DNSLock تحليل

IOB - Indicator of Behavior (11)

التسلسل الزمني

اللغة

fr12

البلد

us12

الفاعلين

النشاطات

الاهتمام

التسلسل الزمني

النوع

المجهز

منتج

SAP 3D Visual Enterprise Viewer6
Foxit PhantomPDF2
Netgear R61202
Netgear R60802
Netgear R62602

الثغرات

#الثغرةBaseTemp0dayاليومق�معالجةEPSSCTICVE
1foreman-debug Log File Password تجاوز الصلاحيات5.95.9$0-$5k$0-$5kNot DefinedOfficial Fix0.002260.03CVE-2016-9593
2Netgear R6120/R6080/R6260/R6220/R6020/JNR3210/WNR2020 mini_httpd Service توثيق ضعيف5.45.4$5k-$25k$5k-$25kNot DefinedNot Defined0.002070.00CVE-2020-17409
3Foxit PhantomPDF U3D Object الكشف عن المعلومات3.83.8$0-$5k$0-$5kNot DefinedNot Defined0.001190.00CVE-2020-17411
4Foxit PhantomPDF U3D Object الكشف عن المعلومات6.06.0$0-$5k$0-$5kNot DefinedNot Defined0.003040.00CVE-2020-17412
5SAP Business Planning and Consolidation سكربتات مشتركة4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000540.00CVE-2020-6368
6SAP NetWeaver Application Server ABAP الكشف عن المعلومات4.34.3$5k-$25k$0-$5kNot DefinedNot Defined0.000540.00CVE-2020-6371
7SAP 3D Visual Enterprise Viewer PDF File الحرمان من الخدمة6.06.0$5k-$25k$5k-$25kNot DefinedNot Defined0.000810.00CVE-2020-6372
8SAP 3D Visual Enterprise Viewer PDF File الحرمان من الخدمة6.06.0$5k-$25k$5k-$25kNot DefinedNot Defined0.000810.00CVE-2020-6373
9SAP 3D Visual Enterprise Viewer JT File الحرمان من الخدمة6.06.0$5k-$25k$5k-$25kNot DefinedNot Defined0.000810.00CVE-2020-6374
10SAP 3D Visual Enterprise Viewer CGM File الحرمان من الخدمة4.94.9$5k-$25k$5k-$25kNot DefinedNot Defined0.000610.00CVE-2020-6375
11SAP 3D Visual Enterprise Viewer RH File الحرمان من الخدمة4.54.5$0-$5k$0-$5kNot DefinedNot Defined0.000610.00CVE-2020-6376

IOC - Indicator of Compromise (6)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDعنوان بروتوكول الإنترنتHostnameممثلحملاتIdentifiedالنوعالثقة
118.220.249.233ec2-18-220-249-233.us-east-2.compute.amazonaws.comDNSLock08/04/2022verifiedمتوسط
252.77.199.193ec2-52-77-199-193.ap-southeast-1.compute.amazonaws.comDNSLock08/04/2022verifiedمتوسط
3XX.XXX.XXX.XXxxx-xx-xxx-xxx-xx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx08/04/2022verifiedمتوسط
4XX.XXX.XXX.XXXxxx-xx-xxx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx08/04/2022verifiedمتوسط
5XX.XXX.XX.XXXxxxxxx08/04/2022verifiedعالي
6XX.XXX.XXX.XXXXxxxxxx08/04/2022verifiedعالي

TTP - Tactics, Techniques, Procedures (3)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueالثغراتمتجه الوصولالنوعالثقة
1T1059.007CWE-79Cross Site Scriptingpredictiveعالي
2TXXXXCWE-XXXXxxxxxxxxxx Xxxxxxxxxxpredictiveعالي
3TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictiveعالي

المصادر (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!