AsynRAT Analyse

IOB - Indicator of Behavior (26)

Zeitverlauf

Sprache

en26

Land

us14

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Microsoft Windows4
Microsoft Azure AD2
ASP-DEv XM Forums2
Early Impact Product Cart2
SourceCodester Online Student Management System2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasEPSSCTICVE
1MidiCart PHP Shopping Cart item_show.php SQL Injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.05
2ASP Portal News_Item.asp SQL Injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.009830.00CVE-2006-1353
3ASP-DEv XM Forums profile.asp SQL Injection7.37.1$0-$5k$0-$5kHighUnavailable0.000640.00CVE-2012-4060
4e-Quick Cart shopprojectlogin.asp Cross Site Scripting3.53.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.00
5Virtual Programming VP-ASP shopcurrency.asp SQL Injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.006700.03CVE-2006-2263
6Oracle WebLogic Server WebLogic Console unbekannte Schwachstelle5.35.1$25k-$100k$0-$5kNot DefinedOfficial Fix0.001790.06CVE-2013-1504
7Early Impact Product Cart viewprd.asp SQL Injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.009180.04CVE-2005-2445
8Sony PSP bis 2.80 libTIFF korruptes TIFF-Bild anzeigen Pufferüberlauf7.36.4$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.000420.04CVE-2006-4507
9Iatek ASPapp links.asp SQL Injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000970.00CVE-2008-1430
10Active Web Softwares Active Business Directory default.asp SQL Injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000640.00CVE-2008-5972
11Comersus Open Technologies Comersus Cart comersus_optreviewreadexec.asp SQL Injection7.37.1$0-$5k$0-$5kHighUnavailable0.003810.00CVE-2007-3323
12DUware DUpaypal Pro cat.asp SQL Injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.001920.00CVE-2005-2047
13e-Quick Cart shopprojectlogin.asp SQL Injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.04
14SourceCodester Online Student Management System edit-class-detail.php SQL Injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001480.05CVE-2023-1099
15Xiamen Four Letter Video Surveillance Management System Login UserInfoAction.class erweiterte Rechte8.17.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000630.00CVE-2023-3805
16Microsoft Azure AD Log in with Microsoft nOAuth erweiterte Rechte6.36.1$5k-$25k$0-$5kNot DefinedTemporary Fix0.000000.00
17OTCMS Directory Traversal3.53.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.000720.06CVE-2023-3241
18libspdm erweiterte Rechte5.65.5$0-$5k$0-$5kNot DefinedOfficial Fix0.001040.00CVE-2023-32690
19Google Chrome Camera Pufferüberlauf7.57.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001680.04CVE-2023-2458
20SourceCodester Lost and Found Information System erweiterte Rechte7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001090.00CVE-2023-2670

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-AdresseHostnameAkteurKampagnenIdentifiziertTypAkzeptanz
1185.254.37.238AsynRAT16.03.2023verifiziertHigh

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueKlassifizierungSchwachstellenZugriffsartTypAkzeptanz
1T1006CAPEC-126CWE-22Path TraversalprädiktivHigh
2T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionsprädiktivHigh
3TXXXXCAPEC-242CWE-XXXxxxxxxx XxxxxxxxxprädiktivHigh
4TXXXX.XXXCAPEC-209CWE-XX, CWE-XXXxxxx Xxxx XxxxxxxxxprädiktivHigh
5TXXXXCAPEC-122CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
6TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxprädiktivHigh
7TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxx XxxxxxxxxxxxxprädiktivHigh

IOA - Indicator of Attack (35)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/admin/read.php?mudi=announContentprädiktivHigh
2Fileadmin/?page=user/manage_userprädiktivHigh
3Fileadmincp/auth/secure.phpprädiktivHigh
4Filecat.aspprädiktivLow
5Filecomersus_optreviewreadexec.aspprädiktivHigh
6Filexxxxxxx.xxxprädiktivMedium
7Filexxxxxxx/xxxx-xxxxx-xxxxxx.xxxprädiktivHigh
8Filexxxxxxx/xxxx-xxxxx-xxxxxx.xxx?xxxxxx=xprädiktivHigh
9Filexxxx_xxxx.xxxprädiktivHigh
10Filexxxxx.xxxprädiktivMedium
11Filexxxx_xxxx.xxxprädiktivHigh
12Filexxxxxxx.xxxprädiktivMedium
13Filexxxx-xxx/xxxxxxxx.xxx?xxxx=xxx_xxxxx.xxxprädiktivHigh
14Filexxxxxxxxxxxx.xxxprädiktivHigh
15Filexxxxxxxxxxxxxxxx.xxxprädiktivHigh
16Filexxxxxxxxx/xxxxxxxxx/xxxxxx.xxxxxx.xxxprädiktivHigh
17Filexxxxxxx.xxxprädiktivMedium
18Libraryxxxxxxxxxxxxxx.xxxxxprädiktivHigh
19ArgumentxxxxxprädiktivLow
20ArgumentxxxxxprädiktivLow
21ArgumentxxxxxxxxxxprädiktivMedium
22ArgumentxxxprädiktivLow
23Argumentxxxx_xxprädiktivLow
24Argumentxxxxxxxxxx.xxxxxxxxxxxxxprädiktivHigh
25Argumentxxxxxxx_xxprädiktivMedium
26ArgumentxxxxxxprädiktivLow
27ArgumentxxxxxxxxxxxxprädiktivMedium
28ArgumentxxxxprädiktivLow
29ArgumentxxprädiktivLow
30ArgumentxxxxxxxxxxprädiktivMedium
31ArgumentxxxxxxxxxprädiktivMedium
32Argumentxxxx_xxxxprädiktivMedium
33ArgumentxxxxxxxxxprädiktivMedium
34ArgumentxxxxxxprädiktivLow
35ArgumentxxxprädiktivLow

Referenzen (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!