OldGremlin 解析

IOB - Indicator of Behavior (221)

タイムライン

言語

en196
zh14
ru4
fr4
es2

国・地域

us98
cn50
at10
ru8
de2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Microsoft Exchange Server6
Microsoft Windows6
cPanel4
nginx4
Liferay Portal4

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Atmail Remote Code Execution9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002510.04CVE-2013-5033
2Arduino LED 特権昇格5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.001090.00CVE-2019-13991
3Palo Alto PAN-OS GlobalProtect Clientless VPN メモリ破損8.88.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001120.03CVE-2021-3056
4Microsoft IIS IP/Domain Restriction 特権昇格6.55.7$25k-$100k$0-$5kUnprovenOfficial Fix0.008170.27CVE-2014-4078
5WordPress SQLインジェクション6.86.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.004670.08CVE-2022-21664
6VeronaLabs wp-statistics Plugin API Endpoint Blind SQLインジェクション8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002500.00CVE-2019-13275
7Mikrotik RouterOS SNMP 情報の漏洩8.07.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.003070.08CVE-2022-45315
8Linksys WRT54GL Web Management Interface SysInfo1.htm 情報の漏洩4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.000460.04CVE-2024-1406
9RoundCube Webmail Email Message rcube_string_replacer.php linkref_addindex クロスサイトスクリプティング3.53.4$0-$5k$0-$5kHighOfficial Fix0.006120.00CVE-2020-35730
10Teclib GLPI unlock_tasks.php SQLインジェクション8.58.5$0-$5k$0-$5kNot DefinedOfficial Fix0.121490.04CVE-2019-10232
11Sophos Firewall User Portal/Webadmin 弱い認証8.58.5$0-$5k$0-$5kHighNot Defined0.974340.00CVE-2022-1040
12nginx 特権昇格6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002411.92CVE-2020-12440
13CutePHP CuteNews 特権昇格7.56.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.021070.08CVE-2019-11447
14WordPress Object 特権昇格5.35.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.004320.04CVE-2022-21663
15Microsoft Windows Active Directory Domain Services Privilege Escalation8.88.3$25k-$100k$0-$5kHighOfficial Fix0.070840.05CVE-2022-26923
16QNAP QTS Media Library 特権昇格8.58.2$0-$5k$0-$5kHighOfficial Fix0.015750.03CVE-2017-13067
17Peplink Balance Cookie admin.cgi SQLインジェクション8.57.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.014570.02CVE-2017-8835
18Cisco Internet of Things Field Network Director Web-based User Interface XML External Entity5.45.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.001500.03CVE-2019-1698
19Mycroft AI WebSocket Server 特権昇格7.77.7$5k-$25k$5k-$25kNot DefinedNot Defined0.002400.00CVE-2018-1000621
20Simple and Beautiful Shopping Cart System uploadera.php 特権昇格7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001700.04CVE-2023-1558

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (18)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (101)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/api/RecordingList/DownloadRecord?file=predictive
2File/apply.cgipredictive
3File/php/ping.phppredictive
4File/rapi/read_urlpredictive
5File/scripts/unlock_tasks.phppredictive
6File/SysInfo1.htmpredictive
7File/sysinfo_json.cgipredictive
8File/system/user/modules/mod_users/controller.phppredictive
9File/uncpath/predictive
10File/wp-admin/admin-post.php?es_skip=1&option_namepredictive
11FileAppCompatCache.exepredictive
12Filexxxxxxx/xxxx.xxxpredictive
13Filexxxxxxxx.xxxpredictive
14Filexxx-xxx/xxxxxxx.xxpredictive
15Filexxx-xxx/xxxxx/xxxxx.xxxpredictive
16Filexxxxxx/xxx.xpredictive
17Filexxxxxxxx_xxxxxxxxxxxxxxxxx.xxxpredictive
18Filexxxxxxxxx.xxx.xxxpredictive
19Filexxxxx/xxxxx.xxxpredictive
20Filexxxx_xxxxx.xxxpredictive
21Filexxxxx.xxxpredictive
22Filexxxxxx.xxxpredictive
23Filexxxxxxx/xxxx-xxxxx-xxxxxx.xxxpredictive
24Filexxxxxxx/xxxx-xxxxx-xxxxxx.xxx?xxxxxx=xpredictive
25Filexx/xx-xx.xpredictive
26Filexxx/xxxx_xxxx.xpredictive
27Filexxxxxx/xxxxxxxxxxxpredictive
28Filexxxx_xxxxxx.xpredictive
29Filexxxx/xxxxxxx.xpredictive
30Filexxxxxxxx/xxxxx-xxxxxx-xxxx-xxxxxxx.xxxpredictive
31Filexxxxxxxx/xxxxxxxx/xxxxx-xxxxxxxx-xxxxx.xxxpredictive
32Filexxxxx.xxx?xxx=xxxx&xxx=xxxxxxxxpredictive
33Filexxxxxxxxxx.xxxpredictive
34Filexxxxxxx_xxxxxxx/xxxx.xxxpredictive
35Filexxxxx.xxxpredictive
36Filexxxx/xxxxxxxxx/xxxxxx/xxxxxxxxxxxxxxxxxxxxx.xxxpredictive
37Filexxx/xxx.xxxpredictive
38Filexxxxxx.xpredictive
39Filexxxx.xxxpredictive
40Filexxxxx.xxxpredictive
41Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]predictive
42Filexxxxx_xxxxxx_xxxxxxxx.xxxpredictive
43Filexxxxxxxx.xxxpredictive
44Filexxxxxxx/xxxxxxxxxxpredictive
45Filexxxxxxx-xxxxxxxxxx/xxx/xxxxx.xxxpredictive
46Filexxxx.xxxpredictive
47Filexxxxx/xxxxx.xxxpredictive
48Filexxxxxxxx.xxxpredictive
49Filexxxxxxxxx.xxxpredictive
50Filexxxxxxxxx.xxxpredictive
51Filexxxx.xxxpredictive
52Filexxxxxxxxxxpredictive
53Filexxxxxxx/xxxxx.xxxpredictive
54Filexx-xxxxx/xxxxx-xxxx.xxxpredictive
55Argumentxxxxxxpredictive
56Argumentxxxxxxx_xxxxpredictive
57Argumentxxxxxx_xxxxpredictive
58Argumentxxxxxpredictive
59Argumentxxxpredictive
60Argumentxxxxxxxxpredictive
61Argumentxxxxxxpredictive
62Argumentxxxxxxxxxxxxxxxxxpredictive
63Argumentxxxxxpredictive
64Argumentxxxxxxxxxxx/xxxxxxxx/xxx/xxxxxpredictive
65Argumentxxxxxx_xxpredictive
66Argumentxxxxxpredictive
67Argumentxxxxxxpredictive
68Argumentxxxxxxxxxxxxpredictive
69Argumentxxxxxxpredictive
70Argumentxx_xxxx [xx][x]/xx_xxxx [xx][x]/xx_xxxx [xx][x]/xx_xxxx [xx][x]/xxxxxpredictive
71Argumentxxxxpredictive
72Argumentxxxxpredictive
73Argumentxxpredictive
74Argumentxxxxxxxxxpredictive
75Argumentxxxxxxxx[xx]predictive
76Argumentxxxxxxxpredictive
77Argumentxxx_xxxxpredictive
78Argumentxxxxx_xxpredictive
79Argumentxxxxxxxxpredictive
80Argumentx_x_xpredictive
81Argumentxxxxxxx/xxxxxpredictive
82Argumentxxxxxx_xxxpredictive
83Argumentxxxxxxpredictive
84Argumentxxxx_xxpredictive
85Argumentxxxxxxxx_xxxxxxxxpredictive
86Argumentxxxxxxxxxxxxxxxxxxxxxpredictive
87Argumentxxxx_xxpredictive
88Argumentxxxpredictive
89Argumentxxxxpredictive
90Argumentxxxxxxxxpredictive
91Argumentxxxx/xx/xxxx/xxxpredictive
92Argumentxxxxxxxxpredictive
93Input Value.%xx.../.%xx.../predictive
94Input Value../../../../../xxx/xxx/xxxxx/xxxx/xxxxxxxx/xxxxx/xxx.xxxpredictive
95Input Valuexxxxxxx -xxxpredictive
96Input Valuexxxxxxxxxxpredictive
97Network Portxxxxpredictive
98Network Portxxxxpredictive
99Network Portxxxx xxxxpredictive
100Network Portxxx/xxxpredictive
101Network Portxxx/xxxxpredictive

参考 (3)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!