APT1 Analysisinfo

IOB - Indicator of Behavior (98)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en76
zh20
ko2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Google Android10
Cisco RV3404
Cisco RV340W4
Cisco RV3454
Cisco RV345P4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Micrium uC-HTTP HTTP Request heap-based overflow8.78.7$1k-$2k$1k-$2kNot definedNot defined 0.063150.00CVE-2022-24942
2Sangfor Sundray WLAN Controller SSH Service hard-coded credentials9.89.7$2k-$5k$0-$1kNot definedWorkaround 0.018160.02CVE-2019-9160
3ZZZCMS zzzphp File Upload controller.php unrestricted upload7.47.4$1k-$2k$0-$1kNot definedNot defined 0.002820.03CVE-2019-16720
4Cisco RV340/RV340W/RV345/RV345P SSL VPN input validation8.58.2$10k-$25k$0-$1kNot definedOfficial fix 0.041160.00CVE-2020-3357
5Microsoft Internet Explorer Scripting Engine JScript.dll memory corruption7.17.0$25k-$50k$10k-$25kHighOfficial fixverified0.440270.07CVE-2018-8653
6thttpd WebService information disclosure5.35.0$2k-$5k$0-$1kProof-of-ConceptNot defined 0.000000.00
7D-Link DIR-823G UPnP Service HNAP1 SetUpnpSettings improper authorization7.36.8$10k-$25k$0-$1kProof-of-ConceptWorkaround 0.000910.00CVE-2025-2360
8Icegram Express Email Subscribers Plugin Form Setting cross site scripting3.63.5$0-$1k$0-$1kNot definedOfficial fix 0.000310.04CVE-2024-12566
9Isoca Cedric Email Reader emailreader_execute_on_each_page.inc.php code injection7.36.6$2k-$5k$0-$1kProof-of-ConceptNot defined 0.013920.00CVE-2003-1411
10QOS Logback-core JaninoEventEvaluator expression language injection6.36.0$1k-$2k$0-$1kNot definedOfficial fix 0.001260.25CVE-2024-12798
11QEMU Proxy Backend 9p-proxy.c resource consumption4.94.8$1k-$2k$0-$1kNot definedOfficial fix 0.000710.05CVE-2016-9916
12WP 2FA with Telegram Plugin improper authentication8.07.9$1k-$2k$1k-$2kNot definedNot defined 0.003270.03CVE-2024-9687
13Linux Kernel btrfs ioctl.c create_snapshot use after free7.97.7$10k-$25k$2k-$5kNot definedOfficial fix 0.000390.05CVE-2022-48733
14Qualcomm Snapdragon Auto MBSSID Parser buffer over-read7.57.3$5k-$10k$0-$1kNot definedOfficial fix 0.001250.00CVE-2024-33050
15Nazmul Hasan Rupok AwesomePress Plugin cross site scripting5.04.9$0-$1k$0-$1kNot definedNot defined 0.000360.00CVE-2024-51616
16ZKTeco ZKBio Time Image File photo direct request3.73.6$2k-$5k$0-$1kProof-of-ConceptWorkaround 0.000560.00CVE-2024-11049
17funadmin delfile denial of service6.86.8$0-$1k$0-$1kNot definedNot defined 0.001240.00CVE-2024-48225
18AutomationDirect DirectLogic H2-DM1E session fixiation7.57.4$1k-$2k$0-$1kNot definedNot defined 0.000580.00CVE-2024-45368
19GitLab Community Edition/Enterprise Edition Runner Registration Token information disclosure7.67.5$1k-$2k$0-$1kNot definedOfficial fixpossible0.451130.00CVE-2022-0735
20Senol Sahin GPT3 AI Content Writer Plugin cross site scripting5.15.1$0-$1k$0-$1kNot definedNot defined 0.000500.07CVE-2024-37465

Campaigns (2)

These are the campaigns that can be associated with the actor:

IOC - Indicator of Compromise (75)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
123.236.62.147147.62.236.23.bc.googleusercontent.comAPT106/05/2021verifiedVery Low
227.102.112.179APT1Oceansalt12/11/2020verifiedLow
358.246.0.0APT1Mandiant12/13/2020verifiedVery Low
458.247.0.0APT1Mandiant12/13/2020verifiedVery Low
567.222.16.131host.dnsweb.orgAPT106/05/2021verifiedLow
6100.42.216.230tfs2480.sipnav.inAPT112/11/2020verifiedLow
7101.80.0.0APT1Mandiant02/25/2022verifiedVery Low
8101.81.0.0APT1Mandiant02/25/2022verifiedVery Low
9101.82.0.0APT1Mandiant02/25/2022verifiedVery Low
10101.83.0.0APT1Mandiant02/25/2022verifiedVery Low
11101.84.0.0APT1Mandiant02/25/2022verifiedVery Low
12101.85.0.0APT1Mandiant02/25/2022verifiedVery Low
13101.86.0.0APT1Mandiant02/25/2022verifiedVery Low
14101.87.0.0APT1Mandiant02/25/2022verifiedVery Low
15101.88.0.0APT1Mandiant02/25/2022verifiedVery Low
16XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
17XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
18XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
19XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
20XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
21XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
22XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
23XXX.XX.XXX.XXXXxxx06/05/2021verifiedLow
24XXX.XX.XX.XXXxxx06/05/2021verifiedLow
25XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
26XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
27XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
28XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
29XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
30XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
31XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
32XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
33XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
34XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
35XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
36XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
37XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
38XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
39XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
40XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
41XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
42XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
43XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
44XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
45XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
46XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
47XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
48XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
49XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
50XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
51XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
52XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
53XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
54XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
55XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
56XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
57XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
58XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
59XXX.XXX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
60XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
61XXX.XX.XXX.XXxxxx.xx-xxx-xx-xxx.xxxXxxxXxxxxxxxx12/11/2020verifiedLow
62XXX.XX.XXX.XXxx-xxx-xx-xxx-xx.xxxx.xxxxxxxxx.xxxXxxxXxxxxxxxx12/11/2020verifiedLow
63XXX.XXX.XXX.XXXXxxxXxxxxxxxx12/11/2020verifiedLow
64XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx02/25/2022verifiedVery Low
65XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx02/25/2022verifiedVery Low
66XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
67XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx02/25/2022verifiedVery Low
68XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
69XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
70XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx02/25/2022verifiedVery Low
71XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx02/25/2022verifiedVery Low
72XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
73XXX.XX.X.XXxxxXxxxxxxx02/25/2022verifiedVery Low
74XXX.XXX.X.XXxxxXxxxxxxx12/13/2020verifiedVery Low
75XXX.XXX.X.XXxxxXxxxxxxx12/13/2020verifiedVery Low

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (47)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/api/uploadpredictiveMedium
2File/auth_files/photo/predictiveHigh
3File/curd/index/delfilepredictiveHigh
4File/HNAP1/predictiveLow
5File/php/ping.phppredictiveHigh
6File/public/plugins/predictiveHigh
7File/xxxxxxxx/predictiveMedium
8Filexxx/xxxxxxxxxx_xxxx_xxxxxx.xxxpredictiveHigh
9Filexxxxx/xxxxxxx/xxxxxxxxxxpredictiveHigh
10Filexxxxxxx.xpredictiveMedium
11Filexxx_xxxxxx.xpredictiveMedium
12Filexxxxxxxxxxx_xxxxxxx_xx_xxxx_xxxx.xxx.xxxpredictiveHigh
13Filexxx.xpredictiveLow
14Filexx/xxxx/xx-xxxxx.xpredictiveHigh
15Filexxxx.xxxpredictiveMedium
16Filexxxxxx_xxxxxxx.xpredictiveHigh
17Filexxxxx.xpredictiveLow
18Filexxxxx_xx.xxxxpredictiveHigh
19Filexxx_xxxxx_xxx.xxxpredictiveHigh
20Filexxxxxxx.xxxpredictiveMedium
21Filexxx_xxxxx.xxxpredictiveHigh
22Filexxxxxxx/xxxxxxx/xxx/xxxxxxxxxx.xxx?xxxxxxxx=xxxx&xxxxxx=xxxxxxxxxxpredictiveHigh
23Filexxxx/xxxxxx.xxxpredictiveHigh
24Filexxx.xpredictiveLow
25Filexxxxxxx.xxxpredictiveMedium
26Filexxxx_xxxxxxx.xpredictiveHigh
27Filexxxxxxx/xxxxxxx/xxxxxx/xxxxxx_xxxxxx_xxxx.xxxpredictiveHigh
28Filexxxxxxxxxxx.xxxxpredictiveHigh
29Filexx-xxxxxxxx/xxxxx.xxxpredictiveHigh
30Filexx/xxxxxx.xxxpredictiveHigh
31Library/xxx/xxx/xxx/xxxx/xxxxxxxxxx/xxxxx/xxxxxxxxxx.xxxpredictiveHigh
32Libraryxxxxxxx.xxxpredictiveMedium
33Argumentxxxxx_xxpredictiveMedium
34ArgumentxxxxxxxxxxxpredictiveMedium
35Argumentxxxxxxxxxxx_xxxpredictiveHigh
36Argumentxx_x~xxpredictiveLow
37ArgumentxxxxxpredictiveLow
38Argumentxxxxxxxx[xx]predictiveMedium
39Argumentxxxxx_xxxxpredictiveMedium
40ArgumentxxxxxxxxpredictiveMedium
41ArgumentxxxxxxxxpredictiveMedium
42ArgumentxxxxxxxxxxpredictiveMedium
43ArgumentxxxxpredictiveLow
44Input Valuexxxx.xxx::$xxxxpredictiveHigh
45Input Valuexxxxxxx -xxxpredictiveMedium
46Network Portxxx/xxxxpredictiveMedium
47Network Portxxx/xxxxxpredictiveMedium

References (5)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!