Iserik تحليل
IOB - Indicator of Behavior (5)
النشاطات
الاهتمام
الثغرات
IOC - Indicator of Compromise (11)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | عنوان بروتوكول الإنترنت | Hostname | ممثل | حملات | Identified | النوع | الثقة |
---|---|---|---|---|---|---|---|
1 | 1.9.0.1 | Iserik | 23/09/2019 | verified | عالي | ||
2 | 1.9.1.0 | Iserik | 23/09/2019 | verified | عالي | ||
3 | 1.9.1.1 | Iserik | 23/09/2019 | verified | عالي | ||
4 | X.X.X.X | Xxxxxx | 23/09/2019 | verified | عالي | ||
5 | X.X.X.X | Xxxxxx | 23/09/2019 | verified | عالي | ||
6 | X.XX.X.X | Xxxxxx | 23/09/2019 | verified | عالي | ||
7 | X.XX.X.X | Xxxxxx | 23/09/2019 | verified | عالي | ||
8 | X.XX.X.X | Xxxxxx | 23/09/2019 | verified | عالي | ||
9 | X.X.X.X | Xxxxxx | 23/09/2019 | verified | عالي | ||
10 | X.X.X.XX | xxxx-xxx-x-xxx-xx.xx-x.xxx.xxxxxxx.xx | Xxxxxx | 23/09/2019 | verified | عالي | |
11 | X.X.X.XX | xxxx-xxx-x-xxx-xx.xx-x.xxx.xxxxxxx.xx | Xxxxxx | 23/09/2019 | verified | عالي |
TTP - Tactics, Techniques, Procedures (2)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | الفئة | الثغرات | متجه الوصول | النوع | الثقة |
---|---|---|---|---|---|---|
1 | T1006 | CAPEC-126 | CWE-22 | Path Traversal | predictive | عالي |
2 | TXXXX | CAPEC-108 | CWE-XX | Xxx Xxxxxxxxx | predictive | عالي |
المصادر (2)
The following list contains external sources which discuss the actor and the associated activities: