ShadowHammer Analysis
IOB - Indicator of Behavior (1)
Activities
Campaigns (1)
These are the campaigns that can be associated with the actor:
- ShadowHammer
IOC - Indicator of Compromise (6)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | IP address | Hostname | Actor | Campaigns | Identified | Type | Confidence |
---|---|---|---|---|---|---|---|
1 | 23.236.77.175 | ShadowHammer | ShadowHammer | 12/22/2020 | verified | High | |
2 | 23.236.77.177 | ShadowHammer | ShadowHammer | 12/22/2020 | verified | High | |
3 | XX.XXX.XX.XXX | Xxxxxxxxxxxx | Xxxxxxxxxxxx | 12/22/2020 | verified | High | |
4 | XX.XXX.XX.XXX | xxx-xx-xxx-xx-xxx.xx-xxxxx-x.xxxxxxx.xxxxxxxxx.xxx | Xxxxxxxxxxxx | 03/27/2022 | verified | Medium | |
5 | XXX.XX.XXX.X | Xxxxxxxxxxxx | Xxxxxxxxxxxx | 12/22/2020 | verified | High | |
6 | XXX.XXX.XX.XXX | Xxxxxxxxxxxx | 03/27/2022 | verified | High |
TTP - Tactics, Techniques, Procedures (1)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Vulnerabilities | Access Vector | Type | Confidence |
---|---|---|---|---|---|
1 | T1202 | CWE-77 | Command Shell in Externally Accessible Directory | predictive | High |
References (3)
The following list contains external sources which discuss the actor and the associated activities:
- https://github.com/vuldb/cyber_threat_intelligence/tree/main/actors/ShadowHammer
- xxxxx://xxxxxx.xxx/xxxxxxxx/xxxxxxxx/xxxx/xx/xx/xxxxxxx-xxxxxx-xxxxx-xxxxxx-xxxx-xxxxxxxx-xxxxxxx-xxx-xxxxxx.xxxx
- xxxxx://xxx.xxxxxxxxxxx.xxx/_xxxxxxx/xxxx/xxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxx.xxx#xxxxxx.xxxxxx=xxxxxxxx