Echobot Analyse

IOB - Indicator of Behavior (57)

Zeitverlauf

Sprache

en56
zh2

Land

us42
ir10
cn4
ru2

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Microsoft IIS4
Cisco ASA4
Microsoft Windows4
OpenSSH2
vsftpd2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1DZCP deV!L`z Clanportal config.php erweiterte Rechte7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.540.00943CVE-2010-0966
2Apple Mac OS X bis 10.3.4 TCP/IP-Stapel out-of-sequence TCP-Verkehr unbekannte Schwachstelle5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.030.03667CVE-2004-0171
3Microsoft IIS IP/Domain Restriction erweiterte Rechte6.55.7$25k-$100k$0-$5kUnprovenOfficial Fix0.090.00817CVE-2014-4078
4Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash Information Disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.020.02016CVE-2007-1192
5FUSE fusermount erweiterte Rechte6.56.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.030.00134CVE-2018-10906
6Asus GT-AX11000 CAPTCHA Information Disclosure3.73.6$0-$5k$0-$5kNot DefinedOfficial Fix0.070.01157CVE-2021-41435
7Oracle GlassFish Server Java Server Faces Directory Traversal5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.64598CVE-2013-3827
8Microsoft Windows win32k.sys erweiterte Rechte6.36.0$25k-$100kWird berechnetProof-of-ConceptOfficial Fix0.000.00042CVE-2013-1340
9PHPSHE pay.php SQL Injection8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.020.00210CVE-2019-9762
10Microsoft IIS Cross Site Scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.030.00548CVE-2017-0055
11IPTV Smarters Web TV Player Upload erweiterte Rechte8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.070.00530CVE-2020-9380
12Microsoft Windows Background Intelligent Transfer Service Information Disclosure3.33.3$25k-$100k$0-$5kNot DefinedWorkaround0.000.00000
13NetworkManager AdHoc Mode schwache Authentisierung4.44.3$0-$5kWird berechnetNot DefinedOfficial Fix0.000.00052CVE-2012-2736
14jforum User erweiterte Rechte5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.050.00289CVE-2019-7550
15Citrix NetScaler ADC/NetScaler Gateway Information Disclosure7.47.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00188CVE-2018-6808
16Citrix NetScaler ADC/NetScaler Gateway SSH Login Prompt erweiterte Rechte7.47.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00115CVE-2018-5314
17Cisco ASA WebVPN Login Page Denial of Service4.34.1$5k-$25k$0-$5kHighOfficial Fix0.020.01075CVE-2014-2124
18Cisco ASA WebVPN Login Page logon.html Cross Site Scripting4.33.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.020.00192CVE-2014-2120
19WordPress wp-trackback.php SQL Injection7.36.9$5k-$25k$0-$5kProof-of-ConceptNot Defined0.030.04651CVE-2007-0233
20PHP PHP-FPM Denial of Service5.95.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00584CVE-2015-9253

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-AdresseHostnameAkteurKampagnenIdentifiziertTypAkzeptanz
145.89.106.108Echobot20.10.2023verifiziertHigh
2XX.XX.XX.XXXXxxxxxx20.10.2023verifiziertHigh
3XX.XX.XX.XXXXxxxxxx20.10.2023verifiziertHigh
4XXX.XXX.XXX.XXXXxxxxxx20.10.2023verifiziertHigh

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (26)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/+CSCOE+/logon.htmlprädiktivHigh
2File/downloadprädiktivMedium
3File/forum/away.phpprädiktivHigh
4File/uncpath/prädiktivMedium
5Filexxxxxxxxxxx.xxxprädiktivHigh
6Filexxxx/xxxxxxxxxxxxxxx.xxxprädiktivHigh
7Filexxxxxxxxxxxxx.xxxprädiktivHigh
8Filexxx/xxxxxx.xxxprädiktivHigh
9Filexxxxxxx/xxxxxx/xxxxxxx/xxxxxx/xxx.xxxprädiktivHigh
10Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxprädiktivHigh
11Filexxxxx.xxxprädiktivMedium
12Filexxxxxx.xxxprädiktivMedium
13Filexx-xxxxx/xxxxx-xxxx.xxxprädiktivHigh
14Filexx-xxxxxxxxx.xxxprädiktivHigh
15ArgumentxxxxxxxxprädiktivMedium
16ArgumentxxxxxprädiktivLow
17ArgumentxxxxxxxxprädiktivMedium
18ArgumentxxprädiktivLow
19ArgumentxxxxprädiktivLow
20ArgumentxxxxxxxxprädiktivMedium
21Argumentxxxx_xxxxprädiktivMedium
22Argumentxxxxxx_xxxxprädiktivMedium
23Argumentxx_xxprädiktivLow
24ArgumentxxxxxxxxprädiktivMedium
25Argumentxxxxxxxx/xxxxprädiktivHigh
26Network Portxxx/xxx (xxx)prädiktivHigh

Referenzen (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!