MalKamak Analysis

IOB - Indicator of Behavior (27)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en18
zh6
fr2
ja2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows4
Adcon Telemetry A850 Telemetry Gateway Base Statio ...2
Hikvision LocalServiceComponents2
Apache OFBiz2
snapd2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Git Cloning process control7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.07CVE-2024-32004
2Hikvision LocalServiceComponents Messages Remote Code Execution7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.000480.06CVE-2023-28813
3Hikvision LocalServiceComponents Messages buffer overflow8.78.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001340.05CVE-2023-28812
4Apache OFBiz path traversal6.36.0$5k-$25k$0-$5kHighOfficial Fix0.078010.07CVE-2024-32113
5WP Super Cache Plugin Cache Settings wp-cache-config.php code injection6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000970.06CVE-2021-24209
6Microsoft Windows Terminal Services/Citrix Server improper authentication7.37.0$25k-$100k$0-$5kNot DefinedOfficial Fix0.000000.04
7Microsoft Windows Remote Desktop mstlsapi.dll improper authentication6.56.2$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.012700.00CVE-2005-1794
8Apache HTTP Server Inbound Connection request smuggling7.37.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.007530.04CVE-2022-22720
9Apache Dubbo deserialization7.67.6$5k-$25k$5k-$25kNot DefinedNot Defined0.011390.00CVE-2022-39198
10Google Android Layout.java getOffsetForHorizontal input validation4.74.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.002770.03CVE-2018-9452
11Google Android PackageItemInfo.java loadLabel denial of service6.05.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2021-0651
12Wind River VxWorks TCP memory corruption8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.925780.00CVE-2019-12255
13spice-vdagentd File Transfer spice-vdagent-sock allocation of resources5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000560.00CVE-2020-25650
14Foxit Reader/PhantomPDF FXSYS_wcslen null pointer dereference5.95.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001020.00CVE-2019-20829
15Canon MX340/MP495/MX870/MX890/MX920/MG3100/MG5300/MG6100 HTTP Request cgi_lan.cgi input validation7.56.8$0-$5k$0-$5kHighTemporary Fix0.734160.00CVE-2013-4615
16snapd snap-confine tmp link following7.47.2$0-$5k$0-$5kNot DefinedOfficial Fix0.004700.00CVE-2019-11502
17Facebook WhatsApp MP4 File stack-based overflow7.06.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000860.07CVE-2019-11931
18Microsoft Windows File Signature Validation signature verification5.75.2$25k-$100k$5k-$25kProof-of-ConceptOfficial Fix0.001310.00CVE-2020-16922
19Pivotal Spring Framework Read path traversal5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.003010.04CVE-2014-3578
20Watchguard Fireware AD Helper list Password cleartext storage6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.020270.00CVE-2020-10532

Campaigns (1)

These are the campaigns that can be associated with the actor:

  • GhostShell

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
150.116.17.41li601-41.members.linode.comMalKamakGhostShell10/08/2021verifiedMedium
2XXX.XXX.XXX.XXXxxxxxx-xxx.xxxxxxx.xxxxxx.xxxXxxxxxxxXxxxxxxxxx10/08/2021verifiedMedium

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (13)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/domains/listpredictiveHigh
2File/run/spice-vdagentd/spice-vdagent-sockpredictiveHigh
3File/xxxpredictiveLow
4Filexxxxxxx/xxxxx_xxxxx/xxx_xxx.xxxpredictiveHigh
5Filexxxxxx.xxxxpredictiveMedium
6Filexxxxxxxxxxxxxxx.xxxxpredictiveHigh
7Filexxxx.xxxpredictiveMedium
8Filexx-xxxxx-xxxxxx.xxxpredictiveHigh
9Libraryxxxxxxxx.xxxpredictiveMedium
10Argumentxxxxx_xxxxpredictiveMedium
11Argumentxxx_xxxxxxxxxpredictiveHigh
12Argumentxxx_xxxxxpredictiveMedium
13ArgumentxxxxxxxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!