Pitty Panda Анализ

IOB - Indicator of Behavior (2)

Временная шкала

Язык

en2

Страна

Акторы

Деятельность

Интерес

Временная шкала

Тип

Поставщик

Продукт

Sun SunOS2

Уязвимости

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-адресHostnameАкторКампанииIdentifiedТипУверенность
161.145.112.78Pitty Panda27.03.2022verifiedВысокий
263.251.83.36Pitty Panda27.03.2022verifiedВысокий
3XX.XX.XX.XXXXxxxx Xxxxx27.03.2022verifiedВысокий
4XX.XXX.XXX.Xx-xx-xxx-xxx-x.xxxx.xx.xxxxxxx.xxxXxxxx Xxxxx27.03.2022verifiedВысокий
5XXX.XXX.XXX.XXXXxxxx Xxxxx27.03.2022verifiedВысокий
6XXX.XX.XXX.XXXXxxxx Xxxxx27.03.2022verifiedВысокий
7XXX.XX.XXX.XXXxxxx Xxxxx27.03.2022verifiedВысокий

TTP - Tactics, Techniques, Procedures (1)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueУязвимостиВектор доступаТипУверенность
1T1068CWE-269Execution with Unnecessary PrivilegespredictiveВысокий

IOA - Indicator of Attack (1)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDКлассIndicatorТипУверенность
1ArgumentPasswordpredictiveСредний

Ссылки (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!