Packrat 解析

IOB - Indicator of Behavior (85)

タイムライン

言語

en60
pt18
es8

国・地域

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Google Android6
Dropbear SSH4
Microsoft Office4
libmspack2
Corega CG-WLR300NX2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Dropbear SSH 特権昇格8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.029110.03CVE-2016-7406
2OpenSSL Non-prime Moduli BN_mod_sqrt サービス拒否6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.013420.00CVE-2022-0778
3VMware ESXi Host Client Stored クロスサイトスクリプティング5.24.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000760.00CVE-2017-4940
4HP Integrated Lights-Out IPMI Protocol 特権昇格8.28.0$5k-$25k$0-$5kHighWorkaround0.271960.09CVE-2013-4786
5Apache HTTP Server mod_reqtimeout サービス拒否5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.016960.05CVE-2007-6750
6Linux Kernel Socket Buffer virtio_bt.c サービス拒否5.75.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.02CVE-2022-26878
7Microsoft Windows LSA 情報の漏洩6.46.0$25k-$100k$5k-$25kHighOfficial Fix0.852870.06CVE-2021-36942
8Dropbear SSH dbclient/server Memory 情報の漏洩4.44.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.01CVE-2016-7409
9Dropbear SSH dropbearconvert 特権昇格8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009560.02CVE-2016-7407
10phpMyAdmin grab_globals.lib.php ディレクトリトラバーサル4.84.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.023340.25CVE-2005-3299
11Ietf MD5 弱い暗号化5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.012240.00CVE-2004-2761
12Sun Solaris Authentication 弱い認証9.89.6$5k-$25k$0-$5kHighWorkaround0.012970.00CVE-1999-0502
13TP-LINK TL-WR840N メモリ破損5.55.3$0-$5k$0-$5kNot DefinedNot Defined0.000920.00CVE-2022-26642
14HP Intelligent Management Center tftpserver.exe 特権昇格10.09.5$25k-$100k$0-$5kNot DefinedOfficial Fix0.057500.00CVE-2011-1853
15Microsoft Windows SMB Processor EducatedScholar サービス拒否7.37.0$5k-$25k$0-$5kHighOfficial Fix0.972660.06CVE-2009-3103
16avahi socket.c サービス拒否5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.075140.00CVE-2011-1002
17OpenSSL EC 情報の漏洩3.13.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.003860.00CVE-2021-4160
18Linux Kernel KVM 特権昇格7.67.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000560.03CVE-2021-3653
19Fortinet FortiMail ディレクトリトラバーサル6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000930.00CVE-2021-24013
20Fortinet FortiMail Identity-Based Encryption Service 弱い暗号化4.03.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000600.00CVE-2021-26099

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (20)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1Fileapi/sms_check.phppredictive
2Fileavahi-core/socket.cpredictive
3Filechmextract.cpredictive
4Filexxxxxxx/xxxxxxxxx/xxxxxx_xx.xpredictive
5Filexxxx_xxxxxxx.xxx.xxxpredictive
6Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictive
7Filexxxxx.xxxpredictive
8Filexxxxxx_xxx.xpredictive
9Filexxxxx-xxx.xpredictive
10Filexxxxxxxxxx.xxxpredictive
11Libraryxxxxxxxx.xxxpredictive
12Argument-xpredictive
13Argumentxxxxpredictive
14Argumentxxx_xxxpredictive
15Argumentxxxxxpredictive
16Argumentxxxxxxxxpredictive
17Argumentxxxxxxxxpredictive
18Argumentxxxxpredictive
19Argumentxxxxxxxx/xxxxpredictive
20Argumentx_xx_xxxxxxxxxxxxxxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!