Xehook Stealer 解析

IOB - Indicator of Behavior (27)

タイムライン

言語

en20
ru8

国・地域

us26
ru2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

WebGAIS2
PCCS-Linux MySQLDatabase Admin Tool2
Cisco ASA2
Matt Tourtillott nph-maillist2
Matthew Redman Allmanage2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Mozilla Firefox InstallVersion.compareTo クロスサイトスクリプティング6.35.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.049470.00CVE-2005-2260
2MIT Kerberos Key Distribution Center メモリ破損7.36.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.746320.00CVE-2005-1174
3Novell eDirectory Modular Authentication Service 弱い認証5.45.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.00
4Microsoft IIS Frontpage Server Extensions shtml.dll Username 情報の漏洩5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.159580.05CVE-2000-0114
5Apple Mac OS X Temporary Files サービス拒否6.35.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.059530.00CVE-2005-0524
6Aastra 6753i IP Phone Authentication 弱い認証7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.00
7Moreover.com Cached Feed.cgi Script cached_feed.cgi ディレクトリトラバーサル5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.012560.05CVE-2000-0906
8Ranson Johnson MailForm mailform.pl File 情報の漏洩5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.004720.00CVE-2000-0877
9Ranson Johnson Mailto CGI Script mailto.cgi 特権昇格7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.007730.00CVE-2000-0878
10Way Way-Board way-board.cgi File 情報の漏洩5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.015340.00CVE-2001-0214
11eXtropia BPS Forum bbs_forum.cgi ディレクトリトラバーサル5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.015870.00CVE-2001-0123
12Ikonboard register.cgi 特権昇格9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.007730.05CVE-2001-0076
13PCCS-Linux MySQLDatabase Admin Tool dbconnect.inc Password 情報の漏洩7.37.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.006960.02CVE-2000-0707
14Matthew Redman Allmanage File Upload allmanageup.pl 特権昇格7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.012210.00CVE-2000-0435
15Classifieds CGI Form classifieds.cgi 特権昇格9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.054700.00CVE-1999-0935
16Matt Tourtillott nph-maillist nph-maillist.pl 特権昇格7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.012200.00CVE-2001-0400
17Microsoft FrontPage Extensions authors.pwd 情報の漏洩5.35.2$5k-$25k$0-$5kNot DefinedWorkaround0.000000.00
18Leif M. Wright ad.cgi 特権昇格9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.048480.05CVE-2001-0025
19CGI Script Center Auction Weaver auctionweaver.pl ディレクトリトラバーサル5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.005400.00CVE-2000-0811
20CGI Script Center Account Manager amadmin.pl 特権昇格7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.035920.00CVE-2000-0689

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
145.15.156.174Xehook Stealer2024年04月02日verified

TTP - Tactics, Techniques, Procedures (4)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueクラス脆弱性アクセスベクタータイプ信頼度
1T1006CAPEC-126CWE-22Path Traversalpredictive
2TXXXX.XXXCAPEC-209CWE-XX, CWE-XXXxxxx Xxxx Xxxxxxxxxpredictive
3TXXXXCAPEC-122CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxxpredictive
4TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive

IOA - Indicator of Attack (33)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/+CSCOE+/logon.htmlpredictive
2Filead.cgipredictive
3Fileallmanageup.plpredictive
4Fileamadmin.plpredictive
5Filexxxxxxxxxxxxx.xxpredictive
6Filexxxxxxx.xxxpredictive
7Filexxx_xxxxx.xxxpredictive
8Filexxxxxx_xxxx.xxxpredictive
9Filexxxxxxxxxxx.xxxpredictive
10Filexxxxxxxxx.xxxpredictive
11Filexxxxxxx.xxpredictive
12Filexxxxxxx.xxx_predictive
13Filexxxxxxxx.xxxpredictive
14Filexxxxxxxx.xxpredictive
15Filexxxxxx.xxxpredictive
16Filexxx-xxxxxxxx.xxpredictive
17Filexxxxxxxx.xxxpredictive
18Filexxxxxxxx.xxxpredictive
19Filexxxxxxxxxx.xxxpredictive
20Filexxx-xxxxx.xxxpredictive
21Library/_xxx_xxx/xxxxx.xxxpredictive
22Argumentxxxxxxxpredictive
23Argumentxxxxxxxx/xxxxxxpredictive
24Argumentxxpredictive
25Argumentxxxxxpredictive
26Argumentxxxxxxxxpredictive
27Argumentxxxxpredictive
28Argumentxxxxxpredictive
29Argumentxxxxpredictive
30Argumentxxxx_xxxxpredictive
31Argumentxxxxxxxxxpredictive
32Argumentxx-xxxxxx_xxxxpredictive
33Input Value<xxxxxxxx>\xpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!