Dragonfly Analiza

IOB - Indicator of Behavior (1000)

Oś czasu

Język

en920
de28
es14
ru12
fr12

Kraj

us918
ru26
gb8
tr6
kr4

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

Apple Mac OS X Server14
Microsoft Windows12
TP-LINK TL-WR886N8
Linux Kernel6
WordPress6

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzCTIEPSSCVE
1DZCP deV!L`z Clanportal config.php privilege escalation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.820.00943CVE-2010-0966
2Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.020.02016CVE-2007-1192
3DZCP deV!L`z Clanportal browser.php information disclosure5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.510.02733CVE-2007-1167
4Apple Mac OS X Server privilege escalation6.56.3$5k-$25kObliczenieNot DefinedOfficial Fix0.000.00042CVE-2010-1821
5OpenBB read.php sql injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.080.00250CVE-2005-1612
6Apple Mac OS X Server Wiki Server sql injection5.34.6$5k-$25k$0-$5kUnprovenOfficial Fix3.850.00339CVE-2015-5911
7Microsoft Windows OLE olecnv32.dll privilege escalation7.06.3$25k-$100kObliczenieProof-of-ConceptOfficial Fix0.000.65990CVE-2017-8487
8Apple Mac OS X Server Profile Manager privilege escalation7.56.5$5k-$25k$0-$5kUnprovenOfficial Fix0.030.01876CVE-2013-0269
9Lars Ellingsen Guestserver guestbook.cgi cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.230.00169CVE-2005-4222
10Microsoft Windows SPNEGO Extended Negotiation Remote Code Execution7.97.2$25k-$100k$5k-$25kUnprovenOfficial Fix0.020.00626CVE-2022-37958
11Devilz Clanportal index.php sql injection7.36.4$0-$5k$0-$5kProof-of-ConceptUnavailable0.000.00784CVE-2006-3347
12Article Dashboard signup.php cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.030.00240CVE-2007-4333
13PHP phpinfo cross site scripting4.33.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.230.02101CVE-2007-1287
14Devilz Clanportal File Upload nieznana luka5.34.4$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.230.05362CVE-2006-6338
15Joomla CMS com_easyblog sql injection6.36.1$5k-$25k$5k-$25kNot DefinedNot Defined0.230.00000
16Microsoft Windows Mark of the Web nieznana luka5.44.9$25k-$100k$5k-$25kUnprovenOfficial Fix0.000.00313CVE-2022-41091
17Synacor Zimbra Collaboration Suite sudo Configuration zmslapd privilege escalation8.38.3$0-$5k$0-$5kHighOfficial Fix0.020.00114CVE-2022-37393
18vsftpd Service Port 6200 privilege escalation8.58.4$25k-$100k$25k-$100kNot DefinedWorkaround0.030.84215CVE-2011-2523
19MGB OpenSource Guestbook email.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable1.010.01302CVE-2007-0354
20Tiki Admin Password tiki-login.php weak authentication8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix5.030.00936CVE-2020-15906

Kampanie (1)

These are the campaigns that can be associated with the actor:

  • Karagany

IOC - Indicator of Compromise (23)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDadres IPHostnameAktorKampanieIdentifiedRodzajPewność siebie
15.45.119.124Dragonfly2021-06-16verifiedWysoki
25.135.104.77DragonflyKaragany2020-12-16verifiedWysoki
35.196.167.184ip184.ip-5-196-167.euDragonfly2021-06-16verifiedWysoki
437.139.7.16Dragonfly2021-06-16verifiedWysoki
551.159.28.10151-159-28-101.rev.poneytelecom.euDragonfly2021-06-16verifiedWysoki
6XX.XX.XX.XXXXxxxxxxxx2020-12-24verifiedWysoki
7XX.XXX.XXX.XXXxxxxxx.xxxxxxx-xxxxx.xxXxxxxxxxx2020-12-16verifiedWysoki
8XX.XXX.XX.XXxxx.xxxxxxxx.xxXxxxxxxxx2021-06-16verifiedWysoki
9XX.XXX.XXX.XXXxxxxxx-xx.xxxxxxx.xxxXxxxxxxxx2021-01-01verifiedWysoki
10XX.XXX.XXX.XXXXxxxxxxxx2021-01-01verifiedWysoki
11XXX.XXX.XXX.XXXxxxxxxxx2021-06-16verifiedWysoki
12XXX.XXX.XXX.XXxxxxxx.xx.xxx.xxx.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxxxx2021-06-16verifiedWysoki
13XXX.X.XX.XXXxxxxxxxx2021-06-16verifiedWysoki
14XXX.XX.XX.XXxxxxxxxx.xx-xxx-xx-xx.xxxXxxxxxxxx2021-06-16verifiedWysoki
15XXX.XXX.XXX.XXXxxxxxx-xxx-xxx-xxx-xxx.xxxxxxxx.xxxXxxxxxxxxXxxxxxxx2020-12-16verifiedWysoki
16XXX.XX.XXX.XXxx.xxxxxxxxxxxxxx.xxxxxXxxxxxxxxXxxxxxxx2020-12-16verifiedWysoki
17XXX.XX.XXX.XXXxxxxxxxx2021-06-16verifiedWysoki
18XXX.XXX.XXX.XXXXxxxxxxxx2020-12-24verifiedWysoki
19XXX.XXX.XXX.XXXXxxxxxxxx2020-12-24verifiedWysoki
20XXX.XXX.XX.XXXxxxxxx.xxxx.xxx.xxxxxxxxxxx.xxxXxxxxxxxx2021-06-16verifiedWysoki
21XXX.XX.XXX.XXxxxx-xxx-xx-xxx-xx.xxxxxxxxxxx.xxxXxxxxxxxx2021-06-16verifiedWysoki
22XXX.XX.XXX.XXXxxxx-xxx-xx-xxx-xxx.xxxxxxxxxxx.xxxXxxxxxxxx2021-06-16verifiedWysoki
23XXX.XX.XXX.XXxxxxxxxx2020-12-24verifiedWysoki

TTP - Tactics, Techniques, Procedures (14)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueLuki w zabezpieczeniachWektor dostępuRodzajPewność siebie
1T1006CWE-22Path TraversalpredictiveWysoki
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveWysoki
3T1059CWE-94Argument InjectionpredictiveWysoki
4TXXXX.XXXCWE-XX, CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveWysoki
5TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
6TXXXX.XXXCWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveWysoki
7TXXXXCWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveWysoki
8TXXXXCWE-XXXxx XxxxxxxxxpredictiveWysoki
9TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
10TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
11TXXXX.XXXCWE-XXXXxxxxxxxpredictiveWysoki
12TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveWysoki
13TXXXXCWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveWysoki
14TXXXX.XXXCWE-XXXXxx Xxxxxxxxxx XxxxxpredictiveWysoki

IOA - Indicator of Attack (102)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1File%SYSTEMDRIVE%\totalcmd\TOTALCMD64.EXEpredictiveWysoki
2File/cgi-bin/system_mgr.cgipredictiveWysoki
3File/s/predictiveNiski
4File/secure/admin/ImporterFinishedPage.jspapredictiveWysoki
5File/uncpath/predictiveMedium
6File/wbg/core/_includes/authorization.inc.phppredictiveWysoki
7File14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgipredictiveWysoki
8Fileadclick.phppredictiveMedium
9Fileadmin/import/class-import-settings.phppredictiveWysoki
10Fileajax/comments.phppredictiveWysoki
11Filearchitext.confpredictiveWysoki
12Fileattachment_send.phppredictiveWysoki
13Fileauth2-gss.cpredictiveMedium
14Filexxxx/xxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveWysoki
15Filexxxxxxxx.xxxpredictiveMedium
16Filexxx-xxx/xxxxx/xxxxx.xxxpredictiveWysoki
17Filexxxxx.xxxpredictiveMedium
18Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveWysoki
19Filexxxxxx.xxxpredictiveMedium
20Filexxxxx.xxxpredictiveMedium
21Filexxxxxxxx.xxxpredictiveMedium
22Filexxxx.xxxpredictiveMedium
23Filexxxx.xpredictiveNiski
24Filexxxxxxxxx.xxxpredictiveWysoki
25Filexxxxxxxxx.xxxpredictiveWysoki
26Filexxxx.xxxpredictiveMedium
27Filexxxx.xxxpredictiveMedium
28Filexxx/xxxxxx.xxxpredictiveWysoki
29Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveWysoki
30Filexxxxx.xxxpredictiveMedium
31Filexxxxx/xxxxx.xxxpredictiveWysoki
32Filexxxxxx/xxxxx.xpredictiveWysoki
33Filexxxxx.xxxpredictiveMedium
34Filexxxx.xxxpredictiveMedium
35Filexxx_xxxx.xxxpredictiveMedium
36Filexxxxxx.xxxpredictiveMedium
37Filexxxx.xpredictiveNiski
38Filexxxxxxxxxxxxxxx/predictiveWysoki
39Filexxxx.xxxpredictiveMedium
40Filexxxxx.xxxpredictiveMedium
41Filexxxxxxxx.xxxpredictiveMedium
42Filexxxxxxxx.xpredictiveMedium
43Filexxxxxx_xxxxxx.xxxpredictiveWysoki
44Filexxxxxx.xxxpredictiveMedium
45Filexxxxxx\xxxxxxxx\xx_xxxxx_xxxxxxx.xxxpredictiveWysoki
46Filexxxxxxx.xxx.xx.xxxxxxxxxxx.xxxpredictiveWysoki
47Filexxxxxxxxx/xxxxx/xxxx/xxx_xxxxxxx/xxxxxxx/xxxxxxx.xxxpredictiveWysoki
48Filexxxx-xxxxx.xxxpredictiveWysoki
49Filexxxx-xxxxxxxx.xxxpredictiveWysoki
50Filexx_xxxxx.xxxpredictiveMedium
51Filexxxxxxxxxxx.xxxx.xxxpredictiveWysoki
52Filexxxxxxx.xpredictiveMedium
53Filexxxx_xxxxxx.xxxpredictiveWysoki
54Filexxxx.xxxpredictiveMedium
55Filexxx/xxxxx/xxxxx.xxxpredictiveWysoki
56Filexxxxx/xxxxxxxxpredictiveWysoki
57Filexx-xxxxx/xxxxx-xxxx.xxxpredictiveWysoki
58Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxpredictiveWysoki
59Filexxxxxxxxxx.xxxpredictiveWysoki
60FilexxxxxxxpredictiveNiski
61File~/xxxxxxxx/xxxxx-xxx-xxxxxx-xxxxxxxxxxxx.xxxpredictiveWysoki
62Libraryxxxx/xxx/xxxxxx.xxxpredictiveWysoki
63Libraryxxx/xxxxxx/xxxxxxxxx.xxpredictiveWysoki
64Libraryxxxxxxxx.xxxpredictiveMedium
65ArgumentxxxxpredictiveNiski
66Argumentxxxxxx_xx[]predictiveMedium
67ArgumentxxxxxxxxpredictiveMedium
68ArgumentxxxxxpredictiveNiski
69ArgumentxxxxpredictiveNiski
70ArgumentxxxxxxxxxxpredictiveMedium
71ArgumentxxxxxpredictiveNiski
72ArgumentxxxpredictiveNiski
73ArgumentxxxxxxxpredictiveNiski
74ArgumentxxxxxpredictiveNiski
75ArgumentxxxxpredictiveNiski
76ArgumentxxxxpredictiveNiski
77ArgumentxxpredictiveNiski
78Argumentxxxxx.xxx?xxxxxx=xxx_xxxxxxx/xxxx=xxxxxxx/xx=x/xxxxxxxx=xxxxxpredictiveWysoki
79Argumentxxxxxx/xxxxxxxxx/xxxxxx_xxxxpredictiveWysoki
80ArgumentxxxxpredictiveNiski
81Argumentxx_xxxxxxpredictiveMedium
82Argumentxxxxxxx/xxxxxx/xxxxxxx/xxxxxxxxxpredictiveWysoki
83Argumentxxxx_xxxxpredictiveMedium
84ArgumentxxxxxpredictiveNiski
85ArgumentxxxxxxxxpredictiveMedium
86Argumentxxxx_xxxxpredictiveMedium
87ArgumentxxxpredictiveNiski
88ArgumentxxxxxxpredictiveNiski
89ArgumentxxxxpredictiveNiski
90ArgumentxxxxxxpredictiveNiski
91ArgumentxxxpredictiveNiski
92ArgumentxxxpredictiveNiski
93ArgumentxxxxxxpredictiveNiski
94ArgumentxxxxxxxxpredictiveMedium
95Argumentxxxx_xxpredictiveNiski
96Argumentxxx_xxxxxpredictiveMedium
97Argument_xxx_xxxxxxxxxxx_predictiveWysoki
98Argument__xxxxxxxxxpredictiveMedium
99Input ValuexxxxxxxxpredictiveMedium
100Input Valuexxxxxxxxxxxxxxxxxxxxxxxxxxxx+xxxxx+xxxxxx+x,x,xxxx,xxx,x,x+xxxx+xxx_xxxxx+xxxxx+xx=x--+predictiveWysoki
101Network Portxxx/xxxxpredictiveMedium
102Network Portxxx/xxxxxpredictiveMedium

Referencje (6)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!