Hermit Analysis

IOB - Indicator of Behavior (56)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en42
ru8
it6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us20
ru20
it12
cn2
kz2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows6
Apache HTTP Server4
Untangle Firewall NG2
Dag.wieers dstat2
Microsoft IIS2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
11C:Enterprise URL Parameter information disclosure5.95.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00150CVE-2021-3131
2Untangle NG Firewall injection6.76.7$0-$5k$0-$5kNot DefinedNot Defined0.040.00177CVE-2019-18647
3Moodle User Profile Field cross site scripting3.53.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00064CVE-2022-45151
4RouterOS DNS Cache Poisoning missing authentication6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.050.00606CVE-2019-3978
5Microsoft Windows Remote Desktop Service BlueKeep input validation9.89.4$100k and more$0-$5kHighOfficial Fix0.040.97549CVE-2019-0708
6Moodle sql injection6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00120CVE-2012-2363
7Hisilicon HI3510 RTSP Stream/Web Portal access control6.46.2$0-$5k$0-$5kNot DefinedWorkaround0.000.00168CVE-2019-10711
8Dag.wieers dstat Local Privilege Escalation5.95.7$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00042CVE-2009-4081
9phpListPro addsite.php privileges management5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.040.06142CVE-2006-1749
10Microsoft Windows Mark of the Web unknown vulnerability5.44.9$25k-$100k$5k-$25kUnprovenOfficial Fix0.030.00237CVE-2022-41091
11Moodle Administration Page sql injection7.27.2$5k-$25k$5k-$25kNot DefinedNot Defined0.050.00076CVE-2022-40315
12PHP mysqli_real_escape_string integer overflow8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.060.00842CVE-2017-9120
13PHP FPM SAPI out-of-bounds write8.07.7$25k-$100k$5k-$25kNot DefinedOfficial Fix0.060.00116CVE-2021-21703
14VMware Spring Cloud Function SpEL Expression code injection9.89.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.050.97538CVE-2022-22963
15Google Chrome WebRTC heap-based overflow6.36.0$25k-$100k$5k-$25kHighOfficial Fix0.090.00426CVE-2022-2294
16Truecrypt/VeraCrypt Symbolic Links Ntdriver.c IsDriveLetterAvailable access control6.55.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.060.00061CVE-2015-7358
17Adobe Acrobat resource management7.36.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.020.36630CVE-2009-1858
18Adobe Photoshop out-of-bounds write7.06.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00482CVE-2022-23205
19Apache HTTP Server mod_rewrite redirect6.76.7$25k-$100k$5k-$25kNot DefinedNot Defined0.040.00138CVE-2020-1927

IOC - Indicator of Compromise (6)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
12.228.150.862-228-150-86.ip192.fastwebnet.itHermit07/30/2022verifiedHigh
22.229.68.1822-229-68-182.ip195.fastwebnet.itHermit07/30/2022verifiedHigh
3XX.XXX.XX.XXXXxxxxx07/30/2022verifiedHigh
4XX.XXX.XX.XXXxxxxx08/04/2022verifiedHigh
5XX.XX.XXX.XXXxx-xx-xxx-xxx.xxxx.xxxxxxxxxx.xxXxxxxx07/30/2022verifiedHigh
6XX.XX.XX.XXxx-xx-xx-xx.xxxxx.xxxxxxxxxx.xxXxxxxx08/04/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (14)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/template.phppredictiveHigh
2File/uncpath/predictiveMedium
3Filexxxxxxx.xxxpredictiveMedium
4Filexxxx_xxxx_xxxxxxxx.xxxpredictiveHigh
5Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
6Filexxxxxx/xxxxxxxx.xpredictiveHigh
7Filexxx_xxxxxxxx.xpredictiveHigh
8Filexxx/xxxxxxx.xxxpredictiveHigh
9ArgumentxxpredictiveLow
10Argumentxxxxx_xxxxpredictiveMedium
11ArgumentxxxxxxxxpredictiveMedium
12ArgumentxxxxxxxxxxpredictiveMedium
13ArgumentxxxxxpredictiveLow
14ArgumentxxxpredictiveLow

References (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!