Scarlet Mimic Analisi

IOB - Indicator of Behavior (102)

Sequenza temporale

Linguaggio

en94
zh6
de2

Nazione

us82
cn12
gb4
th2
in2

Attori

Attività

Interesse

Sequenza temporale

Genere

Fornitore

Prodotto

Google Chrome4
Linux Kernel2
Image Sharing Script2
Biscom Secure File Transfer2
SIPcrack2

Vulnerabilità

#VulnerabilitàBaseTemp0dayOggiSfrConEPSSCTICVE
1mcart.xls Module mcart_xls_import.php sql injection7.17.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.004650.00CVE-2015-8356
2EasyCom PHP API buffer overflow8.57.4$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.370420.00CVE-2017-5358
3DZCP deV!L`z Clanportal config.php escalazione di privilegi7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.22CVE-2010-0966
4PbootCMS SingleController.php sql injection8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.002210.02CVE-2018-18450
5PoDoFo PDF File PdfXRefStreamParserObject.cpp ParseStream buffer overflow5.45.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000780.00CVE-2018-5295
6Landing Pages Plugin escalazione di privilegi8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.020340.00CVE-2015-5227
7Piwik Controller.php saveLayout escalazione di privilegi6.35.9$0-$5k$0-$5kFunctionalOfficial Fix0.000000.02
8Moxa AWK-3131A Web Application denial of service7.27.2$0-$5k$0-$5kNot DefinedNot Defined0.001760.00CVE-2016-8723
9Image Sharing Script postComment.php Stored cross site scripting3.53.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.02
10Linux Kernel tmpfs System posix_acl.c simple_set_acl escalazione di privilegi4.94.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2017-5551
11Netgear R8000 Password Recovery passwordrecovered.cgi rivelazione di un 'informazione6.76.7$5k-$25k$0-$5kHighNot Defined0.974020.00CVE-2017-5521
12libtorrent GZIP Response puff.cpp construct escalazione di privilegi5.95.9$0-$5k$0-$5kNot DefinedOfficial Fix0.003970.00CVE-2016-7164
13phpMyAdmin grab_globals.lib.php directory traversal4.84.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.023340.26CVE-2005-3299
14Tongda OA 2017 delete.php sql injection6.96.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000630.11CVE-2024-1252
15Ecommerce Online Store Kit shop.php sql injection9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.037630.05CVE-2004-0300
16D-Link DIR-823G HNAP1 escalazione di privilegi5.55.3$5k-$25k$5k-$25kNot DefinedNot Defined0.003210.02CVE-2021-43474
17Juniper ScreenOS SSH/Telnet autenticazione debole9.88.8$25k-$100k$0-$5kHighOfficial Fix0.970540.04CVE-2015-7755
18WarHound WarHound General Shopping Cart item.asp sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.004630.00CVE-2006-6206
19Adobe Magento Customers Module escalazione di privilegi5.04.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.000900.00CVE-2021-28567
20Google Android SimpleDecodingSource.cpp doRead escalazione di privilegi9.89.6$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001200.00CVE-2021-39623

Campagne (1)

These are the campaigns that can be associated with the actor:

  • Uyghurs

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (64)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorGenereFiducia
1File.htaccesspredictiveMedia
2File/ajax-files/postComment.phppredictiveAlto
3File/cgi-bin/passpredictiveAlto
4File/cgi-bin/wapopenpredictiveAlto
5File/general/attendance/manage/ask_duty/delete.phppredictiveAlto
6File/passwordrecovered.cgipredictiveAlto
7File/plugins/Dashboard/Controller.phppredictiveAlto
8Filexxxxx/xxxxx_xxx_xxxxxx.xxxpredictiveAlto
9Filexxxxx/xxx/xxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxxx/xxxxx.xxpredictiveAlto
10Filexxxx\xxxxx\xxxxxxxxxx\xxxxxxx\xxxxxxxxxxxxxxxx.xxxpredictiveAlto
11Filexxxxxxxx.xxxpredictiveMedia
12Filexxxx/xxxxxxxxxxxxxxxxxxxxxxxxx.xxxpredictiveAlto
13Filexxxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxxpredictiveAlto
14Filexxxxxxx\xxxxxxxxxx\xxxxx\xxxxxx.xxxpredictiveAlto
15Filexxxxxx/xxxx.xpredictiveAlto
16Filexxx.xxxxxxx.xxxpredictiveAlto
17Filexxx/xxxxxxxxx/xxxxxx/xxxxxxxxxxxxx.xxxxpredictiveAlto
18Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveAlto
19Filexxxx/xxxxxxxxxx/xxxxxx-xxx.xpredictiveAlto
20Filexxxxxxxxx/xxxxxxx/xxxx/xxxxxxxxx/xxxxxxxx.xxxpredictiveAlto
21Filexxxxxxxxx/xxxxx/xxxxxxxxxxxx/xxxxxxxxx.xxxpredictiveAlto
22Filexx/xxxxx_xxx.xpredictiveAlto
23Filexxxx_xxxxxxx.xxx.xxxpredictiveAlto
24Filexxx/xxx.xxxpredictiveMedia
25Filexxx/xxxxxx.xxxpredictiveAlto
26Filexxxxxxx.xxxpredictiveMedia
27Filexxxx.xxxpredictiveMedia
28Filexxxxxxx.xxxpredictiveMedia
29Filexxxxx.xxxpredictiveMedia
30Filexxxxxxxxx.xxxpredictiveAlto
31Filexxxx_xxxxxxxxxx.xxxpredictiveAlto
32Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]predictiveAlto
33Filexxxx.xxxpredictiveMedia
34Filexxxx.xxxpredictiveMedia
35Filexxxxxxxxxxxxxxxxxxxx.xxxpredictiveAlto
36Filexxxxxx/xxxxxx_xxxxxxxxxxx.xxxpredictiveAlto
37Filexxxxxxxxxxxx.xxxpredictiveAlto
38Filexx-xxxxx/xxxx.xxxpredictiveAlto
39Libraryxxx/xxxxxxxxx/xxxxxxxx.xxxpredictiveAlto
40Argumentxxx_xxxx_xxpredictiveMedia
41ArgumentxxxxxxxxpredictiveMedia
42Argumentxxxxxxx xxxxpredictiveMedia
43Argumentxxxxxxxxx->xxxxxxxxxpredictiveAlto
44ArgumentxxxxxxxxxxpredictiveMedia
45ArgumentxxpredictiveBasso
46Argumentxx/xxx/xxxxxpredictiveMedia
47ArgumentxxxxxxxxxxxpredictiveMedia
48ArgumentxxxxxpredictiveBasso
49ArgumentxxxxxxpredictiveBasso
50ArgumentxxxxxxxxpredictiveMedia
51Argumentxxxx_xxxxxpredictiveMedia
52ArgumentxxxxxxxxxxpredictiveMedia
53ArgumentxxxxpredictiveBasso
54Argumentxxxxxxxxx/xxxxxxxpredictiveAlto
55ArgumentxxxpredictiveBasso
56ArgumentxxxxxxxxpredictiveMedia
57Argumentxxx_xxxxxx_xxxxxxx_xx_xxxpredictiveAlto
58Input Value'xx x=xpredictiveBasso
59Input Value../..predictiveBasso
60Input ValuexxxxpredictiveBasso
61Input Value<xxx xxx=x xxxxxxx=xxxxxx(x)>predictiveAlto
62Input Valuexxxxxxxx.+xxxpredictiveAlto
63Input Valuexxxxxxxxx/xxxxxxxxxpredictiveAlto
64Input Value{{ }}predictiveBasso

Referenze (5)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!