Borat RAT Analysisinfo

IOB - Indicator of Behavior (49)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en30
pl18
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Apple tvOS8
Apple Safari6
Samsung Mobile Devices6
libEMF4
Apple watchOS4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1VMware vCenter Server/Cloud Foundation File permission5.85.7$5k-$25k$0-$5kHighOfficial Fix0.005130.02CVE-2022-22948
2GNU elfutils eu-readelf readelf.c print_string_section buffer overflow5.35.0$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000440.10CVE-2025-1372
3GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption5.04.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000730.05CVE-2025-1352
4Tenda AC500 execCommand formexeCommand stack-based overflow9.18.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.010200.02CVE-2024-3909
5HumHub privileges management7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.002110.05CVE-2017-20028
6Google Android SystemUI access control5.35.1$25k-$100k$0-$5kNot DefinedOfficial Fix0.000460.00CVE-2021-39787
7Apple Safari WebKit memory corruption7.57.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.011870.00CVE-2017-7095
8Apple watchOS SQLite memory corruption8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.006850.00CVE-2017-10989
9Apple tvOS CFNetwork Proxies input validation3.83.6$0-$5k$0-$5kNot DefinedOfficial Fix0.009300.00CVE-2017-7083
10Apple tvOS Kernel memory corruption8.38.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.002130.00CVE-2017-7114
11Apple Safari WebKit memory corruption7.57.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.007810.00CVE-2017-7099
12Apple Safari WebKit memory corruption7.57.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.007810.00CVE-2017-7104
13Apple Safari WebKit memory corruption7.57.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.011870.00CVE-2017-7111
14Apple watchOS libc resource consumption5.95.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.019780.00CVE-2017-1000373
15Apple watchOS SQLite memory corruption8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.021960.00CVE-2017-7129
16Apple watchOS SQLite memory corruption8.38.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.002130.00CVE-2017-7127
17Apple watchOS zlib numeric error8.88.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.003950.00CVE-2016-9842
18Apple tvOS libc resource management6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.030960.00CVE-2017-7086
19Apple tvOS libc resource consumption5.95.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.019780.00CVE-2017-1000373
20Apple tvOS libexpat xml external entity reference7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.010830.00CVE-2017-9233

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
13.22.97.180ec2-3-22-97-180.us-east-2.compute.amazonaws.comBorat RAT12/29/2023verifiedMedium
2X.X.XX.XXxxxx.xxxxxxx.xx.xxXxxxx Xxx07/06/2024verifiedVery High
3XX.XXX.XXX.XXXxxx-xx-xxx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxx Xxx12/29/2023verifiedMedium

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (9)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/goform/execCommandpredictiveHigh
2File/setup/install/setup.phppredictiveHigh
3File/xxxpredictiveLow
4Filexxxxxxx.xxpredictiveMedium
5Filexxxxxxx.xpredictiveMedium
6Libraryxxxxx_xxxxx.xpredictiveHigh
7ArgumentxxxxxxxxpredictiveMedium
8Argumentxxxxxx_xxxpredictiveMedium
9Argumentx/xpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!