Iserik تحليل

IOB - Indicator of Behavior (5)

التسلسل الزمني

اللغة

en6

البلد

الفاعلين

النشاطات

الاهتمام

التسلسل الزمني

النوع

المجهز

منتج

Microsoft SQL Server2
Odoo2
nginx2

الثغرات

IOC - Indicator of Compromise (11)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDعنوان بروتوكول الإنترنتHostnameممثلحملاتIdentifiedالنوعالثقة
11.9.0.1Iserik23/09/2019verifiedعالي
21.9.1.0Iserik23/09/2019verifiedعالي
31.9.1.1Iserik23/09/2019verifiedعالي
4X.X.X.XXxxxxx23/09/2019verifiedعالي
5X.X.X.XXxxxxx23/09/2019verifiedعالي
6X.XX.X.XXxxxxx23/09/2019verifiedعالي
7X.XX.X.XXxxxxx23/09/2019verifiedعالي
8X.XX.X.XXxxxxx23/09/2019verifiedعالي
9X.X.X.XXxxxxx23/09/2019verifiedعالي
10X.X.X.XXxxxx-xxx-x-xxx-xx.xx-x.xxx.xxxxxxx.xxXxxxxx23/09/2019verifiedعالي
11X.X.X.XXxxxx-xxx-x-xxx-xx.xx-x.xxx.xxxxxxx.xxXxxxxx23/09/2019verifiedعالي

TTP - Tactics, Techniques, Procedures (2)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueالفئةالثغراتمتجه الوصولالنوعالثقة
1T1006CAPEC-126CWE-22Path Traversalpredictiveعالي
2TXXXXCAPEC-108CWE-XXXxx Xxxxxxxxxpredictiveعالي

المصادر (2)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!