AutoCAD Malware تحليل
IOB - مؤشر السلوك (3)
النشاطات
الاهتمام
الثغرات
These are the vulnerabilities that we have identified as researched, approached, or attacked.
IOC - مؤشر للاختراق (2)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
معرف | عنوان بروتوكول الإنترنت | اسم المضيف | ممثل | حملات | محدد | النوع | الثقة |
---|---|---|---|---|---|---|---|
1 | 98.126.72.138 | 98.126.72.138.krypt.com | AutoCAD Malware | 29/11/2018 | تم التحقق | واطئ | |
2 | XX.XXX.XX.XXX | xx.xxx.xx.xxx.xxxxx.xxx | Xxxxxxx Xxxxxxx | 29/11/2018 | تم التحقق | واطئ |
TTP - تكتيكات وتقنيات وإجراءات (2)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
معرف | تقنية | الفئة | الثغرات | متجه الوصول | النوع | الثقة |
---|---|---|---|---|---|---|
1 | T1059.007 | CAPEC-209 | CWE-79 | Basic Cross Site Scripting | تنبؤي | عالي |
2 | TXXXX | CAPEC-XX | CWE-XXX | Xxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxx | تنبؤي | عالي |
المصادر (2)
The following list contains external sources which discuss the actor and the associated activities: