ShadowHammer Analyse
IOB - Indicator of Behavior (1)
Activités
Campagnes (1)
These are the campaigns that can be associated with the actor:
- ShadowHammer
IOC - Indicator of Compromise (6)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | adresse IP | Hostname | Acteur | Campagnes | Identified | Taper | Confiance |
---|---|---|---|---|---|---|---|
1 | 23.236.77.175 | ShadowHammer | ShadowHammer | 22/12/2020 | verified | Élevé | |
2 | 23.236.77.177 | ShadowHammer | ShadowHammer | 22/12/2020 | verified | Élevé | |
3 | XX.XXX.XX.XXX | Xxxxxxxxxxxx | Xxxxxxxxxxxx | 22/12/2020 | verified | Élevé | |
4 | XX.XXX.XX.XXX | xxx-xx-xxx-xx-xxx.xx-xxxxx-x.xxxxxxx.xxxxxxxxx.xxx | Xxxxxxxxxxxx | 27/03/2022 | verified | Moyen | |
5 | XXX.XX.XXX.X | Xxxxxxxxxxxx | Xxxxxxxxxxxx | 22/12/2020 | verified | Élevé | |
6 | XXX.XXX.XX.XXX | Xxxxxxxxxxxx | 27/03/2022 | verified | Élevé |
TTP - Tactics, Techniques, Procedures (1)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Vulnérabilités | Vecteur d'accès | Taper | Confiance |
---|---|---|---|---|---|
1 | T1202 | CWE-77 | Command Shell in Externally Accessible Directory | predictive | Élevé |
Références (3)
The following list contains external sources which discuss the actor and the associated activities:
- https://github.com/vuldb/cyber_threat_intelligence/tree/main/actors/ShadowHammer
- xxxxx://xxxxxx.xxx/xxxxxxxx/xxxxxxxx/xxxx/xx/xx/xxxxxxx-xxxxxx-xxxxx-xxxxxx-xxxx-xxxxxxxx-xxxxxxx-xxx-xxxxxx.xxxx
- xxxxx://xxx.xxxxxxxxxxx.xxx/_xxxxxxx/xxxx/xxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxx.xxx#xxxxxx.xxxxxx=xxxxxxxx