OnePercent Анализ
IOB - Indicator of Behavior (187)
Деятельность
Интерес
Уязвимости
IOC - Indicator of Compromise (7)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | IP-адрес | Hostname | Актор | Кампании | Identified | Тип | Уверенность |
---|---|---|---|---|---|---|---|
1 | 31.187.64.199 | sophia.onebusinessdesign.info | OnePercent | 26.08.2021 | verified | Высокий | |
2 | 80.82.67.221 | OnePercent | 26.08.2021 | verified | Высокий | ||
3 | XXX.XXX.XXX.XX | Xxxxxxxxxx | 26.08.2021 | verified | Высокий | ||
4 | XXX.XXX.XXX.XXX | Xxxxxxxxxx | 26.08.2021 | verified | Высокий | ||
5 | XXX.XXX.XXX.XXX | Xxxxxxxxxx | 26.08.2021 | verified | Высокий | ||
6 | XXX.XX.XXX.XX | Xxxxxxxxxx | 26.08.2021 | verified | Высокий | ||
7 | XXX.XXX.XXX.XXX | Xxxxxxxxxx | 26.08.2021 | verified | Высокий |
TTP - Tactics, Techniques, Procedures (10)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Уязвимости | Вектор доступа | Тип | Уверенность |
---|---|---|---|---|---|
1 | T1006 | CWE-22 | Path Traversal | predictive | Высокий |
2 | T1059 | CWE-94 | Argument Injection | predictive | Высокий |
3 | TXXXX.XXX | CWE-XX, CWE-XX | Xxxxx Xxxx Xxxxxxxxx | predictive | Высокий |
4 | TXXXX | CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX | Xxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxx | predictive | Высокий |
5 | TXXXX | CWE-XX, CWE-XX | Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx | predictive | Высокий |
6 | TXXXX.XXX | CWE-XXX | Xxxx Xxxxxxxx | predictive | Высокий |
7 | TXXXX | CWE-XXX | 7xx Xxxxxxxx Xxxxxxxx | predictive | Высокий |
8 | TXXXX | CWE-XX | Xxx Xxxxxxxxx | predictive | Высокий |
9 | TXXXX | CWE-XXX, CWE-XXX | Xxxxxxxxxxx Xxxxxxxxxx | predictive | Высокий |
10 | TXXXX | CWE-XXX | Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx | predictive | Высокий |
IOA - Indicator of Attack (69)
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.
ID | Класс | Indicator | Тип | Уверенность |
---|---|---|---|---|
1 | File | /+CSCOE+/logon.html | predictive | Высокий |
2 | File | /download | predictive | Средний |
3 | File | /forum/away.php | predictive | Высокий |
4 | File | /port_3480/data_request | predictive | Высокий |
5 | File | /uncpath/ | predictive | Средний |
6 | File | /userRpm/PingIframeRpm.htm | predictive | Высокий |
7 | File | /wp-admin/options.php | predictive | Высокий |
8 | File | adclick.php | predictive | Средний |
9 | File | xxx_xxxxxxx.xxx | predictive | Высокий |
10 | File | xxxxx/xxxxx.xxx?x=xx_xxx&x=xxxxx&x=xxxxx&x=xxxxx_xxxx_xxxxxxx&xxxxx=xxxx&xxxxx=x | predictive | Высокий |
11 | File | xxx.xxx | predictive | Низкий |
12 | File | xxxxxxxxxxxxxxxxx.xxx | predictive | Высокий |
13 | File | xxxx-xxxx.x | predictive | Средний |
14 | File | xxxxxxxxxxx.xxx | predictive | Высокий |
15 | File | xxx.xxx | predictive | Низкий |
16 | File | xxxxxxxxx-xxxxxxx.xxx | predictive | Высокий |
17 | File | xxxx/xxxxxxxxxxxxxxx.xxx | predictive | Высокий |
18 | File | xxxxx.x | predictive | Низкий |
19 | File | xxxxxxx/xxx/xxx/xxx_xxxx.x | predictive | Высокий |
20 | File | xxxxx.xxx | predictive | Средний |
21 | File | xxxx.xxx | predictive | Средний |
22 | File | xxx/xxxxxx.xxx | predictive | Высокий |
23 | File | xxxxxxx/xxxxxx/xxxxxxx/xxxxxx/xxx.xxx | predictive | Высокий |
24 | File | xxxxxxx.xxxx | predictive | Средний |
25 | File | xxxxx.xxx | predictive | Средний |
26 | File | xxxx | predictive | Низкий |
27 | File | xxxx.xxx | predictive | Средний |
28 | File | xxxxxxx.xxx | predictive | Средний |
29 | File | xxxxxxx_xxxxxx.xxx | predictive | Высокий |
30 | File | xxxxxxxx.xx | predictive | Средний |
31 | File | xxxxxxxx_xxxxxx.xxx | predictive | Высокий |
32 | File | xxxxx.xxx | predictive | Средний |
33 | File | xxxxxx.xxx | predictive | Средний |
34 | File | xxxxxxxxxxxx.xxx | predictive | Высокий |
35 | File | xxxx-xxxxxxxx.xxx | predictive | Высокий |
36 | File | xxxxxx.xxx | predictive | Средний |
37 | File | xxxxxx.xxx | predictive | Средний |
38 | File | xxxxxx.xxx | predictive | Средний |
39 | File | xxxxx/xxxxxxxx | predictive | Высокий |
40 | File | xx-xxxxx/xxxxx-xxxx.xxx | predictive | Высокий |
41 | File | xx-xxxxx/xxxxxxxx/xxxxx-xx-xxxxxx.xxx | predictive | Высокий |
42 | File | xx-xxxxxxxxx.xxx | predictive | Высокий |
43 | Library | xxxxxxxxxxxx.xxx | predictive | Высокий |
44 | Library | xxx/xxx.x | predictive | Средний |
45 | Library | xxx/xxx.x | predictive | Средний |
46 | Library | xxxxxxx.xxx | predictive | Средний |
47 | Argument | xxxxx_xxxxxxxx | predictive | Высокий |
48 | Argument | xxxxxxxx | predictive | Средний |
49 | Argument | xxxxx | predictive | Низкий |
50 | Argument | xxx | predictive | Низкий |
51 | Argument | xxxxxxxx | predictive | Средний |
52 | Argument | xxxxxxxxxxxxxxxxxxxxx | predictive | Высокий |
53 | Argument | xxxx | predictive | Низкий |
54 | Argument | xxxxxxxxx xxxx | predictive | Высокий |
55 | Argument | xxxxxx | predictive | Низкий |
56 | Argument | xxxx | predictive | Низкий |
57 | Argument | xxxxxxxxx | predictive | Средний |
58 | Argument | xx | predictive | Низкий |
59 | Argument | xxxx | predictive | Низкий |
60 | Argument | xxxxxxx | predictive | Низкий |
61 | Argument | xxxxxxxx | predictive | Средний |
62 | Argument | xxxx_xxxx | predictive | Средний |
63 | Argument | xxx | predictive | Низкий |
64 | Argument | xxxxxx_xxxx | predictive | Средний |
65 | Argument | xx_xx | predictive | Низкий |
66 | Argument | xxxxx_xx | predictive | Средний |
67 | Argument | xxxxxxxx/xxxx | predictive | Высокий |
68 | Argument | xxxxx | predictive | Низкий |
69 | Network Port | xxx/xxx (xxx) | predictive | Высокий |
Ссылки (2)
The following list contains external sources which discuss the actor and the associated activities: