X-Files Stealer 解析

IOB - Indicator of Behavior (14)

タイムライン

言語

en12
de2

国・地域

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Linux Kernel2
Grammarly Extension2
Wire2
BD Totalys MultiProcessor2
Open-Xchange OX App Suite2

脆弱性

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
191.92.240.39X-Files Stealer2024年01月19日verified
2XXX.XXX.XX.XXXX-xxxxx Xxxxxxx2022年07月26日verified
3XXX.XXX.XX.XXXX-xxxxx Xxxxxxx2022年08月02日verified

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueクラス脆弱性アクセスベクタータイプ信頼度
1T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath Expressionspredictive
2T1059.007CAPEC-209CWE-79Cross Site Scriptingpredictive
3TXXXXCAPEC-19CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxxpredictive
4TXXXX.XXXCAPEC-191CWE-XXXXxxx-xxxxx Xxxxxxxxxxxpredictive
5TXXXXCAPEC-38CWE-XXXXxxxxxxxx Xxxxxx Xxxxpredictive
6TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive
7TXXXX.XXXCAPEC-CWE-XXXxxxxxxxxxxxxpredictive
8TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxxpredictive

IOA - Indicator of Attack (3)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/fos/admin/ajax.phppredictive
2Filexxxxxxx/xxxxxxxx/xxx/xxxxxxx-xxxxxx.xpredictive
3Filexxxxx_xxxxxxxx.xxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Samples (2)

The following list contains associated samples:

Do you want to use VulDB in your project?

Use the official API to access entries easily!