ObliqueRAT Analyse

IOB - Indicator of Behavior (546)

Zeitverlauf

Sprache

en522
es10
it6
fr4
ru2

Land

us504
ru30
cn12

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Blue Coat ProxySG4
https-proxy-agent4
Mozilla Firefox4
Drupal4
Artica Proxy4

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1Apache HTTP Server mod_proxy_balancer.c balancer_handler Cross Site Scripting4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.21782CVE-2012-4558
2Google Android Proxy Auto-Config ic.cc UpdateLoadElement Pufferüberlauf8.58.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00102CVE-2019-2047
3Telegram Desktop Proxy erweiterte Rechte8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00219CVE-2018-17613
4https-proxy-agent JSON Pufferüberlauf7.26.9$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00659CVE-2018-3739
5Apache HTTP Server mod_proxy_fcgi.c handle_headers Pufferüberlauf5.35.1$25k-$100k$0-$5kNot DefinedOfficial Fix0.040.00953CVE-2014-3583
6Apple iOS Proxy Authentication erweiterte Rechte6.66.4$100k und mehr$5k-$25kNot DefinedOfficial Fix0.040.00182CVE-2016-4642
7YoungZSoft CCProxy Proxy Service Pufferüberlauf7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.11487CVE-2004-2685
8CNCF Envoy Proxy Denial of Service6.46.4$0-$5kWird berechnetNot DefinedNot Defined0.000.00341CVE-2020-8659
9Blue Coat ProxySG SGOS Information Disclosure5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00139CVE-2015-4334
10Juniper WLC Proxy ARP/No Broadcast Feature erweiterte Rechte5.35.1$5k-$25kWird berechnetNot DefinedOfficial Fix0.000.00712CVE-2014-6381
11Symantec ASG/ProxySG FTP Proxy WebFTP Mode Stored Cross Site Scripting5.75.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00115CVE-2018-18370
12Palo Alto PAN-OS DNS Proxy erweiterte Rechte8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.030.06716CVE-2017-8390
13QNAP Proxy Server Setting schwache Authentisierung6.36.2$0-$5kWird berechnetNot DefinedOfficial Fix0.020.00069CVE-2017-7639
14Squid Web Proxy cachemgr.cgi erweiterte Rechte6.15.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00267CVE-2019-18860
15Bluecoat SGOS Management Console Cross Site Scripting4.34.1$0-$5kWird berechnetNot DefinedOfficial Fix0.020.00265CVE-2010-5192
16Artica Proxy fw.progrss.details.php Directory Traversal7.47.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000.96791CVE-2020-13158
17Artica Proxy settings.inc erweiterte Rechte4.94.9$0-$5kWird berechnetNot DefinedNot Defined0.000.00130CVE-2019-7300
18Sarg Squid Analysis Report Generator Proxy Server useragent.c useragent Pufferüberlauf10.09.0$0-$5kWird berechnetProof-of-ConceptOfficial Fix0.000.44560CVE-2008-1167
19Google Android Proxy Configuration hydrogen-alias-analysis.h HAliasAnalyzer.Query erweiterte Rechte8.58.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.040.00102CVE-2019-2097
20Check point Firewall-1/VPN-1 IKE Aggressive Mode schwache Verschlüsselung5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00409CVE-2002-1623

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-AdresseHostnameAkteurKampagnenIdentifiziertTypAkzeptanz
1185.117.73.222ObliqueRAT31.03.2022verifiziertHigh
2XXX.XXX.XX.XXXXxxxxxxxxx10.08.2022verifiziertHigh

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSchwachstellenZugriffsartTypAkzeptanz
1T1006CWE-22Path TraversalprädiktivHigh
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionsprädiktivHigh
3T1059CWE-94Argument InjectionprädiktivHigh
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxprädiktivHigh
5TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
6TXXXXCWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxprädiktivHigh
7TXXXX.XXXCWE-XXXXxxx XxxxxxxxprädiktivHigh
8TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxprädiktivHigh
9TXXXXCWE-XXXxx XxxxxxxxxprädiktivHigh
10TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxprädiktivHigh
11TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh
12TXXXXCWE-XXXXxxxxxxxxxxxx XxxxxxprädiktivHigh
13TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxprädiktivHigh

IOA - Indicator of Attack (33)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/assets/php/upload.phpprädiktivHigh
2Fileadmin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/listprädiktivHigh
3Filecachemgr.cgiprädiktivMedium
4Filecgi-bin/cmh/webcam.shprädiktivHigh
5Filexxxxxx.xprädiktivMedium
6Filexx.xxxxxxx.xxxxxxx.xxxprädiktivHigh
7Filexxxxxxxx-xxxxx-xxxxxxxx.xprädiktivHigh
8Filexx.xxprädiktivLow
9Filexxxxxx.xxxprädiktivMedium
10Filexxxxx.xxxprädiktivMedium
11Filexxxxxx.xprädiktivMedium
12Filexxxxx.xxxprädiktivMedium
13Filexxx_xxxxx_xxxxxxxx.xprädiktivHigh
14Filexxx_xxxxx_xxxx.xprädiktivHigh
15Filexxxxxxxx_xxxxxx.xxxprädiktivHigh
16Filexxxxxxxxxx/xxxxxxxx.xxxprädiktivHigh
17Filexxxxxxxxx.xprädiktivMedium
18Filexxxxx/xxxxx.xxprädiktivHigh
19Filexxxxxxxxxxxxx.xxxxprädiktivHigh
20Libraryxxxxxxxxx/xxxxxx_xxxxxxxxxxx.xxx.xxxprädiktivHigh
21ArgumentxxxxprädiktivLow
22ArgumentxxxxxxxxxxxxxprädiktivHigh
23ArgumentxxxxxxxxxxxxprädiktivMedium
24ArgumentxxxxxxxxprädiktivMedium
25Argumentxx_xxxxxxxxprädiktivMedium
26ArgumentxxxxxxxxxprädiktivMedium
27Argumentxxxx_xxxxx/xxxx_xxxxxxxxprädiktivHigh
28Argumentxxxxxxx.xxx_xxxxxxxxxxprädiktivHigh
29ArgumentxxxxxprädiktivLow
30ArgumentxxxprädiktivLow
31ArgumentxxxxxxxxprädiktivMedium
32Argumentxxxx xxxxprädiktivMedium
33Input Value%xx%xx%xxprädiktivMedium

Referenzen (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!