DarkCrystalRAT Análise

IOB - Indicator of Behavior (260)

Curso de tempo

Idioma

en228
es12
ru10
fr6
de4

País

us58
ru20
es16
ro6
de6

Actores

Actividades

Interesse

Curso de tempo

Tipo

Fabricante

Produto

Juniper Junos OS12
Microsoft Windows8
SAP Solution Manager6
Netgear RBK406
Qualcomm Snapdragon Auto6

Vulnerabilidades

#VulnerabilidadeBaseTemp0dayHojeExpMasEPSSCTICVE
1PHP Link Directory Administration Page index.html Roteiro Cruzado de Sítios4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.003740.38CVE-2007-0529
2DZCP deV!L`z Clanportal config.php direitos alargados7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009431.01CVE-2010-0966
3Microsoft Windows New Horizon Data Systems Boot Loader Privilege Escalation6.16.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000650.02CVE-2022-34302
4Rockwell Automation RSLinx Enterprise Service Port 4444 LogReceiver.exe Divulgação de Informação7.47.3$0-$5k$0-$5kNot DefinedWorkaround0.000560.02CVE-2013-2807
5Microsoft Windows WDAC OLE DB Provider for SQL Server Remote Code Execution8.88.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.001060.04CVE-2024-21391
6Watchguard Firebox/XTM Remote Code Execution6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.841700.03CVE-2022-26318
7Zentrack index.php direitos alargados7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.03
8Microsoft IIS Roteiro Cruzado de Sítios5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.08CVE-2017-0055
9Matrix Synap JSON Negação de Serviço5.95.6$0-$5k$0-$5kNot DefinedOfficial Fix0.006640.00CVE-2020-26890
10Invision Power Services IP.Board URL Negação de Serviço5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001640.02CVE-2015-6812
11TypeORM Prototype Remote Code Execution8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.003010.00CVE-2020-8158
12Fortinet FortiGate Log direitos alargados4.03.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000890.04CVE-2020-12818
13Softaculous Loginizer Plugin Falsificação de Pedido Cross Site5.85.8$0-$5k$0-$5kNot DefinedNot Defined0.000580.00CVE-2022-45079
14Terrasoft Bpm'online CRM-System SDK Terrasoft.Core.DB.Column.Const Injecção SQL8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.001380.03CVE-2019-15301
15Sudo Environment Variable direitos alargados8.37.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000500.00CVE-2023-22809
16Page Engine CMS login_include.php direitos alargados5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.00
17D-Link DIR-816L/DIR-803 URL Encoding info.php Roteiro Cruzado de Sítios5.25.2$5k-$25k$5k-$25kNot DefinedUnavailable0.001110.00CVE-2020-25786
18Pivotal Spring Framework Directório Traversal5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.004790.05CVE-2014-3625
19Fortinet FortiOS/FortiProxy Administrative Interface Fraca autenticação9.89.7$25k-$100k$5k-$25kNot DefinedOfficial Fix0.971690.00CVE-2022-40684
20VMware ESXi settingsd Condição de Corrida7.26.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.001010.02CVE-2021-22043

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (20)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (100)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTipoAceitação
1File/backupsettings.confpredictiveAlto
2File/exportpredictiveBaixo
3File/horde/util/go.phppredictiveAlto
4File/show_news.phppredictiveAlto
5File/uncpath/predictiveMédio
6Fileadclick.phppredictiveMédio
7Fileadmin/dashboard.phppredictiveAlto
8Fileadmin/index.phppredictiveAlto
9Fileadmin/tools/dolibarr_export.phppredictiveAlto
10Fileadv_remotelog.asppredictiveAlto
11Fileapi.phppredictiveBaixo
12Filexxx/xxxxx/xxxxxxxxxx/xxxx.xxxpredictiveAlto
13Filexxxx-xxxx.xpredictiveMédio
14Filexxxxxxx.xxpredictiveMédio
15Filexxxx.xxxpredictiveMédio
16Filex:\xxxxxxxxxxpredictiveAlto
17Filexxx.xxxpredictiveBaixo
18Filexxx.xxxpredictiveBaixo
19Filexxx_xxx_xxx.xxxpredictiveAlto
20Filexxxxxxxxxx.xxxxxx.xxxpredictiveAlto
21Filexxxxxxxxxx_xxxxx.xxxpredictiveAlto
22Filexxxxxx.xxpredictiveMédio
23Filexxxx/xxx/xxxxx/xxxxxxxxxxx/xxxxxxxxxxxxxxxxxxxx.xxxxxxxxpredictiveAlto
24Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveAlto
25Filexxxxxxxxxx_xxxxxx.xpredictiveAlto
26Filexxx.xxxpredictiveBaixo
27Filexxxxxxx.xxxpredictiveMédio
28Filexxxxx.xxxpredictiveMédio
29Filexxxxx.xxxpredictiveMédio
30Filexxxxxxxx/xxxxxx/xxxxx.xxxpredictiveAlto
31Filexxxxxxxx.xxxpredictiveMédio
32Filexxxxxx/x.xxxpredictiveMédio
33Filexxx/xxxxxx.xxxpredictiveAlto
34Filexxxxxxxx/xxxxxxx/xxxxx_xxxxxxx.xxxpredictiveAlto
35Filexxxxx.xxxxpredictiveMédio
36Filexxxxx.xxxpredictiveMédio
37Filexx xxx/xxxx/xxxx.xpredictiveAlto
38Filexxx/xxxxxx.xxxpredictiveAlto
39Filexxxxxx/xxx/xxxxxxxx.xpredictiveAlto
40Filexxxxxxxxxxx/xx_xxxxxxxxxx.xpredictiveAlto
41Filexxxx/xxxxxxx/xxxxxxxxxxxxx.xxpredictiveAlto
42Filexxxx/xxxxxxx/xxxxxxx.xpredictiveAlto
43Filexxxxx.xxxpredictiveMédio
44Filexxxxxxxxxxx.xxxpredictiveAlto
45Filexxxx/xxxxxxxx/xxxxxx_xxxx.xxxpredictiveAlto
46Filexxxxxxx/xxxxxxxx/xxxxxxxx/xxxxxx.xxxpredictiveAlto
47Filexxxxx.xxxpredictiveMédio
48Filexxxxxxxxx/xxxx-xxxxpredictiveAlto
49Filexxxxxxx.xxxpredictiveMédio
50Filexxxxxxxxxxxx.xxpredictiveAlto
51Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveAlto
52Filexxxxxx.xpredictiveMédio
53Filexxxx_xxxxxxx.xxxpredictiveAlto
54Filexxxxx.xpredictiveBaixo
55Filexxxx.xxpredictiveBaixo
56Filexxxxxxxx.xxxpredictiveMédio
57Filexxxxxx.xxxpredictiveMédio
58Filexxxxxxxx/xxxxx_xxxxxpredictiveAlto
59Filexxxx-xxxxxxx-xxxxxx.xxxpredictiveAlto
60Filexxxxxx/xx/xxxx.xxxpredictiveAlto
61Filexx-xxxxx/xxxxxxxx/xxxxx-xx-xxxxx-xxxx.xxxpredictiveAlto
62Filexx-xxxx.xxxpredictiveMédio
63Filexx/xxx.xxxpredictiveMédio
64File~/xxx/xxxx-xxxxxxxxx.xxxpredictiveAlto
65ArgumentxxxxxxxxpredictiveMédio
66Argumentxxx_xxxxxx_xpredictiveMédio
67ArgumentxxxpredictiveBaixo
68ArgumentxxxxxxpredictiveBaixo
69ArgumentxxxxxxxxxxpredictiveMédio
70ArgumentxxxxpredictiveBaixo
71ArgumentxxxxxxxxxxxxpredictiveMédio
72Argumentxxxxx xxxx/xxxx xxxxpredictiveAlto
73ArgumentxxxxxxxpredictiveBaixo
74ArgumentxxxxxpredictiveBaixo
75Argumentxxxx_xxxpredictiveMédio
76ArgumentxxxxpredictiveBaixo
77ArgumentxxpredictiveBaixo
78Argumentxx_xxxxxxxpredictiveMédio
79ArgumentxxxxxxpredictiveBaixo
80Argumentxxxxxxxx_xxxpredictiveMédio
81ArgumentxxxxpredictiveBaixo
82Argumentx_xxx_xxxxxxpredictiveMédio
83ArgumentxxxxxxxxxxxxpredictiveMédio
84Argumentxxxx_xxxxxpredictiveMédio
85ArgumentxxxxxxxxpredictiveMédio
86ArgumentxxxxxxxxxxxpredictiveMédio
87ArgumentxxxxxxxxxpredictiveMédio
88Argumentxxxx_xxxxxx/xxxxxx/xxxxxxpredictiveAlto
89ArgumentxxxxxxxxxxxxxxxxpredictiveAlto
90ArgumentxxxxxpredictiveBaixo
91ArgumentxxxxpredictiveBaixo
92ArgumentxxxpredictiveBaixo
93ArgumentxxxpredictiveBaixo
94ArgumentxxxxpredictiveBaixo
95ArgumentxxxxxpredictiveBaixo
96Argumentxxxxxxxxxxx_xxxxxxxxpredictiveAlto
97Input Valuex.x.x.x%xxxxxx+-x+x+xxx.xxx.x.xx%xxpredictiveAlto
98Input Valuexxx (xxxxxx xxxx xxxx(xxxxxx xxxxx(*),xxxxxx(xxxxxxxxxxxx,(xxxxxx (xxx(xxxx=xxxx,x))),xxxxxxxxxxxx,xxxxx(xxxx(x)*x))x xxxx xxxxxxxxxxx_xxxxxx.xxxxxxxxx_xxxx xxxxx xx x)x)predictiveAlto
99Network Portxxx/xxxxxpredictiveMédio
100Network Portxxx/xxxxpredictiveMédio

Referências (3)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!