Gootloader Анализ

IOB - Indicator of Behavior (138)

Временная шкала

Язык

en136
pl2

Страна

Акторы

Деятельность

Интерес

Временная шкала

Тип

Поставщик

Продукт

Apple macOS6
Adobe After Effects4
Google Android4
Microsoft Windows4
cPanel2

Уязвимости

#УязвимостиBaseTemp0dayСегодняЭ�RemCTIEPSSCVE
1AXIS 2110 Network Camera getparam.cgi отказ в обслуживании9.89.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.030.03461CVE-2004-2427
2onnx ONNX_ASSERTM раскрытие информации4.94.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00045CVE-2024-27319
3Google Android Codec2BufferUtils.cpp ConvertRGBToPlanarYUV повреждение памяти5.35.1$5k-$25k$5k-$25kNot DefinedOfficial Fix0.020.00043CVE-2024-0023
47-card Fakabao alipay_notify.php sql-инъекция5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.050.00064CVE-2023-7183
5Scott Paterson Easy PayPal Shopping Cart Plugin межсайтовый скриптинг5.15.1$0-$5k$0-$5kNot DefinedNot Defined0.020.00045CVE-2023-47239
6AWeber Free Sign Up Form and Landing Page Builder for Lead Generation and Email Newsletter Growth Plugin неизвестная уязвимость5.85.8$0-$5k$0-$5kNot DefinedNot Defined0.020.00058CVE-2023-47757
7Guillemant David WP Full Auto Tags Manager Plugin неизвестная уязвимость6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00058CVE-2023-34024
8WPML Multilingual CMS Premium Plugin неизвестная уязвимость6.26.1$0-$5k$0-$5kNot DefinedNot Defined0.010.00063CVE-2022-45071
9Os Commerce межсайтовый скриптинг6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00049CVE-2023-43718
10Dolibarr межсайтовый скриптинг5.05.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00046CVE-2023-5323
11WordPress Password Reset wp-login.php mail эскалация привилегий6.15.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.300.02827CVE-2017-8295
12NextGen GalleryView Plugin межсайтовый скриптинг5.65.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00046CVE-2023-35098
13HPE iLO 5 Local Privilege Escalation7.37.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.010.00042CVE-2022-28634
14HPE iLO 5 Remote Code Execution8.17.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.080.00058CVE-2022-28633
15BTCPay Server POS Add Products межсайтовый скриптинг3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.020.00054CVE-2021-29250
16Stripe API v1 Access Restriction tokens слабая аутентификация7.47.4$0-$5kРасчетNot DefinedNot Defined0.040.00260CVE-2018-19249
17ffjpeg JPEG Image jfif.c jfif_decode повреждение памяти4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.000.00073CVE-2020-23852
18ffjpeg jfif.c отказ в обслуживании5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.000.00072CVE-2022-35433
19Cisco Catalyst 2960-L/Catalyst CDB-8P 802.1x эскалация привилегий5.95.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00058CVE-2020-3231
20pfSense pkg.php echo Privilege Escalation5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00093CVE-2022-23993

Кампании (1)

These are the campaigns that can be associated with the actor:

  • Cobalt Strike

IOC - Indicator of Compromise (8)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-адресHostnameАкторКампанииIdentifiedТипУверенность
15.8.18.7Gootloader14.09.2023verifiedВысокий
235.206.117.6464.117.206.35.bc.googleusercontent.comGootloader09.05.2022verifiedСредний
3XX.XXX.XXX.XXXxxxx.x-xxxxxxxx.xxXxxxxxxxxxXxxxxx Xxxxxx09.11.2023verifiedВысокий
4XX.XXX.XXX.XXXxxxxxxxxxXxxxxx Xxxxxx09.11.2023verifiedВысокий
5XX.XXX.XXX.XXXXxxxxxxxxxXxxxxx Xxxxxx09.11.2023verifiedВысокий
6XXX.XX.XXX.XXxxx.xx.xxx.xx.xxxxxxxxxxxxxxxx.xxxXxxxxxxxxxXxxxxx Xxxxxx09.11.2023verifiedВысокий
7XXX.XXX.XXX.XXXxxxxxxxxx04.01.2022verifiedВысокий
8XXX.XX.XX.XXXxxxxxxxxxXxxxxx Xxxxxx09.11.2023verifiedВысокий

TTP - Tactics, Techniques, Procedures (18)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueУязвимостиВектор доступаТипУверенность
1T1006CWE-21, CWE-22Path TraversalpredictiveВысокий
2T1040CWE-294Authentication Bypass by Capture-replaypredictiveВысокий
3T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveВысокий
4T1059CWE-94Argument InjectionpredictiveВысокий
5TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveВысокий
6TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
7TXXXXCWE-XXXXxxx Xxx Xxxxxxxxx Xxxxxxxxxxx XxxxxxxxpredictiveВысокий
8TXXXX.XXXCWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveВысокий
9TXXXXCWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveВысокий
10TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveВысокий
11TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxpredictiveВысокий
12TXXXXCWE-XXXxx XxxxxxxxxpredictiveВысокий
13TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveВысокий
14TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
15TXXXXCWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveВысокий
16TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveВысокий
17TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveВысокий
18TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveВысокий

IOA - Indicator of Attack (61)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDКлассIndicatorТипУверенность
1File/etc/postfix/sender_loginpredictiveВысокий
2File/forms/web_importTFTPpredictiveВысокий
3File/goform/openSchedWifipredictiveВысокий
4File/src/jfif.cpredictiveСредний
5File/usr/local/www/pkg.phppredictiveВысокий
6File/v1/tokenspredictiveСредний
7Fileadmin.phppredictiveСредний
8Filexxxxx/xxxxxxxx.xxxpredictiveВысокий
9Filexxxxx/xxxxx.xxxpredictiveВысокий
10FilexxxxpredictiveНизкий
11Filexxx/xxxxxx/xxxxxxxxxxxxx/xxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxpredictiveВысокий
12Filexxxx/xxxxxx.xpredictiveВысокий
13Filexxxxxxxxxxxxxxxxx.xxxpredictiveВысокий
14Filexxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveВысокий
15Filexxxxxxxxx.xxxpredictiveВысокий
16Filexxxxxxx/xxx/xxxxxxxxxx/xxxxx.xpredictiveВысокий
17Filexxxxxxx/xxx/xxxx/xxxxxx.xpredictiveВысокий
18Filexxxxxxx.xxxpredictiveСредний
19Filexxxxxx/xxx/xxxx.xpredictiveВысокий
20Filexxx/xxxx_xxxx.xpredictiveВысокий
21Filexxx/xxxxxxxxxx.xpredictiveВысокий
22Filexxxx/xxxxxx.xpredictiveВысокий
23Filexxxxx.xxxpredictiveСредний
24FilexxxxxxxpredictiveНизкий
25Filexxxxxxxx.xxxpredictiveСредний
26Filexxxxxxxxxxxx.xxxpredictiveВысокий
27Filexxxxx/xxxxxxxx.xxx.xxxpredictiveВысокий
28Filexxxxxxxxxx.xpredictiveСредний
29Filexxxxxx/xxxxx/xxxxxxx/xxxxxxxxxx.xxxpredictiveВысокий
30Filexxxxxxx.xxxxpredictiveСредний
31Filexxxxxxx.xxpredictiveСредний
32Filexxxx/xxxxxx_xxxxxx.xxxpredictiveВысокий
33Filexxxxxxxxxxxx.xxxpredictiveВысокий
34Filexxxxx/xxxxx.xxx?xxxxxxxxxxx_xx=xxxxpredictiveВысокий
35Filexx-xxxxx.xxxpredictiveСредний
36Library/xxx/xxx_xx-xxxxx-xxx/xxxx.xx.xpredictiveВысокий
37Argument$_xxxxxxx['xxx_xxxxxx']predictiveВысокий
38ArgumentxxxxxxpredictiveНизкий
39ArgumentxxxpredictiveНизкий
40ArgumentxxxxxxxxxxpredictiveСредний
41ArgumentxxxxxxxxpredictiveСредний
42ArgumentxxxxxxxxpredictiveСредний
43ArgumentxxxxpredictiveНизкий
44ArgumentxxpredictiveНизкий
45Argumentxxx[xxxx_xx]predictiveСредний
46ArgumentxxxxxxpredictiveНизкий
47Argumentxxxxxxx_xxxxxx_xxxxx[x]predictiveВысокий
48ArgumentxxxxxxpredictiveНизкий
49Argumentxxxxx_xxxxx[xxxxxxxxx_xxxx_xxx]/xxxxx_xxxxx[xxxxxxxxx_xxxxxx_xxx]/xxxxx_xxxxx[xxxxxxxxx_xxxx]/xxxxx_xxxxx[xxxx_xxxxxx]predictiveВысокий
50Argumentxxx_xxxxx_xxpredictiveСредний
51ArgumentxxxxxxpredictiveНизкий
52Argumentxxxxxxxxxxxxxx/xxxxxxxxxxxxpredictiveВысокий
53ArgumentxxxxxxxxpredictiveСредний
54ArgumentxxxxxxxpredictiveНизкий
55ArgumentxxxxxpredictiveНизкий
56Input Value/../predictiveНизкий
57Input ValuexxxxxxxxxxpredictiveСредний
58Input Valuex+xxxx (xxxxx xxxxxx xxxxxxx) xxx x+xxxx (xxxxx-xx-xxxx xxxxxxx)predictiveВысокий
59Input Value\xxx../../../../xxx/xxxxxxpredictiveВысокий
60Input Value\xxx\xxxpredictiveСредний
61Network Portxxx/xxxxpredictiveСредний

Ссылки (5)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!