Neutrino Exploit Kit Анализ
IOB - Indicator of Behavior (99)
Деятельность
Интерес
Уязвимости
IOC - Indicator of Compromise (9)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | IP-адрес | Hostname | Актор | Кампании | Identified | Тип | Уверенность |
---|---|---|---|---|---|---|---|
1 | 45.32.183.118 | 45.32.183.118.vultrusercontent.com | Neutrino Exploit Kit | 01.04.2022 | verified | Высокий | |
2 | 78.136.221.141 | Neutrino Exploit Kit | 06.04.2022 | verified | Высокий | ||
3 | XX.XX.X.XX | Xxxxxxxx Xxxxxxx Xxx | 01.04.2022 | verified | Высокий | ||
4 | XX.XXX.XXX.X | xxxx-xxxxxxxx-xxxxxx.xxxx.xxxxxx.xxx | Xxxxxxxx Xxxxxxx Xxx | 06.04.2022 | verified | Высокий | |
5 | XX.XXX.XXX.X | xxx.xxxxxx.xx | Xxxxxxxx Xxxxxxx Xxx | 06.04.2022 | verified | Высокий | |
6 | XX.XX.XXX.XXX | xx-xx-xxx-xxx.xxxxx.xxx.xx | Xxxxxxxx Xxxxxxx Xxx | 06.04.2022 | verified | Высокий | |
7 | XXX.XX.X.XXX | Xxxxxxxx Xxxxxxx Xxx | 06.04.2022 | verified | Высокий | ||
8 | XXX.X.XXX.X | Xxxxxxxx Xxxxxxx Xxx | 01.04.2022 | verified | Высокий | ||
9 | XXX.XXX.XXX.XX | xxxxxx-xx.xxxxxx-xxxxx.xxx | Xxxxxxxx Xxxxxxx Xxx | 06.04.2022 | verified | Высокий |
TTP - Tactics, Techniques, Procedures (15)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Уязвимости | Вектор доступа | Тип | Уверенность |
---|---|---|---|---|---|
1 | T1006 | CWE-22 | Path Traversal | predictive | Высокий |
2 | T1055 | CWE-74 | Improper Neutralization of Data within XPath Expressions | predictive | Высокий |
3 | T1059 | CWE-94 | Argument Injection | predictive | Высокий |
4 | TXXXX.XXX | CWE-XX, CWE-XX | Xxxxx Xxxx Xxxxxxxxx | predictive | Высокий |
5 | TXXXX | CWE-XXX, CWE-XXX, CWE-XXX | Xxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxx | predictive | Высокий |
6 | TXXXX | CWE-XX, CWE-XX | Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx | predictive | Высокий |
7 | TXXXX.XXX | CWE-XXX | Xxxx Xxxxxxxx | predictive | Высокий |
8 | TXXXX | CWE-XXX | 7xx Xxxxxxxx Xxxxxxxx | predictive | Высокий |
9 | TXXXX | CWE-XXX | Xxxxxxxxxx Xxxxxx | predictive | Высокий |
10 | TXXXX | CWE-XX | Xxx Xxxxxxxxx | predictive | Высокий |
11 | TXXXX | CWE-XXX | Xxxxxxxxxxx Xxxxxxxxxx | predictive | Высокий |
12 | TXXXX | CWE-XXX | Xxxxxxxxx Xxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxx | predictive | Высокий |
13 | TXXXX | CWE-XXX | Xxxxxxxxx Xxxxxx Xxxx | predictive | Высокий |
14 | TXXXX | CWE-XXX | Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx | predictive | Высокий |
15 | TXXXX | CWE-XXX | Xxxxxxxxxxxxx Xxxxxx | predictive | Высокий |
IOA - Indicator of Attack (55)
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.
ID | Класс | Indicator | Тип | Уверенность |
---|---|---|---|---|
1 | File | /etc/sudoers | predictive | Средний |
2 | File | /forum/away.php | predictive | Высокий |
3 | File | /uncpath/ | predictive | Средний |
4 | File | arch/x86/kernel/paravirt.c | predictive | Высокий |
5 | File | ArchiveNews.aspx | predictive | Высокий |
6 | File | atbox.htm | predictive | Средний |
7 | File | blank.php | predictive | Средний |
8 | File | xxx_xxxxxxxx.xxx | predictive | Высокий |
9 | File | xxxx/xxxxxxxxxxxxx.xxx | predictive | Высокий |
10 | File | xxxx/xxxxxxxxxxxxxxx.xxx | predictive | Высокий |
11 | File | xxx/xxxx/xxxx.x | predictive | Высокий |
12 | File | xxxxxxxxxxx/xxxxxxxx/xxxxxxxxxx.xxx | predictive | Высокий |
13 | File | xxxxxxxx.xxx | predictive | Средний |
14 | File | xxxxx_xxxx.xxx | predictive | Высокий |
15 | File | xxx/xxxxxx.xxx | predictive | Высокий |
16 | File | xxxxx.xxx | predictive | Средний |
17 | File | xxxxx.xxx | predictive | Средний |
18 | File | xxxxxxx.xxx | predictive | Средний |
19 | File | xxxx.xxx | predictive | Средний |
20 | File | xxxx_xxxx.xxx | predictive | Высокий |
21 | File | xxxxxx/xxxxxxxxxx.x | predictive | Высокий |
22 | File | xxxx.xxx | predictive | Средний |
23 | File | xxxxx.xxx | predictive | Средний |
24 | File | xxxxxxx/xxxx/xxxxxxxxx_xxx.xxx | predictive | Высокий |
25 | File | xxxxx.xxx | predictive | Средний |
26 | File | xxxxx.xxx | predictive | Средний |
27 | File | xxxxxxxxxx.xxx | predictive | Высокий |
28 | File | xxxxxx.x | predictive | Средний |
29 | File | xxxxxx.xxx | predictive | Средний |
30 | File | xxxxxx_xxxx.xxx | predictive | Высокий |
31 | File | xxxxxx_xxxx.xxx | predictive | Высокий |
32 | File | xxxxxxxxx.xxx | predictive | Высокий |
33 | File | xxxxx/xxxxx.xx | predictive | Высокий |
34 | Library | xxx/xx/xxxxxxx.xx | predictive | Высокий |
35 | Library | xxxxxxxxxxxx.xxx | predictive | Высокий |
36 | Argument | -x/-x | predictive | Низкий |
37 | Argument | xxxxxxxx | predictive | Средний |
38 | Argument | xxxx_xx | predictive | Низкий |
39 | Argument | xxxxxx_xx | predictive | Средний |
40 | Argument | xxxx_xxxx/xxxxx/xxxxxx | predictive | Высокий |
41 | Argument | xxxx_xxxxxxx | predictive | Средний |
42 | Argument | xx | predictive | Низкий |
43 | Argument | xxxxx | predictive | Низкий |
44 | Argument | xxxxxxxxx | predictive | Средний |
45 | Argument | xxxxx_xxxx_xxx | predictive | Высокий |
46 | Argument | xxxxxxx | predictive | Низкий |
47 | Argument | xxxxxxxxx | predictive | Средний |
48 | Argument | xxxxxx_xxxx | predictive | Средний |
49 | Argument | xxxxxxxxxxxx | predictive | Средний |
50 | Argument | xxx | predictive | Низкий |
51 | Argument | xxx | predictive | Низкий |
52 | Argument | xxxx | predictive | Низкий |
53 | Argument | xxxxxxxx/xxxx | predictive | Высокий |
54 | Argument | xxxxxxxx_x/xxxxxxxx_x | predictive | Высокий |
55 | Argument | xxxx->xxxxxxx | predictive | Высокий |
Ссылки (3)
The following list contains external sources which discuss the actor and the associated activities: