APT1 Análisis

IOB - Indicator of Behavior (82)

Cronología

Idioma

en56
zh18
de4
ru2
ko2

País

cn34
us20
il16
ru2

Actores

Ocupaciones

Interesar

Cronología

Escribe

Proveedor

Producto

Google Android8
OpenSSH4
Apple Safari2
Mobiledeluxe Solitaire Deluxe2
EMC RSA Authentication Agent for Web2

Vulnerabilidad

#VulnerabilidadBaseTemp0dayHoyExpConCTIEPSSCVE
1Micrium uC-HTTP HTTP Request desbordamiento de búfer8.78.7$0-$5k$0-$5kNot DefinedNot Defined0.000.00472CVE-2022-24942
2Sangfor Sundray WLAN Controller SSH Service autenticación débil9.89.7$0-$5k$0-$5kNot DefinedWorkaround0.030.01218CVE-2019-9160
3ZZZCMS zzzphp File Upload escalada de privilegios7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.000.00090CVE-2019-16720
4Cisco RV340/RV340W/RV345/RV345P SSL VPN escalada de privilegios8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00234CVE-2020-3357
5Microsoft Internet Explorer Scripting Engine JScript.dll desbordamiento de búfer7.17.0$25k-$100k$5k-$25kHighOfficial Fix0.000.09348CVE-2018-8653
6thttpd WebService divulgación de información5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.020.00000
7Babel Traverse escalada de privilegios7.87.7$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00060CVE-2023-45133
8HP Business Availability Center cross site request forgery6.36.3$5k-$25k$0-$5kNot DefinedNot Defined0.000.00139CVE-2012-3256
9Hikvision Intercom Broadcasting System ping.php escalada de privilegios7.57.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.130.90160CVE-2023-6895
10Google Android Integer Overflow fdt.c fdt_next_tag desbordamiento de búfer5.45.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00043CVE-2023-21065
11Google Android p2p_iface.cpp divulgación de información3.33.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2023-21011
12Google Android HWC2.cpp setPowerMode divulgación de información4.03.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2023-21031
13Google Android dhd_msgbuf.c dhd_prot_ioctcmplt_process desbordamiento de búfer5.45.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2023-21071
14Google Android Debug Policy Local Privilege Escalation6.56.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2023-21068
15Google Android WifiManager.java addNetwork denegación de servicio6.05.9$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00042CVE-2023-21033
16Google Android simdata.cpp ParseWithAuthType divulgación de información4.54.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2023-21063
17Mozilla Firefox Notification vulnerabilidad desconocida5.45.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00046CVE-2023-28159
18Google Android ufdt_convert.c _ufdt_output_node_to_fdt divulgación de información3.33.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2023-21032
19Google Android ih264e_process.c ih264e_init_proc_ctxt divulgación de información4.44.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2023-21019

Campañas (2)

These are the campaigns that can be associated with the actor:

IOC - Indicator of Compromise (75)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDdirección IPHostnameActorCampañasIdentifiedEscribeConfianza
123.236.62.147147.62.236.23.bc.googleusercontent.comAPT12021-06-05verifiedMedio
227.102.112.179APT1Oceansalt2020-12-11verifiedAlto
358.246.0.0APT1Mandiant2020-12-13verifiedAlto
458.247.0.0APT1Mandiant2020-12-13verifiedAlto
567.222.16.131host.dnsweb.orgAPT12021-06-05verifiedAlto
6100.42.216.230tfs2480.sipnav.inAPT12020-12-11verifiedAlto
7101.80.0.0APT1Mandiant2022-02-25verifiedAlto
8101.81.0.0APT1Mandiant2022-02-25verifiedAlto
9101.82.0.0APT1Mandiant2022-02-25verifiedAlto
10101.83.0.0APT1Mandiant2022-02-25verifiedAlto
11101.84.0.0APT1Mandiant2022-02-25verifiedAlto
12101.85.0.0APT1Mandiant2022-02-25verifiedAlto
13101.86.0.0APT1Mandiant2022-02-25verifiedAlto
14101.87.0.0APT1Mandiant2022-02-25verifiedAlto
15101.88.0.0APT1Mandiant2022-02-25verifiedAlto
16XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
17XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
18XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
19XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
20XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
21XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
22XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
23XXX.XX.XXX.XXXXxxx2021-06-05verifiedAlto
24XXX.XX.XX.XXXxxx2021-06-05verifiedAlto
25XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
26XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
27XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
28XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
29XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
30XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
31XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
32XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
33XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
34XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
35XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
36XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
37XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
38XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
39XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
40XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
41XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
42XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
43XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
44XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
45XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
46XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
47XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
48XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
49XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
50XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
51XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
52XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
53XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
54XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
55XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
56XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
57XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
58XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
59XXX.XXX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
60XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
61XXX.XX.XXX.XXxxxx.xx-xxx-xx-xxx.xxxXxxxXxxxxxxxx2020-12-11verifiedAlto
62XXX.XX.XXX.XXxx-xxx-xx-xxx-xx.xxxx.xxxxxxxxx.xxxXxxxXxxxxxxxx2020-12-11verifiedAlto
63XXX.XXX.XXX.XXXXxxxXxxxxxxxx2020-12-11verifiedAlto
64XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx2022-02-25verifiedAlto
65XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx2022-02-25verifiedAlto
66XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
67XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx2022-02-25verifiedAlto
68XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
69XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
70XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx2022-02-25verifiedAlto
71XXX.XX.X.Xx.x.xx.xxx.xxxxx.xx.xx.xxxxxxx.xxxxxxx.xxx.xxXxxxXxxxxxxx2022-02-25verifiedAlto
72XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
73XXX.XX.X.XXxxxXxxxxxxx2022-02-25verifiedAlto
74XXX.XXX.X.XXxxxXxxxxxxx2020-12-13verifiedAlto
75XXX.XXX.X.XXxxxXxxxxxxx2020-12-13verifiedAlto

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (39)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClaseIndicatorEscribeConfianza
1File/api/uploadpredictiveMedio
2File/php/ping.phppredictiveAlto
3File/public/plugins/predictiveAlto
4File/systemrw/predictiveMedio
5Fileadm/boardgroup_form_update.phppredictiveAlto
6Filexxxxx/xxxxxxx/xxxxxxxxxxpredictiveAlto
7Filexxxxxxx.xpredictiveMedio
8Filexxx_xxxxxx.xpredictiveMedio
9Filexxx.xpredictiveBajo
10Filexxxx.xxxpredictiveMedio
11Filexxxxxx_xxxxxxx.xpredictiveAlto
12Filexxxxx_xx.xxxxpredictiveAlto
13Filexxx_xxxxx_xxx.xxxpredictiveAlto
14Filexxxxxxx.xxxpredictiveMedio
15Filexxx_xxxxx.xxxpredictiveAlto
16Filexxxxxxx/xxxxxxx/xxx/xxxxxxxxxx.xxx?xxxxxxxx=xxxx&xxxxxx=xxxxxxxxxxpredictiveAlto
17Filexxxx/xxxxxx.xxxpredictiveAlto
18Filexxx.xpredictiveBajo
19Filexxxxxxx.xxxpredictiveMedio
20Filexxxx_xxxxxxx.xpredictiveAlto
21Filexxxxxxx/xxxxxxx/xxxxxx/xxxxxx_xxxxxx_xxxx.xxxpredictiveAlto
22Filexxxxxxxxxxx.xxxxpredictiveAlto
23Filexx-xxxxxxxx/xxxxx.xxxpredictiveAlto
24Filexx/xxxxxx.xxxpredictiveAlto
25Library/xxx/xxx/xxx/xxxx/xxxxxxxxxx/xxxxx/xxxxxxxxxx.xxxpredictiveAlto
26Libraryxxxxxxx.xxxpredictiveMedio
27Argumentxxxxx_xxpredictiveMedio
28ArgumentxxxxxxxxxxxpredictiveMedio
29Argumentxx_x~xxpredictiveBajo
30ArgumentxxxxxpredictiveBajo
31Argumentxxxxxxxx[xx]predictiveMedio
32Argumentxxxxx_xxxxpredictiveMedio
33ArgumentxxxxxxxxpredictiveMedio
34ArgumentxxxxxxxxpredictiveMedio
35ArgumentxxxxpredictiveBajo
36Input Valuexxxx.xxx::$xxxxpredictiveAlto
37Input Valuexxxxxxx -xxxpredictiveMedio
38Network Portxxx/xxxxpredictiveMedio
39Network Portxxx/xxxxxpredictiveMedio

Referencias (5)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!