Earth Kitsune Analysisinfo

IOB - Indicator of Behavior (19)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en20

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Pivotal Spring Framework2
TRENDnet IP Camera2
vBulletin2
AjaxPro2
Microsoft Windows2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1SourceCodester Canteen Management System POST Request ajax_invoice.php query sql injection6.66.5$0-$5k$0-$5kProof-of-ConceptNot defined 0.000380.04CVE-2022-4222
2RARLabs WinRAR ZIP Archive data authenticity7.37.2$0-$5k$0-$5kHighOfficial fixverified0.935620.00CVE-2023-38831
3AjaxPro .NET Class deserialization7.87.8$0-$5kCalculatingNot definedOfficial fixexpected0.877760.03CVE-2021-23758
4Microsoft SQL Server privilege escalation7.56.8$25k-$100k$0-$5kUnprovenOfficial fix 0.004830.08CVE-2022-29143
5Microsoft Windows ReFS Local Privilege Escalation7.87.1$25k-$100k$5k-$25kUnprovenOfficial fix 0.001830.08CVE-2023-23418
6Microsoft Windows Kernel Local Privilege Escalation7.87.1$25k-$100k$5k-$25kUnprovenOfficial fix 0.003000.02CVE-2023-23423
7Microsoft Windows Kernel privilege escalation9.28.4$25k-$100k$5k-$25kUnprovenOfficial fix 0.001000.00CVE-2022-29133
8Craft CMS Seomatic injection6.46.3$0-$5kCalculatingNot definedOfficial fixexpected0.938050.03CVE-2020-9757
9Vignette Content Management HTML Source Code 00.html Password credentials management7.57.5$0-$5kCalculatingNot definedUnavailable 0.009270.00CVE-2018-18941
10Microsoft Windows Remote Desktop Client Remote Code Execution8.07.3$25k-$100k$5k-$25kUnprovenOfficial fix 0.127650.00CVE-2022-23285
11TRENDnet IP Camera Authentication mjpg.cgi improper authentication7.36.7$0-$5k$0-$5kProof-of-ConceptWorkaround 0.000000.05
12vBulletin redirector.php6.66.6$0-$5kCalculatingNot definedNot defined 0.055600.02CVE-2018-6200
13MGB OpenSource Guestbook email.php sql injection7.37.3$0-$5k$0-$5kHighUnavailablepossible0.015800.07CVE-2007-0354
14Openads adclick.php Remote Code Execution7.36.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.006750.07CVE-2007-2046
15Oracle Java SE JNDI access control8.38.2$25k-$100k$0-$5kNot definedOfficial fix 0.001960.00CVE-2018-3149
16Pivotal Spring Framework ResourceServlet path traversal7.06.8$0-$5kCalculatingNot definedOfficial fix 0.054310.00CVE-2016-9878

Campaigns (1)

These are the campaigns that can be associated with the actor:

  • WhiskerSpy

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
145.76.62.19845.76.62.198.vultrusercontent.comEarth KitsuneWhiskerSpy02/22/2023verifiedLow
2XXX.XX.XXX.XXXxxx-xxx-xx-xxx.xxxxxxx-xxxXxxxx XxxxxxxXxxxxxxxxx02/22/2023verifiedMedium

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-126CWE-22Path TraversalpredictiveHigh
2T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveHigh
3TXXXXCAPEC-XXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
4TXXXX.XXXCAPEC-XXXCWE-XXXXxxx XxxxxxxxpredictiveHigh
5TXXXXCAPEC-XXXCWE-XXXxx XxxxxxxxxpredictiveHigh
6TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (11)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/anony/mjpg.cgipredictiveHigh
2Fileadclick.phppredictiveMedium
3Filexxxx_xxxxxxx.xxxpredictiveHigh
4Filexxxxx.xxxpredictiveMedium
5Filexxxxxxxxxx.xxxpredictiveHigh
6Filexxx/xxx/xxxx/xxxx/xxxx/xxxx/x/xxxx/x/xx.xxxx?xxx=xxxxxpredictiveHigh
7ArgumentxxxxpredictiveLow
8ArgumentxxpredictiveLow
9ArgumentxxxxxxpredictiveLow
10ArgumentxxxpredictiveLow
11Network Portxxx xxxxxx xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!