Brushaloader Análise

IOB - Indicator of Behavior (60)

Curso de tempo

Idioma

en46
de6
pl4
it2
fr2

País

us48
ir6
cn2

Actores

Actividades

Interesse

Curso de tempo

Tipo

Fabricante

Produto

Devilz Clanportal4
Microsoft IIS4
Readdle Documents App2
Siemens SIMATIC Drive Controller2
Siemens SIMATIC ET 200SP Open Controller CPU 1515S ...2

Vulnerabilidades

#VulnerabilidadeBaseTemp0dayHojeExpMasEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash Divulgação de Informação5.35.2$5k-$25k$0-$5kHighWorkaround0.020160.02CVE-2007-1192
2DZCP deV!L`z Clanportal config.php direitos alargados7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.70CVE-2010-0966
3DZCP deV!L`z Clanportal browser.php Divulgação de Informação5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.027331.23CVE-2007-1167
4Siemens SIMATIC Drive Controller Service Port 102 Excesso de tampão7.37.1$5k-$25k$5k-$25kNot DefinedWorkaround0.005260.02CVE-2020-15782
5Siemens SIMATIC S7-1200 PLC Excesso de tampão7.57.5$5k-$25k$0-$5kNot DefinedNot Defined0.002610.02CVE-2013-0700
6Devilz Clanportal File Upload vulnerabilidade desconhecida5.34.4$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.053620.07CVE-2006-6338
7MGB OpenSource Guestbook email.php Injecção SQL7.37.3$0-$5k$0-$5kHighUnavailable0.013021.36CVE-2007-0354
8nginx direitos alargados6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002413.72CVE-2020-12440
9PHP Proxy Fraca autenticação6.45.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.034700.00CVE-2018-19458
10Apple watchOS Font Remote Code Execution7.06.9$0-$5k$0-$5kHighOfficial Fix0.000730.07CVE-2023-41990
11Filebrowser Falsificação de Pedido Cross Site6.96.4$0-$5k$0-$5kFunctionalOfficial Fix0.007010.03CVE-2021-46398
12cURL SOCKS5 Proxy Excesso de tampão4.64.4$0-$5k$0-$5kNot DefinedOfficial Fix0.003190.02CVE-2023-38545
13Phplinkdirectory PHP Link Directory conf_users_edit.php Falsificação de Pedido Cross Site6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.005260.04CVE-2011-0643
14LogicBoard CMS away.php Redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.000002.32
15Xoops URL Filter index.php Redirect6.66.4$0-$5k$0-$5kNot DefinedNot Defined0.000620.04CVE-2017-12138
16PHP phpinfo Roteiro Cruzado de Sítios4.33.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.021010.04CVE-2007-1287
17Digium Asterisk SDP Negotiation res_pjsip_session.c Negação de Serviço5.15.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001930.00CVE-2021-26906
18Siemens SIMATIC S7-300 PN/SIMATIC S7-400 PN direitos alargados6.46.3$5k-$25k$0-$5kNot DefinedWorkaround0.003730.02CVE-2016-9158
19BloodHound GenericAll.jsx direitos alargados7.97.9$0-$5k$0-$5kNot DefinedOfficial Fix0.005370.02CVE-2021-3210
20Microsoft IIS direitos alargados9.99.9$25k-$100k$5k-$25kNot DefinedNot Defined0.088750.04CVE-2010-1256

IOC - Indicator of Compromise (40)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDEndereço IPHostnameActorCampanhasIdentifiedTipoAceitação
164.110.25.146webmail.jqluvhost.netBrushaloader12/04/2022verifiedAlto
264.110.25.147webmail.jqluvhost.netBrushaloader12/04/2022verifiedAlto
364.110.25.148xaeoi7a.npermit.topBrushaloader12/04/2022verifiedAlto
464.110.25.150webmail.jqluvhost.netBrushaloader12/04/2022verifiedAlto
564.110.25.151moiu0ae.lplaced.topBrushaloader12/04/2022verifiedAlto
664.110.25.152h2iuode.hairrestoredfast.topBrushaloader12/04/2022verifiedAlto
764.110.25.153vaxoiu5.shadego.topBrushaloader12/04/2022verifiedAlto
864.110.25.154nae2oiu.sidedgo.topBrushaloader12/04/2022verifiedAlto
9XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
10XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
11XXX.XXX.XXX.XXXxxxxxxxxxxx12/04/2022verifiedAlto
12XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
13XXX.XXX.XX.XXXXxxxxxxxxxxx12/04/2022verifiedAlto
14XXX.X.XX.XXXxxx-x-xx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
15XXX.X.XX.XXXxxx-x-xx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
16XXX.X.XX.XXxxx-x-xx-xx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
17XXX.X.XX.XXxxx-x-xx-xx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
18XXX.X.XX.XXxxx-x-xx-xx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
19XXX.X.XX.XXxxx-x-xx-xx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
20XXX.X.XX.XXxxx-x-xx-xx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
21XXX.X.XXX.XXXxxxx.xxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
22XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
23XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
24XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
25XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
26XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
27XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
28XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
29XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
30XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
31XXX.X.XXX.XXXxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
32XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
33XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
34XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
35XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
36XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
37XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
38XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
39XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto
40XXX.X.XXX.XXXxxx-x-xxx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxxxxxx12/04/2022verifiedAlto

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (28)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTipoAceitação
1File/forum/away.phppredictiveAlto
2File/horde/util/go.phppredictiveAlto
3File/modules/profile/index.phppredictiveAlto
4Fileadmin/conf_users_edit.phppredictiveAlto
5Filexxxxxxx_xxx.xxxpredictiveAlto
6Filexxxxxxxxxx/xxxxxx/xxxxxxxxx/xxxxxxxxxx/xxxxxxxxxx.xxxpredictiveAlto
7Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveAlto
8Filexxxxx.xxxpredictiveMédio
9Filexxxx.xxxpredictiveMédio
10Filexxx/xxxxxx.xxxpredictiveAlto
11Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveAlto
12Filexxxxx.xxxpredictiveMédio
13Filexxxxx.xxx?x=xxxx://predictiveAlto
14Filexxxx/xxxxxx/xxxxx.xxxpredictiveAlto
15Filexxxx/xxxxxxxxxxx-xxxxxx-xxxxx.xxxpredictiveAlto
16Filexxx_xxxx.xxxpredictiveMédio
17Filexxxxxxxx.xxxpredictiveMédio
18Filexxx_xxxxx_xxxxxxx.xpredictiveAlto
19ArgumentxxxxxxpredictiveBaixo
20ArgumentxxxxxxxxpredictiveMédio
21ArgumentxxxxxxxpredictiveBaixo
22ArgumentxxxxpredictiveBaixo
23Argumentxxxx_xxxxxpredictiveMédio
24ArgumentxxpredictiveBaixo
25ArgumentxxxxxxxxpredictiveMédio
26Argumentxxxx_xxxxpredictiveMédio
27ArgumentxxxpredictiveBaixo
28Network Portxxx/xxpredictiveBaixo

Referências (2)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!