Necurs 解析

IOB - Indicator of Behavior (41)

タイムライン

言語

en34
it2
de2
fr2
jp2

国・地域

us38
gb2
fr2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Cutephp CuteNews4
GetSimpleCMS2
PHP Arena paBugs2
lshell2
WoltLab Burning Book2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash 情報の漏洩5.35.2$5k-$25k計算中HighWorkaround0.020160.00CVE-2007-1192
2DZCP deV!L`z Clanportal config.php 特権昇格7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.61CVE-2010-0966
3Joomla CMS Login SQLインジェクション9.89.8$5k-$25k$5k-$25kNot DefinedNot Defined0.002010.00CVE-2006-1047
4WPFront Scroll Top Plugin Image クロスサイトスクリプティング3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000580.00CVE-2021-24564
5Francisco Burzi PHP-Nuke Addressbook addressbook.php ディレクトリトラバーサル7.37.1$25k-$100k$0-$5kFunctionalUnavailable0.047410.00CVE-2007-1720
6Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation8.37.3$100k 以上$5k-$25kUnprovenOfficial Fix0.000460.05CVE-2021-31969
7LogicBoard CMS away.php Redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.000003.94
8Maran PHP Shop prod.php SQLインジェクション7.37.3$0-$5k$0-$5kHighUnavailable0.001370.04CVE-2008-4879
9DUware DUpaypal detail.asp SQLインジェクション7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.004210.02CVE-2006-6365
10PHP Arena paBugs MySQL class.mysql.php 特権昇格7.36.8$0-$5k$0-$5kFunctionalUnavailable0.073690.02CVE-2006-5079
11ShopStoreNow E-commerce Shopping Cart orange.asp SQLインジェクション7.37.1$0-$5k$0-$5kHighUnavailable0.008110.00CVE-2007-0142
12Motorola SBG6580 Web Access login サービス拒否7.56.9$0-$5k$0-$5kProof-of-ConceptWorkaround0.000000.00
13Pixelpost 未知の脆弱性7.06.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.010980.02CVE-2010-3305
14Check Point VPN-1 UTM Edge Administrator Account WizU.html 未知の脆弱性8.88.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.013100.00CVE-2007-3489
15Qualcomm Snapdragon Automobile Register 特権昇格5.45.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2017-11004
16WoltLab Burning Book addentry.php SQLインジェクション7.36.8$0-$5k$0-$5kFunctionalUnavailable0.008040.00CVE-2006-5509
17OpenBB read.php SQLインジェクション7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.002480.00CVE-2005-1612
18lshell 特権昇格8.18.1$0-$5k$0-$5kNot DefinedOfficial Fix0.003480.01CVE-2016-6902
19Wesley Destailleur forum todooforum.php クロスサイトスクリプティング4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.001950.00CVE-2013-3538
20GetSimpleCMS index.php Redirect6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.001230.00CVE-2019-9915

IOC - Indicator of Compromise (25)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
140.121.206.97Necurs2021年06月13日verified
262.212.154.98ns1.crossdns.comNecurs2022年04月01日verified
364.47.209.23Necurs2021年06月13日verified
464.63.188.85Necurs2021年06月13日verified
564.231.250.149bas3-toronto12-64-231-250-149.dsl.bell.caNecurs2021年06月13日verified
6XX.XX.XX.XXxxxxxxxx-xxxxxx.xx.xxxXxxxxx2021年06月13日verified
7XX.XXX.XXX.XXXXxxxxx2021年06月13日verified
8XX.X.XX.XXXXxxxxx2021年06月13日verified
9XX.XX.XXX.XXXxxxxxxxx.xxxxxxxxxxxxx.xxxxXxxxxx2022年04月01日verified
10XX.XXX.XXX.XXXxxxxx2021年06月13日verified
11XX.XXX.XX.XXxxxxxxxxxxxxxxxxxxxxxx.xxxXxxxxx2022年04月01日verified
12XX.XXX.XXX.XXxxx-xxxxxxxx.xxx.xxxxxxxxx.xxxXxxxxx2021年06月13日verified
13XX.XX.XXX.XXXxxx-xx-xxx-xxx.xxx.xxxxxxxxxxxx.xxxXxxxxx2021年06月13日verified
14XX.XX.XXX.XXXXxxxxx2021年06月13日verified
15XX.XX.XXX.XXXxxxx-xx-xx-xxx-xxx.xxxxx.xxxx.xxxxxxx.xxxXxxxxx2021年06月13日verified
16XX.XX.XX.XXXxxxx.xxxxxxxxxxxxxx-xxxxx.xx.xx.xxxXxxxxx2021年06月13日verified
17XX.XXX.XX.XXXxx-xxx-xx-xxx.xxx.xxxxx.xxxXxxxxx2022年04月01日verified
18XX.XXX.XX.XXXxxxxx.xxxxxxxxx.xxxXxxxxx2022年04月01日verified
19XX.XXX.XX.XXXxxxxx.xx-xx-xxx-xx.xxXxxxxx2022年04月06日verified
20XX.XXX.XXX.XXxxxxx-xxxxxxxxxxx.xxxXxxxxx2022年04月01日verified
21XX.XXX.XXX.XXXxxxxx-xxxxxxxxxxx.xxxXxxxxx2022年04月08日verified
22XXX.XXX.XX.XXXXxxxxx2022年04月06日verified
23XXX.XXX.XXX.XXxxxxxxxxxx.xxx.xxx-xxxxxx.xxx.xxXxxxxx2022年04月01日verified
24XXX.XXX.XXX.XXXxxxxx2022年04月01日verified
25XXX.XXX.XXX.XXXxxxxx.xx-xxx-xxx-xxx.xxXxxxxx2022年04月06日verified

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueクラス脆弱性アクセスベクタータイプ信頼度
1T1006CAPEC-126CWE-22Path Traversalpredictive
2T1059CAPEC-242CWE-94Argument Injectionpredictive
3TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx Xxxxxxxxxpredictive
4TXXXXCAPEC-19CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxxpredictive
5TXXXX.XXXCAPEC-178CWE-XXXXxxx Xxxxxxxxpredictive
6TXXXXCAPEC-108CWE-XXXxx Xxxxxxxxxpredictive
7TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive

IOA - Indicator of Attack (32)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/forum/away.phppredictive
2File/goform/loginpredictive
3Fileaddentry.phppredictive
4Fileaddressbook.phppredictive
5Filexxxxx/xxxxx.xxxpredictive
6Filexxxxx.xxxxx.xxxpredictive
7Filexxxx/xxxxxxxxxxxxxxx.xxxpredictive
8Filexxxxxx.xxxpredictive
9Filexxxxxx.xxxpredictive
10Filexxx/xxxxxx.xxxpredictive
11Filexxx/xxxx/xxxx_xxxxxxxxxx_xxxx.xpredictive
12Filexxxxxx.xxxpredictive
13Filexxx/xxxx.xxxxpredictive
14Filexxxx.xxxpredictive
15Filexxxx.xxxpredictive
16Filexxxxx.xxxpredictive
17Filexxxxxxxx.xxx/xxxxxx.xxx/xxxxxxxx.xxxpredictive
18Filexxxx_xxxxxxxx.xxxpredictive
19Filexxxxxxxxxx.xxxpredictive
20Argumentxxxxxxxxpredictive
21Argumentxxxpredictive
22Argumentxxxxxpredictive
23Argumentxxxxxxxxpredictive
24Argumentxxpredictive
25Argumentxxxxpredictive
26Argumentxxxxxx_xxxxpredictive
27Argumentxxxx_xx_xx_xxxpredictive
28Argumentxxpredictive
29Argumentxxxxxxxxpredictive
30Argumentxxxxxxxxpredictive
31Argumentxxxpredictive
32Network Portxxx xxxxxx xxxxpredictive

参考 (5)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!