Elknot تحليل

IOB - Indicator of Behavior (1)

التسلسل الزمني

اللغة

en2

البلد

الفاعلين

النشاطات

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDعنوان بروتوكول الإنترنتHostnameممثلحملاتIdentifiedالنوعالثقة
1115.231.218.64Elknot11/02/2022verifiedعالي
2XXX.XX.XXX.XXxxxxx09/02/2022verifiedعالي
3XXX.XX.XXX.XXXxxx.xx.xxx.xxx.xxxxxx.xxxxxxxxx.xxxXxxxxx09/02/2022verifiedعالي

TTP - Tactics, Techniques, Procedures (1)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueالثغراتمتجه الوصولالنوعالثقة
1T1068CWE-264J2EE Misconfiguration: Weak Access Permissions for EJB Methodspredictiveعالي

المصادر (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!