AutoCAD Malware Análisis
IOB - Indicator of Behavior (3)
Ocupaciones
Interesar
Vulnerabilidad
These are the vulnerabilities that we have identified as researched, approached, or attacked:
IOC - Indicator of Compromise (2)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | dirección IP | Hostname | Actor | Campañas | Identified | Escribe | Confianza |
---|---|---|---|---|---|---|---|
1 | 98.126.72.138 | 98.126.72.138.krypt.com | AutoCAD Malware | 2018-11-29 | verified | Bajo | |
2 | XX.XXX.XX.XXX | xx.xxx.xx.xxx.xxxxx.xxx | Xxxxxxx Xxxxxxx | 2018-11-29 | verified | Bajo |
TTP - Tactics, Techniques, Procedures (2)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Clase | Vulnerabilidad | Vector de acceso | Escribe | Confianza |
---|---|---|---|---|---|---|
1 | T1059.007 | CAPEC-209 | CWE-79 | Basic Cross Site Scripting | predictive | Alto |
2 | TXXXX | CAPEC-XX | CWE-XXX | Xxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxx | predictive | Alto |
Referencias (2)
The following list contains external sources which discuss the actor and the associated activities: