Shamoon 2 解析

IOB - Indicator of Behavior (54)

タイムライン

言語

en48
ru6

国・地域

us46
ru6
cn2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

LibTIFF12
IBM Rational Collaborative Lifecycle Management10
IBM Rational Quality Manager10
IBM Rational Team Concert10
IBM Rational DOORS Next Generation10

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1ClamAV Antivirus AutoIt Module サービス拒否7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000630.02CVE-2023-20212
2Microsoft SharePoint 特権昇格6.15.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.004710.00CVE-2017-8569
3Ditty Plugin クロスサイトスクリプティング3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001000.00CVE-2022-0533
4Moxa TN-4900/TN-5900 特権昇格7.27.2$0-$5k$0-$5kNot DefinedNot Defined0.000460.00CVE-2023-34217
5D-Link DAP-2660 GET Request adv_resource メモリ破損5.55.3$5k-$25k$5k-$25kNot DefinedNot Defined0.000820.03CVE-2023-39749
6TP-LINK TL-WR841N/TL-WR940N/TL-WR941ND WlanSecurityRpm メモリ破損7.67.5$0-$5k$0-$5kNot DefinedNot Defined0.000460.03CVE-2023-39747
7TP-LINK TL-WR841N/TL-WR940N/TL-WR941ND GET Request AccessCtrlAccessRulesRpm メモリ破損5.55.4$0-$5k$0-$5kNot DefinedNot Defined0.000460.00CVE-2023-39745
8TP-LINK TL-WR1041N V2 GET Request NetworkCfgRpm サービス拒否5.55.4$0-$5k$0-$5kNot DefinedNot Defined0.000460.00CVE-2023-39748
9Private Internet Access 特権昇格8.88.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000440.00CVE-2022-27092
10ASUS RT-AC88U Download Master Title 特権昇格5.95.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000730.00CVE-2020-29655
11Mole Adult Portal Script profile.php SQLインジェクション7.37.3$0-$5k$0-$5kHighUnavailable0.001290.02CVE-2009-4673
124images categories.php クロスサイトスクリプティング4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.002070.00CVE-2015-7708
134homepages 4images member.php クロスサイトスクリプティング3.53.4$0-$5k$0-$5kHighOfficial Fix0.001110.00CVE-2009-2131
14Kentico CMS CMS Administration Dashboard install.aspx 特権昇格8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.148300.04CVE-2017-17736
15FileZilla Server PORT 特権昇格4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000520.17CVE-2015-10003
16Microsoft SharePoint Content 特権昇格6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.034140.00CVE-2015-1700
17Microsoft SharePoint Server クロスサイトスクリプティング4.84.6$0-$5k$0-$5kNot DefinedOfficial Fix0.010350.00CVE-2017-0107
18Microsoft SharePoint Server クロスサイトスクリプティング4.44.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001870.00CVE-2017-8654
19Microsoft Excel メモリ破損7.06.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.485590.02CVE-2016-7236
20ownCloud scan.php 情報の漏洩8.58.3$0-$5k$0-$5kNot DefinedOfficial Fix0.004390.03CVE-2016-1499

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechnique脆弱性アクセスベクタータイプ信頼度
1T1040CWE-294Authentication Bypass by Capture-replaypredictive
2T1055CWE-74Improper Neutralization of Data within XPath Expressionspredictive
3TXXXX.XXXCWE-XX, CWE-XXXxxxx Xxxx Xxxxxxxxxpredictive
4TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxxpredictive
5TXXXXCWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxxpredictive
6TXXXXCWE-XXX7xx Xxxxxxxx Xxxxxxxxpredictive
7TXXXXCWE-XXXxx Xxxxxxxxxpredictive
8TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxx Xxxxpredictive
9TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive

IOA - Indicator of Attack (30)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/adv_resourcepredictive
2File/Main_Login.asp?flag=1&productname=RT-AC88U&url=/downloadmaster/task.asppredictive
3File/userRpm/AccessCtrlAccessRulesRpmpredictive
4File/userRpm/NetworkCfgRpmpredictive
5File/xxxxxxx/xxxxxxxxxxxxxxxpredictive
6File/xxxxxx/xx/xxxxxxxxxxx.xxxpredictive
7Filexxxxx/xxxxxxxxxx.xxxpredictive
8Filexxxxxxxx.xxxpredictive
9Filexxxxxxxxxx/xxxxxxx.xxxxpredictive
10Filexxxxx.xxx/xxxx/xxxxx/xxxx/xxxx.xxxpredictive
11Filexxxxxx.xxxpredictive
12Filexxxxxxx.xxxpredictive
13Filexxx.xxx~xxxxxxxxxxxxxx!xxx/xxxxxxxxxpredictive
14Filexxx.xxx~xx~xxxx~xxx~xxxxxxx~xxxxxxxx~xxx/xxxxxxxxxxxpredictive
15Filexxx_xxxxxxxx.xpredictive
16Filexxx_xxxxxxx.xpredictive
17Filexxx_xxxxx.xpredictive
18Filexxxxx/xxxxxxxx.xpredictive
19Filexxxxx/xxxxxx.xpredictive
20Filexxxxx/xxxxxxxx.xpredictive
21Argumentxxx_xxxxxxxxxxxpredictive
22Argumentxxxpredictive
23Argumentxxxxxpredictive
24Argumentxxxxpredictive
25Argumentxxxxxxxxxxxpredictive
26Argumentxxxxxxxxxxxxpredictive
27Argumentxxxx_xxxxxxxxpredictive
28Argumentxxxx_xxpredictive
29Input Value<xxxxxx>xxxxx(x)</xxxxxx>predictive
30Network Portxxx/xxxxpredictive

参考 (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!