Turla Analysis

IOB - Indicator of Behavior (757)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en726
it10
ru10
de8
fr4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

fr614
us116
at12
ru4
tn2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows32
Google Chrome24
Foxit Reader8
Foxit PhantomPDF8
Microsoft Office8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Atlassian JIRA Server/Data Center Endpoint custom cross site scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00104CVE-2021-43942
2Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.130.02016CVE-2007-1192
3Twilio Authy race condition4.74.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00069CVE-2020-24655
4Hgiga MailSherlock URL Parameter sql injection8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.000.00119CVE-2021-22848
5shescape _Shescape_ argument injection5.95.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00081CVE-2021-21384
6LUCY Security Awareness Software Migration Tool static unrestricted upload8.57.7$0-$5k$0-$5kProof-of-ConceptUnavailable0.000.00965CVE-2021-28132
7Google Android platform.h sound_trigger_event_alloc out-of-bounds write6.56.3$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00042CVE-2021-0464
8Apple iOS/iPadOS WebKit memory corruption6.36.0$100k and more$5k-$25kNot DefinedOfficial Fix0.000.00218CVE-2021-1844
9AfterLogic Aurora/WebMail Pro DAV DAVServer.php pathname traversal7.67.6$0-$5k$0-$5kNot DefinedNot Defined0.040.00208CVE-2021-26293
10Mozilla Firefox/Firefox ESR Private Browsing Persistent information disclosure6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00554CVE-2017-7843
11OpenSSH Authentication Username information disclosure5.34.8$5k-$25k$0-$5kHighOfficial Fix0.400.10737CVE-2016-6210
12jQuery dataType script.js Cross-Domain cross site scripting5.24.9$0-$5k$0-$5kNot DefinedOfficial Fix0.130.00660CVE-2015-9251
13Sony PS4/PS5 exFAT UVFAT_readupcasetable heap-based overflow6.86.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.020.00054CVE-2022-3349
14Microsoft Outlook denial of service5.95.1$5k-$25k$0-$5kUnprovenOfficial Fix0.030.00095CVE-2022-35742
15Securepoint SSL VPN Client Configuration Handling access control5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2021-35523
16VMware Spring Cloud Gateway Actuator Endpoint code injection9.89.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.97494CVE-2022-22947
17Apache Log4j JMSSink deserialization6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00551CVE-2022-23302
18Apache Geode Log File log file4.64.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00126CVE-2021-34797
19Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.170.00568CVE-2017-0055
20OpenWrt DDNS Package detail.lua command injection7.57.5$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00287CVE-2021-28961

Campaigns (3)

These are the campaigns that can be associated with the actor:

IOC - Indicator of Compromise (48)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
15.255.93.228Turla12/23/2020verifiedHigh
245.153.241.162Turla07/29/2022verifiedHigh
362.12.39.117TurlaWaterbug12/21/2020verifiedHigh
462.68.73.57TurlaWaterbug12/21/2020verifiedHigh
562.212.226.118TurlaWaterbug12/21/2020verifiedHigh
666.178.107.140TurlaWhitebear12/21/2020verifiedHigh
770.32.39.219am-smartsales.comTurla12/21/2020verifiedHigh
872.232.222.58HOST.MJSHOSTING.COMTurlaWaterbug12/21/2020verifiedHigh
977.232.99.77Turla12/21/2020verifiedHigh
1079.110.52.218Turla07/29/2022verifiedHigh
11XX.XX.XXX.XXxxxxx.xx-xxxx.xxxXxxxx12/23/2020verifiedHigh
12XX.XX.XXX.XXXXxxxxXxxxxxxx12/21/2020verifiedHigh
13XX.XXX.XX.XXXXxxxx01/01/2021verifiedHigh
14XX.XXX.XX.XXXxx-xxx-xx-xxx.xxxxxx.xxxxxxxxxxx.xxXxxxx12/23/2020verifiedHigh
15XX.XX.XXX.XXXxxxxxx.xx.xx.xxx.xxx.xxxxxxxxx.xxxxxx.xxXxxxxXxxxxxxx12/21/2020verifiedHigh
16XX.XXX.XX.XXxx.xx.xxx.xx.xxxxxx-xxxxxxx.xxxXxxxxXxxxxxxx12/21/2020verifiedHigh
17XX.XXX.XX.XXxx.xx.xxx.xx.xxxxxx-xxxxxxx.xxxXxxxxXxxxxxxx12/21/2020verifiedHigh
18XX.XXX.XXX.XXXXxxxxXxxxxxxx12/21/2020verifiedHigh
19XX.XX.XX.XXxxxxxxx.xxxxxxxxxxxxxx.xxxXxxxxXxxxxxx03/22/2022verifiedHigh
20XX.XX.XXX.XXXxxxxxxxx.xxxxxxxxxxxxx.xxXxxxx12/23/2020verifiedHigh
21XX.XXX.XXX.XXXXxxxxXxxxxxxx12/21/2020verifiedHigh
22XX.XXX.XX.XXXxxxxxxxx.xxxxxxxxxxxx.xxxXxxxx12/23/2020verifiedHigh
23XX.XX.XXX.XXXxxxxx.xxxxxxx.xxXxxxx12/23/2020verifiedHigh
24XX.XXX.XXX.XXXXxxxx12/21/2020verifiedHigh
25XXX.XXX.XXX.XXxx.xxx.xxx.xxx.xx-xxxx.xxxxXxxxx07/29/2022verifiedHigh
26XXX.XX.XX.Xxxxxxx.xxxxxxx.xxxXxxxx12/23/2020verifiedHigh
27XXX.XXX.XX.XXxxxxxxx.xxxXxxxxXxxxxxx03/22/2022verifiedHigh
28XXX.XXX.XXX.XXXXxxxx12/21/2020verifiedHigh
29XXX.XXX.XX.XXXxxxx12/21/2020verifiedHigh
30XXX.XX.XXX.XXXXxxxxXxxxxxxx12/21/2020verifiedHigh
31XXX.XX.XX.XXXxxxxxxxxx.xxxXxxxx12/23/2020verifiedHigh
32XXX.XX.XXX.XXXxxxxXxxxxxxx12/21/2020verifiedHigh
33XXX.XXX.X.XXXxxxx12/22/2020verifiedHigh
34XXX.XXX.X.XXXxxxx12/22/2020verifiedHigh
35XXX.XXX.X.XXXXxxxx12/22/2020verifiedHigh
36XXX.XXX.X.XXXXxxxx12/22/2020verifiedHigh
37XXX.XXX.X.XXXXxxxx12/22/2020verifiedHigh
38XXX.XXX.X.XXXXxxxx12/22/2020verifiedHigh
39XXX.XX.XXX.XXxx-xx-xxx-xx.xxx.xxx.xxXxxxxXxxxxxxx12/21/2020verifiedHigh
40XXX.XXX.XX.XXXxxxx12/21/2020verifiedHigh
41XXX.XXX.XX.XXXxxx-xx.xxxxx.xxxxxxx.xxXxxxxXxxxxxxx12/21/2020verifiedHigh
42XXX.XXX.XXX.XXxxxxxx-xx-xxx-xxx-xxx-xx.xxxxxx.xx-xxxx.xxxXxxxx12/21/2020verifiedHigh
43XXX.X.XX.XXXxxxxXxxxxxxx12/21/2020verifiedHigh
44XXX.X.XX.XXXxxxxXxxxxxxx12/21/2020verifiedHigh
45XXX.XX.XX.XXXxxxxxx-xxx.xx.xx.xxx.xx-xxxx.xxxxXxxxx12/21/2020verifiedHigh
46XXX.XXX.XXX.XXXXxxxxXxxxxxxx12/21/2020verifiedHigh
47XXX.XX.XXX.XXXxxxxxxxxx.xxxxxxxxx.xxxXxxxx12/23/2020verifiedHigh
48XXX.XXX.XX.XXXxxx.xx.xxx.xxx.xxxxxxx.xxxXxxxx12/21/2020verifiedHigh

TTP - Tactics, Techniques, Procedures (24)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-21, CWE-22, CWE-23, CWE-425Pathname TraversalpredictiveHigh
2T1055CWE-74InjectionpredictiveHigh
3T1059CWE-88, CWE-94Cross Site ScriptingpredictiveHigh
4T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
5T1068CWE-250, CWE-264, CWE-269, CWE-274, CWE-284J2EE Misconfiguration: Weak Access Permissions for EJB MethodspredictiveHigh
6TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveHigh
7TXXXXCWE-XX, CWE-XXXxxxxxx XxxxxxxxxpredictiveHigh
8TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveHigh
9TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
10TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
11TXXXXCWE-XXXXxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx XxxxxpredictiveHigh
12TXXXXCWE-XX, CWE-XXXxx XxxxxxxxxpredictiveHigh
13TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveHigh
14TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxx.xxx Xxxxxxxxxxxxxxxx: Xxxxxxxx Xx Xxxxxxxxxxxxx XxxxpredictiveHigh
15TXXXXCWE-XXXXxxxxxxxx Xxxxxxx Xx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
16TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveHigh
17TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxx XxxxpredictiveHigh
18TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
19TXXXX.XXXCWE-XXXXxxxxxxxpredictiveHigh
20TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxxxxxpredictiveHigh
21TXXXX.XXXCWE-XXXxxxxxxxxxxxxpredictiveHigh
22TXXXXCWE-XXXX2xx Xxxxxxxxxxxxxxxx: Xxxx Xxxxxxxxxxxx Xxxxxxx XxxxxxxxxxpredictiveHigh
23TXXXX.XXXCWE-XXXXxx Xxxxxxxxxx XxxxxpredictiveHigh
24TXXXX.XXXCWE-XXXXxxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (178)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File%APPDATA%\Securepoint SSL VPNpredictiveHigh
2File/admin/index2.htmlpredictiveHigh
3File/Api/ASFpredictiveMedium
4File/etc/shadowpredictiveMedium
5File/etc/target/saveconfig.jsonpredictiveHigh
6File/execpredictiveLow
7File/form/index.php?module=getjsonpredictiveHigh
8File/hcms/admin/index.php/language/ajaxpredictiveHigh
9File/jsonrpcpredictiveMedium
10File/pms/admin/crimes/manage_crime.phppredictiveHigh
11File/product.phppredictiveMedium
12File/ram/pckg/advanced-tools/nova/bin/netwatchpredictiveHigh
13File/redpass.cgipredictiveMedium
14File/registerCpepredictiveMedium
15File/rest/collectors/1.0/template/custompredictiveHigh
16File/sitecore/shell/Invoke.aspxpredictiveHigh
17File/system?action=ServiceAdminpredictiveHigh
18File/uncpath/predictiveMedium
19File/UploadspredictiveMedium
20File/User/saveUserpredictiveHigh
21File/webapps/Bb-sites-user-profile-BBLEARN/profile.formpredictiveHigh
22File/xx-xxxxx/xxxxxxxxxxxxx.xxxpredictiveHigh
23Filex.xxx.xxx\xxxx\xxxxxxxx.xxxpredictiveHigh
24Filexxxxxx/xxxxxxxxxxxpredictiveHigh
25Filexxxxx.xxxpredictiveMedium
26Filexxxxx/xxxxxxxxx.xxxpredictiveHigh
27Filexxxxx/xxxxx.xxxpredictiveHigh
28Filexxxxx/xxxxxxx/xxx-xxxxxx-xxxxxxxxx/xxxxxxx/xxxxx-xxxxxx-xxxxxxxxx-xxxx.xxxpredictiveHigh
29Filexxxxx_xxxxxx.xxxpredictiveHigh
30Filexxx_xxxx.xxpredictiveMedium
31Filexxxxxxxxxxxx/xxxx-xxx-xxxx/xxxxxx/xxxxx/xxx/xxxx/xxxxxx.xxxpredictiveHigh
32Filexxxxx_xxxx.xxxpredictiveHigh
33Filexxx.xxxpredictiveLow
34Filex:\xxxxxxxxxxxxx\predictiveHigh
35Filex:\xxxxxxxxxxxx\predictiveHigh
36Filex:\xxxpredictiveLow
37Filex:\xxxxxxxxxx.xxx\predictiveHigh
38Filexxxxxx.xpredictiveMedium
39Filexxxxx/predictiveLow
40Filexxx-xxx/xx.xxxpredictiveHigh
41Filexxxxx/xxxxxxxx-xxxxxxxxx/xxxxxxxxxxxxxxx.xxxxx.xxxpredictiveHigh
42Filexxxxx.xxxpredictiveMedium
43Filexxx.xxxpredictiveLow
44Filexxxxx/xxx_xxxxx.xpredictiveHigh
45Filexxxxxx/xxx.xpredictiveMedium
46Filexxxxxxx.xxxpredictiveMedium
47Filexxxx.xxpredictiveLow
48Filexxxxxxxx_xxxx.xxpredictiveHigh
49FilexxxxxxxpredictiveLow
50Filexxxxxx/xxx.xxxpredictiveHigh
51Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
52Filexxxxxx.xxxpredictiveMedium
53Filexxxxxxxxx.xxxpredictiveHigh
54Filexxxx/xxxxxxx.xpredictiveHigh
55Filexxxxxxxxxxx.xxxpredictiveHigh
56Filexxxxxx.xpredictiveMedium
57Filexxx.xxxpredictiveLow
58Filexxxxxxxxxxxx.xxxpredictiveHigh
59Filexxxxxxxxxxx.xxxpredictiveHigh
60Filexxxxxxx/xxxx/xxxxxxx/xxxxxxx_xxx.xpredictiveHigh
61Filexxxxxxxxxx.xxxpredictiveHigh
62Filexxxxx.xxxpredictiveMedium
63Filexxxxxxx.xxxpredictiveMedium
64Filexxxxxxxx.xpredictiveMedium
65Filexxxxx.xxxpredictiveMedium
66Filexxx/xxxx/xxxx.xpredictiveHigh
67Filexxx/xxxx/xxxx_xxxxxx.xpredictiveHigh
68Filexxxx.xxpredictiveLow
69Filexxxxxxxx.xxxpredictiveMedium
70Filexxx.xxxpredictiveLow
71Filexxxxxxxxx.xxpredictiveMedium
72Filexxx-xxxxx.xpredictiveMedium
73Filexxxx_xxxx.xpredictiveMedium
74Filexxxxxxx/xxxxxxxxx/xxxxxxxxx/xxxxxxxxx/xxx_xxxxxxxxxxxxx.xxxpredictiveHigh
75Filexxxxxxxx/xxxxx-xxxx-xxxxxxx.xxxpredictiveHigh
76Filexxxxx.xxpredictiveMedium
77Filexxxxx.xxxpredictiveMedium
78Filexxxxx_xxxxx.xxxpredictiveHigh
79Filexxxx/xxxxpredictiveMedium
80Filexxxxxxxxx/xxxxxxx/xxxxx.xxxpredictiveHigh
81Filexxxxxx.xpredictiveMedium
82Filexxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
83Filexxxxxxxxxxxxxx.xxxpredictiveHigh
84Filexxxxxxxxxxx/xx_xxxxx.xpredictiveHigh
85Filexxxxxxxxxxx/xx_xxxxxxxxxx.xpredictiveHigh
86Filexxxxxxxxxx/xxx/xxxxxx.xpredictiveHigh
87Filexxxxx.xxxxpredictiveMedium
88Filexxx_xxxxx_xxxxx.xpredictiveHigh
89Filexx_xxxxxx.xpredictiveMedium
90Filexxxxxxxxxxx.xxxpredictiveHigh
91Filexxxxxxxx.xpredictiveMedium
92Filexxxxxxx.xxpredictiveMedium
93Filexxxx.xxxpredictiveMedium
94Filexxxxxxxx/xxxxxx.xpredictiveHigh
95Filexxxxxx/xxxxxx/xxxxxxpredictiveHigh
96Filexxxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
97Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveHigh
98Filexxxxxxxx_xxxx.xxxpredictiveHigh
99Filexxxxxx.xxpredictiveMedium
100Filexxxxxx.xxxx.xxxpredictiveHigh
101Filexxxx-xxxxxxxx.xxxpredictiveHigh
102Filexxxxxxx.xxx.xx.xxxxxxxxxxx.xxxpredictiveHigh
103Filexxxxxxxxx.xxxpredictiveHigh
104Filexxxx-xxxxxxxx.xxxpredictiveHigh
105Filexxxx_xxxxx.xpredictiveMedium
106Filexxxx.xxxxpredictiveMedium
107Filexxxx\xxxxxx_xxxx.xxxpredictiveHigh
108Filexxxx.xxxpredictiveMedium
109Filexxxxx/xxxxx.xxpredictiveHigh
110Filexxxx_xxxxxxx.xxxpredictiveHigh
111Filexxx/xxx-xxxxxxx-xxxx.xxxpredictiveHigh
112Filexxxxxxx/xxxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
113Filexxxxxxx.xxxpredictiveMedium
114Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxpredictiveHigh
115Filexx-xxxxx.xxxpredictiveMedium
116Filexx-xxxxxxxxx.xxxpredictiveHigh
117Libraryxxxxxxxxx.xxxpredictiveHigh
118Libraryxxxxxxxx.xxxpredictiveMedium
119Libraryxxxxxxxxxx.xxxpredictiveHigh
120Libraryxxxxxx.xxxpredictiveMedium
121Libraryxxxxxxxx.xxxpredictiveMedium
122Libraryxxxxx.xxxpredictiveMedium
123ArgumentxxxxxxxxxxpredictiveMedium
124ArgumentxxxpredictiveLow
125Argumentxxx_xxxpredictiveLow
126ArgumentxxxxxxxxxxxpredictiveMedium
127ArgumentxxxxxxxxpredictiveMedium
128Argumentxx_xx_xxxxxxx_xxxxx_xxxxx_xxxxx_xx/xx_xx_xxxxxxx_xxxxx_xxx_xxxx/xx_xx_xxxxxxx_xxxxx_xx_xxx/xxxxxxx_xxxx_xxxx/xx_xx_xxxxxxx_xxxxx_xx_xxxpredictiveHigh
129ArgumentxxxxxxxxxxpredictiveMedium
130ArgumentxxxxpredictiveLow
131ArgumentxxxpredictiveLow
132ArgumentxxxxxxxxxxpredictiveMedium
133ArgumentxxxxxxxxxxxpredictiveMedium
134ArgumentxxxpredictiveLow
135ArgumentxxxxxxxxpredictiveMedium
136ArgumentxxxxpredictiveLow
137ArgumentxxxxpredictiveLow
138ArgumentxxxxxxpredictiveLow
139ArgumentxxxxxxxpredictiveLow
140ArgumentxxxxxxpredictiveLow
141ArgumentxxxxpredictiveLow
142Argumentxxxx_xxxx/xxxxxxx_xxxxxxxxxxxpredictiveHigh
143ArgumentxxpredictiveLow
144Argumentxx_xxx/xx_xxxpredictiveHigh
145Argumentxxxx_xxxxx_xxx_xxxxxxxpredictiveHigh
146ArgumentxxxxxxxxxpredictiveMedium
147Argumentxxxxxxxx_xxxpredictiveMedium
148ArgumentxxpredictiveLow
149Argumentxxxx xxxxpredictiveMedium
150Argumentxxx_xxpredictiveLow
151ArgumentxxxxxxxxpredictiveMedium
152ArgumentxxxxxxxxxxxxpredictiveMedium
153Argumentxxx_xxxxxxx_xxxpredictiveHigh
154Argumentxxx[xxxx_xx]predictiveMedium
155Argumentxxxxxxxxx xxxxxxpredictiveHigh
156Argumentxxxxxxx_xxxxpredictiveMedium
157ArgumentxxxxxxpredictiveLow
158ArgumentxxxxxxpredictiveLow
159ArgumentxxxxxxxxpredictiveMedium
160ArgumentxxxxxxxxpredictiveMedium
161ArgumentxxxxxxxxxxxpredictiveMedium
162Argumentxxxxxxx xxxxpredictiveMedium
163Argumentxx_xxxxxxxpredictiveMedium
164ArgumentxxxxpredictiveLow
165Argumentxxxx_xxxxxpredictiveMedium
166Argumentxxxxx/xxxpredictiveMedium
167Argumentxxxxxxx/xxxxxxxxxxxpredictiveHigh
168ArgumentxxxxxxxxxxxpredictiveMedium
169Argumentxx_xxpredictiveLow
170Argumentxxxxxxxx-xxxxxxxxxx-xxxxxpredictiveHigh
171ArgumentxxxxpredictiveLow
172ArgumentxxxxxxxpredictiveLow
173ArgumentxxxxxxxxpredictiveMedium
174Argumentxxxx_xxxxxx/xxxxx_xxxxxxpredictiveHigh
175Argument_xxxxpredictiveLow
176Argument_xxx_xxxxxxxxxxx_predictiveHigh
177Input Valuexxx_xxxxxxxxpredictiveMedium
178Network Portxxx/xxxx (xx-xxx)predictiveHigh

References (12)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!