APT2 Análise

IOB - Indicator of Behavior (95)

Curso de tempo

Idioma

en78
es10
zh6
sv2

País

Actores

Actividades

Interesse

Curso de tempo

Tipo

Fabricante

Produto

Microsoft Windows4
Mozilla Firefox4
Cisco IOS XE4
Oracle Java SE2
ClamAV2

Vulnerabilidades

#VulnerabilidadeBaseTemp0dayHojeExpMasEPSSCTICVE
1Zoho ManageEngine Applications Manager Agent.java Injecção SQL7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.002730.00CVE-2019-19650
2Cisco ASA/Firepower Threat Defense RSA Key Divulgação de Informação6.26.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.001630.02CVE-2022-20866
3TikiWiki tiki-register.php direitos alargados7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.010091.73CVE-2006-6168
4Sun Solaris Negação de Serviço6.26.2$5k-$25k$0-$5kNot DefinedNot Defined0.000440.06CVE-2011-2259
5Spring Boot Admins Notifier env direitos alargados7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002620.02CVE-2022-46166
6ASUS RT-AC51U Network Request Roteiro Cruzado de Sítios3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000620.00CVE-2023-29772
7Zoho ManageEngine Desktop Central HTTP Redirect Divulgação de Informação3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.006120.04CVE-2022-23779
8Dropbear SSH dropbearconvert direitos alargados8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009560.02CVE-2016-7407
9MediaTek MT6983 tinysys Excesso de tampão5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2023-20621
10Router/Firewall Routing direitos alargados7.37.1$0-$5k$0-$5kNot DefinedWorkaround0.015000.00CVE-1999-0510
11Kibana Region Map Roteiro Cruzado de Sítios4.44.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000540.00CVE-2019-7621
12Apple Mac OS X Server Wiki Server Roteiro Cruzado de Sítios4.34.3$5k-$25k$0-$5kNot DefinedNot Defined0.002630.04CVE-2009-2814
13ajenti API direitos alargados7.16.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.012850.08CVE-2019-25066
14Oracle MySQL Server InnoDB Privilege Escalation9.19.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.013810.05CVE-2016-9843
15Redmine Issues API direitos alargados7.67.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001440.03CVE-2021-30164
16Google Go WASM module Excesso de tampão5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.006050.00CVE-2021-38297
17D-Link DIR-867/DIR-878/DIR-882 Remote Code Execution7.57.5$5k-$25k$5k-$25kNot DefinedNot Defined0.002400.00CVE-2020-8863
18Ruckus Wireless C110 webs Divulgação de Informação6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.004720.00CVE-2020-13918
19Cisco IOS XE Easy Virtual Switching System Excesso de tampão8.98.5$25k-$100k$5k-$25kNot DefinedOfficial Fix0.004380.03CVE-2021-1451

Campanhas (1)

These are the campaigns that can be associated with the actor:

  • Putter Panda

IOC - Indicator of Compromise (42)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDEndereço IPHostnameActorCampanhasIdentifiedTipoAceitação
131.170.110.163io.uu3.netAPT2Putter Panda01/01/2021verifiedAlto
258.196.156.15APT2Putter Panda01/01/2021verifiedAlto
359.120.168.19959-120-168-199.hinet-ip.hinet.netAPT220/12/2020verifiedAlto
461.34.97.69APT220/12/2020verifiedAlto
561.74.190.14APT220/12/2020verifiedAlto
661.78.37.121APT220/12/2020verifiedAlto
761.78.75.96APT220/12/2020verifiedAlto
861.221.54.9961-221-54-99.hinet-ip.hinet.netAPT220/12/2020verifiedAlto
967.42.255.50mail.provocc.orgAPT220/12/2020verifiedAlto
10XXX.XX.XXX.XXXxxxxxxx.xxxxxx.xxXxxxXxxxxx Xxxxx01/01/2021verifiedAlto
11XXX.XXX.XXX.XXXXxxx20/12/2020verifiedAlto
12XXX.XXX.XXX.XXXxxxxxxx.xxxx.xxx.xxxxx.xxxXxxx20/12/2020verifiedAlto
13XXX.XXX.XX.XXXxxxxxxxx.xx.xxx.xxx.xxXxxx20/12/2020verifiedAlto
14XXX.XXX.XX.Xxxxxxxxxxx.xx.xxx.xxx.xxXxxx20/12/2020verifiedAlto
15XXX.XXX.XX.XXXxx-xx-xxx.xx.xxxx.xxx.xxXxxx20/12/2020verifiedAlto
16XXX.XXX.XXX.XXxxxxxxx.xx.xxxx.xxx.xxXxxx20/12/2020verifiedAlto
17XXX.XXX.XX.XXxxxxxxxxx.xxxx.xxx.xxXxxx20/12/2020verifiedAlto
18XXX.XXX.XX.XXXxxx-xxx-xx-xxx.xxxxxx.xxxxx.xxxXxxx20/12/2020verifiedAlto
19XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xxxxxxxxxxxxxx.xxxXxxx20/12/2020verifiedAlto
20XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xxxxxxxxxxxxxx.xxxXxxx20/12/2020verifiedAlto
21XXX.XXX.XXX.XXxxx20/12/2020verifiedAlto
22XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxxxxxxxx.xxxxxxx.xxxXxxx20/12/2020verifiedAlto
23XXX.XXX.XX.XXXxxxx.xxxxxxxxx.xxxxxxx.xx.xxXxxx20/12/2020verifiedAlto
24XXX.XX.XXX.XXXxxxxxxxxxx.xxxXxxx20/12/2020verifiedAlto
25XXX.XXX.XXX.XXXXxxx20/12/2020verifiedAlto
26XXX.XXX.XX.XXXxxx20/12/2020verifiedAlto
27XXX.X.XX.XXXxxx20/12/2020verifiedAlto
28XXX.X.XX.XXXxxx20/12/2020verifiedAlto
29XXX.XX.XXX.XXXXxxx20/12/2020verifiedAlto
30XXX.XXX.XX.XXxxxxx-xxx-xx-xx.xxxx.xxxxxx.xxxx.xxx.xxXxxx20/12/2020verifiedAlto
31XXX.XX.XX.XXxxx-xx-xx-xx.xxxxx-xx.xxxxx.xxxXxxx20/12/2020verifiedAlto
32XXX.XX.XX.XXXxxx-xx-xx-xxx.xxxxx-xx.xxxxx.xxxXxxx20/12/2020verifiedAlto
33XXX.XX.XXX.XXXxxx20/12/2020verifiedAlto
34XXX.XXX.XXX.XXXxxxx.xxxxxxxxx.xxXxxx20/12/2020verifiedAlto
35XXX.XXX.XXX.XXXxxxxxxx.xxxxxxxxx.xxx.xxXxxxXxxxxx Xxxxx01/01/2021verifiedAlto
36XXX.XXX.XX.XXXxxx20/12/2020verifiedAlto
37XXX.XXX.XX.XXXXxxx20/12/2020verifiedAlto
38XXX.XXX.XX.XXXxxx20/12/2020verifiedAlto
39XXX.XXX.XX.XXXxxx20/12/2020verifiedAlto
40XXX.XXX.XX.XXXXxxx20/12/2020verifiedAlto
41XXX.XXX.XXX.XXxxx20/12/2020verifiedAlto
42XXX.XXX.XX.XXXXxxx20/12/2020verifiedAlto

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilidadesTipo de acessoTipoAceitação
1T1006CWE-22Path TraversalpredictiveAlto
2T1059CWE-94Argument InjectionpredictiveAlto
3TXXXX.XXXCWE-XX, CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveAlto
4TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveAlto
5TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveAlto
6TXXXXCWE-XXXXxxxxxxxxx XxxxxxpredictiveAlto
7TXXXXCWE-XXXxx XxxxxxxxxpredictiveAlto
8TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveAlto
9TXXXXCWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveAlto
10TXXXX.XXXCWE-XXXXxx Xxxxxxxxxx XxxxxpredictiveAlto

IOA - Indicator of Attack (33)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTipoAceitação
1File/admin/blog/blogcategory/add/?_to_field=id&_popup=1predictiveAlto
2File/bin/boapredictiveMédio
3File/DOWN/FIRMWAREUPDATE/ROM1predictiveAlto
4File/envpredictiveBaixo
5Filexxxxx/xxxxx/xxxxxxxxx.xxxxpredictiveAlto
6Filexxxxxxxx.xxxpredictiveMédio
7Filexxxxxx-xxxxxx.xxxxpredictiveAlto
8Filexxxxxxxxxx.xxxpredictiveAlto
9Filexxxx/xxxxxxxxxxxx.xxxpredictiveAlto
10Filexxxxxxx/xxx/xxxxxxxxx/xxxxx.xpredictiveAlto
11Filexxxxxxxx/xxxx/xxxxxxxx.xxxpredictiveAlto
12Filexxxxxxxx/xxxx.xxx.xxxpredictiveAlto
13Filexxxxx.xxxpredictiveMédio
14Filexxx_xxxxxxxx.xpredictiveAlto
15Filexxxxxx/xxxxx.xxxpredictiveAlto
16Filexxxx-xxxxxxxx.xxxpredictiveAlto
17Filexxxxxxx_xxx.xxxpredictiveAlto
18Libraryxxx_xxxxx_xxxxxxxpredictiveAlto
19Libraryxxxxxxxx.xxxpredictiveMédio
20ArgumentxxxxxxxpredictiveBaixo
21ArgumentxxxxxxxxxxxxxpredictiveAlto
22Argumentxxxxxxx-xxxxxxpredictiveAlto
23Argumentxxx_xxxxpredictiveMédio
24ArgumentxxxxxxxxpredictiveMédio
25Argumentxxxxx_xxpredictiveMédio
26Argumentxxxxxxxxx_xxxxxxxx_xxxxpredictiveAlto
27Argumentxxxx_xxxxxxpredictiveMédio
28ArgumentxxxxxxpredictiveBaixo
29ArgumentxxxxxxxpredictiveBaixo
30ArgumentxxxxxpredictiveBaixo
31ArgumentxxxxpredictiveBaixo
32ArgumentxxxxxxxxpredictiveMédio
33Patternxxxxxxx-xxxxxx|xx|predictiveAlto

Referências (3)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!