DNSLock تحليل
IOB - Indicator of Behavior (11)
النشاطات
الاهتمام
الثغرات
IOC - Indicator of Compromise (6)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | عنوان بروتوكول الإنترنت | Hostname | ممثل | حملات | Identified | النوع | الثقة |
---|---|---|---|---|---|---|---|
1 | 18.220.249.233 | ec2-18-220-249-233.us-east-2.compute.amazonaws.com | DNSLock | 08/04/2022 | verified | متوسط | |
2 | 52.77.199.193 | ec2-52-77-199-193.ap-southeast-1.compute.amazonaws.com | DNSLock | 08/04/2022 | verified | متوسط | |
3 | XX.XXX.XXX.XX | xxx-xx-xxx-xxx-xx.xxxxxxx-x.xxxxxxxxx.xxx | Xxxxxxx | 08/04/2022 | verified | متوسط | |
4 | XX.XXX.XXX.XXX | xxx-xx-xxx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxx | Xxxxxxx | 08/04/2022 | verified | متوسط | |
5 | XX.XXX.XX.XX | Xxxxxxx | 08/04/2022 | verified | عالي | ||
6 | XX.XXX.XXX.XXX | Xxxxxxx | 08/04/2022 | verified | عالي |
TTP - Tactics, Techniques, Procedures (3)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | الثغرات | متجه الوصول | النوع | الثقة |
---|---|---|---|---|---|
1 | T1059.007 | CWE-79 | Cross Site Scripting | predictive | عالي |
2 | TXXXX | CWE-XXX | Xxxxxxxxxxx Xxxxxxxxxx | predictive | عالي |
3 | TXXXX | CWE-XXX | Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx | predictive | عالي |
المصادر (2)
The following list contains external sources which discuss the actor and the associated activities: