Astro Locker تحليل

IOB - Indicator of Behavior (45)

التسلسل الزمني

اللغة

en42
ru4

البلد

us20
ru14
ir4

الفاعلين

النشاطات

الاهتمام

التسلسل الزمني

النوع

المجهز

منتج

Microsoft Windows6
Apache HTTP Server4
Linux Kernel4
OpenKM2
Omron CX-One CX-Programmer2

الثغرات

#الثغرةBaseTemp0dayاليومق�معالجةCTIEPSSCVE
1Microsoft Windows Win32k Local Privilege Escalation7.87.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.000.00048CVE-2023-36743
2zoujingli ThinkAdmin Update.php تجاوز الصلاحيات8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.020.01088CVE-2020-23653
3Apache HTTP Server ETag الكشف عن المعلومات5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00161CVE-2003-1418
4Huawei Flybox B660 indexdefault.asp توثيق ضعيف7.36.7$5k-$25kجاري الحسابProof-of-ConceptWorkaround0.050.00000
5OpenKM Community Edition XMLReader Parser XMLTextExtractor.java XML External Entity8.28.1$0-$5k$0-$5kNot DefinedNot Defined0.000.00201CVE-2022-2131
6OpenKM FileUtils.java getFileExtension تجاوز الصلاحيات3.63.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00045CVE-2022-3969
7Linux Kernel smb2ops.c smb2_dump_detail الكشف عن المعلومات6.26.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.030.00042CVE-2023-6610
8Microsoft Windows Local Security Authority Subsystem Service الكشف عن المعلومات5.14.7$25k-$100k$5k-$25kUnprovenOfficial Fix0.030.00048CVE-2023-36428
9Linux Kernel io_uring Subsystem حالة السباق7.57.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.060.00042CVE-2023-1295
10Microsoft Exchange Server Privilege Escalation8.37.6$25k-$100k$5k-$25kUnprovenOfficial Fix0.060.00080CVE-2023-36745
11Microsoft Windows TPM Device Driver Local Privilege Escalation7.87.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.060.00409CVE-2023-29360
12Wazuh Dashboard تجاوز الصلاحيات7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00060CVE-2023-42455
13Microsoft Exchange Server ProxyShell ثغرات غير معروفة9.48.2$25k-$100k$5k-$25kUnprovenOfficial Fix0.020.78222CVE-2021-34523
14Microsoft Exchange Server ProxyShell Remote Code Execution9.58.2$25k-$100k$5k-$25kUnprovenOfficial Fix0.040.97319CVE-2021-34473
15Microsoft Exchange Server Privilege Escalation8.07.3$5k-$25k$5k-$25kUnprovenOfficial Fix0.040.00095CVE-2023-28310
16Linux Kernel تلف الذاكرة7.47.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00042CVE-2023-0461
17Red Hat DataGrid/Infinispan REST Endpoint توثيق ضعيف6.36.3$5k-$25k$5k-$25kNot DefinedNot Defined0.000.00197CVE-2021-31917
18libssh pki_verify_data_signature تجاوز الصلاحيات5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.040.00139CVE-2023-2283
19Microsoft Windows HTTP Protocol Stack Remote Code Execution9.88.9$25k-$100k$5k-$25kUnprovenOfficial Fix0.000.01324CVE-2023-23392
20OpenBSD OpenSSH compat.c تلف الذاكرة7.77.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00958CVE-2023-25136

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDعنوان بروتوكول الإنترنتHostnameممثلحملاتIdentifiedالنوعالثقة
145.134.21.8Astro Locker31/05/2021verifiedعالي
2XX.XX.XXX.XXXxxx.xxx.xx.xx.xxxxxx.xxxxxxxx.xxxXxxxx Xxxxxx31/05/2021verifiedعالي
3XXX.XX.XXX.XXXxxxx Xxxxxx31/05/2021verifiedعالي
4XXX.XX.XXX.XXXxxxx Xxxxxx31/05/2021verifiedعالي

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueالثغراتمتجه الوصولالنوعالثقة
1T1068CWE-284Execution with Unnecessary Privilegespredictiveعالي
2T1078.001CWE-259Use of Hard-coded Passwordpredictiveعالي
3TXXXX.XXXCWE-XXXXxxx-xxxxx Xxxxxxxxxxxpredictiveعالي
4TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxxpredictiveعالي
5TXXXX.XXXCWE-XXXXxxx Xxxxxxxxpredictiveعالي
6TXXXXCWE-XXXxx Xxxxxxxxxpredictiveعالي
7TXXXXCWE-XXXXxxxxxxxxxx Xxxxxxxxxxpredictiveعالي
8TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictiveعالي
9TXXXX.XXXCWE-XXXXxx Xxxxxxxxxx Xxxxxpredictiveعالي

IOA - Indicator of Attack (20)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDالفئةIndicatorالنوعالثقة
1File/htmlcode/html/indexdefault.asppredictiveعالي
2Fileajax_admin_apis.phppredictiveعالي
3Fileajax_php_pecl.phppredictiveعالي
4Filexxx/xxxxx/xxxxxxxxxx/xxx/xxxxxx.xxxpredictiveعالي
5Filexxxxx.xxxpredictiveمتوسط
6Filexxxxxxxx.xxxpredictiveمتوسط
7Filexxxxxx.xpredictiveمتوسط
8Filexx/xxx/xxxxxx/xxxxxxx.xpredictiveعالي
9Filexxx/xxxx/xxxx/xxx/xxxxxx/xxxx/xxxxxxxxx.xxxxpredictiveعالي
10Filexxxxxxxxxxxxxxxx.xxxxpredictiveعالي
11Argumentxxxxxxpredictiveواطئ
12Argumentxxxpredictiveواطئ
13Argumentxxxxxxxx_xxpredictiveمتوسط
14Argumentxxxxpredictiveواطئ
15Argumentxxxxxxx.xxx_xxxxxxxxxxpredictiveعالي
16Argumentxxxxxxxxxxpredictiveمتوسط
17Argumentxxpredictiveواطئ
18Input Valuexxxx:xxxxxxxxpredictiveعالي
19Input Valuexxxxxxxxpredictiveمتوسط
20Network Portxxx/xxxxpredictiveمتوسط

المصادر (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!