Filexxx_xxxxx_xxxx.xpredictive
6Filexxxxxx.xpredictive
7Filexxx-xxxpredictive
8Argumentxxxxxxxxpredictive
9Argumentxxxxxxxx/xxxxxxxxxxxx/xxxxxxxxxxxx/xxxxxxxxxxpredictive
10Argumentxxxxxpredictive
11Argumentxxpredictive
12Argumentxxxxpredictive
13Argumentxx_xxxx_xxxxxpredictive
14Input Value/../predictive

参考 (3)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!