Scarlet Mimic Анализ
IOB - Indicator of Behavior (101)
Деятельность
Интерес
Уязвимости
Кампании (1)
These are the campaigns that can be associated with the actor:
- Uyghurs
IOC - Indicator of Compromise (9)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | IP-адрес | Hostname | Актор | Кампании | Identified | Тип | Уверенность |
---|---|---|---|---|---|---|---|
1 | 5.54.19.17 | ppp005054019017.access.hol.gr | Scarlet Mimic | 23.12.2020 | verified | Высокий | |
2 | 45.32.112.182 | 45.32.112.182.vultrusercontent.com | Scarlet Mimic | Uyghurs | 23.09.2022 | verified | Высокий |
3 | XX.XXX.XXX.XXX | Xxxxxxx Xxxxx | 20.12.2020 | verified | Высокий | ||
4 | XX.XX.XX.XXX | Xxxxxxx Xxxxx | 20.12.2020 | verified | Высокий | ||
5 | XX.XXX.XXX.XXX | Xxxxxxx Xxxxx | 23.12.2020 | verified | Высокий | ||
6 | XX.XXX.XXX.XXX | xxxxxx.xxxxxxxxx.xxx | Xxxxxxx Xxxxx | 23.12.2020 | verified | Высокий | |
7 | XXX.XXX.XXX.XX | Xxxxxxx Xxxxx | 22.12.2020 | verified | Высокий | ||
8 | XXX.XXX.XXX.XXX | Xxxxxxx Xxxxx | 23.12.2020 | verified | Высокий | ||
9 | XXX.XX.XXX.XXX | Xxxxxxx Xxxxx | Xxxxxxx | 23.09.2022 | verified | Высокий |
TTP - Tactics, Techniques, Procedures (12)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | Уязвимости | Вектор доступа | Тип | Уверенность |
---|---|---|---|---|---|
1 | T1006 | CWE-22 | Path Traversal | predictive | Высокий |
2 | T1055 | CWE-74 | Improper Neutralization of Data within XPath Expressions | predictive | Высокий |
3 | T1059 | CWE-94 | Argument Injection | predictive | Высокий |
4 | TXXXX.XXX | CWE-XX, CWE-XX | Xxxxx Xxxx Xxxxxxxxx | predictive | Высокий |
5 | TXXXX | CWE-XXX, CWE-XXX, CWE-XXX | Xxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxx | predictive | Высокий |
6 | TXXXX.XXX | CWE-XXX, CWE-XXX | Xxxx-xxxxx Xxxxxxxxxxx | predictive | Высокий |
7 | TXXXX | CWE-XX, CWE-XX | Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx | predictive | Высокий |
8 | TXXXX | CWE-XX | Xxx Xxxxxxxxx | predictive | Высокий |
9 | TXXXX.XXX | CWE-XXX | Xxxxxxxx Xxxxxxxxxxxxx | predictive | Высокий |
10 | TXXXX | CWE-XXX | Xxxxxxxxxxx Xxxxxxxxxx | predictive | Высокий |
11 | TXXXX | CWE-XXX | Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx | predictive | Высокий |
12 | TXXXX.XXX | CWE-XXX | Xxx Xxxxxxxxxx Xxxxx | predictive | Высокий |
IOA - Indicator of Attack (63)
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.
ID | Класс | Indicator | Тип | Уверенность |
---|---|---|---|---|
1 | File | .htaccess | predictive | Средний |
2 | File | /ajax-files/postComment.php | predictive | Высокий |
3 | File | /cgi-bin/pass | predictive | Высокий |
4 | File | /cgi-bin/wapopen | predictive | Высокий |
5 | File | /general/attendance/manage/ask_duty/delete.php | predictive | Высокий |
6 | File | /passwordrecovered.cgi | predictive | Высокий |
7 | File | /plugins/Dashboard/Controller.php | predictive | Высокий |
8 | File | xxxxx/xxxxx_xxx_xxxxxx.xxx | predictive | Высокий |
9 | File | xxxxx/xxx/xxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxxx/xxxxx.xx | predictive | Высокий |
10 | File | xxxx\xxxxx\xxxxxxxxxx\xxxxxxx\xxxxxxxxxxxxxxxx.xxx | predictive | Высокий |
11 | File | xxxxxxxx.xxx | predictive | Средний |
12 | File | xxxx/xxxxxxxxxxxxxxxxxxxxxxxxx.xxx | predictive | Высокий |
13 | File | xxxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx | predictive | Высокий |
14 | File | xxxxxxx\xxxxxxxxxx\xxxxx\xxxxxx.xxx | predictive | Высокий |
15 | File | xxxxxx/xxxx.x | predictive | Высокий |
16 | File | xxx.xxxxxxx.xxx | predictive | Высокий |
17 | File | xxx/xxxxxxxxx/xxxxxx/xxxxxxxxxxxxx.xxxx | predictive | Высокий |
18 | File | xxxx/xxxxxxxxxxxxxxx.xxx | predictive | Высокий |
19 | File | xxxx/xxxxxxxxxx/xxxxxx-xxx.x | predictive | Высокий |
20 | File | xxxxxxxxx/xxxxxxx/xxxx/xxxxxxxxx/xxxxxxxx.xxx | predictive | Высокий |
21 | File | xxxxxxxxx/xxxxx/xxxxxxxxxxxx/xxxxxxxxx.xxx | predictive | Высокий |
22 | File | xx/xxxxx_xxx.x | predictive | Высокий |
23 | File | xxx/xxx.xxx | predictive | Средний |
24 | File | xxx/xxxxxx.xxx | predictive | Высокий |
25 | File | xxxxxxx.xxx | predictive | Средний |
26 | File | xxxx.xxx | predictive | Средний |
27 | File | xxxxxxx.xxx | predictive | Средний |
28 | File | xxxxx.xxx | predictive | Средний |
29 | File | xxxxxxxxx.xxx | predictive | Высокий |
30 | File | xxxx_xxxxxxxxxx.xxx | predictive | Высокий |
31 | File | xxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][] | predictive | Высокий |
32 | File | xxxx.xxx | predictive | Средний |
33 | File | xxxx.xxx | predictive | Средний |
34 | File | xxxxxxxxxxxxxxxxxxxx.xxx | predictive | Высокий |
35 | File | xxxxxx/xxxxxx_xxxxxxxxxxx.xxx | predictive | Высокий |
36 | File | xxxxxxxxxxxx.xxx | predictive | Высокий |
37 | File | xx-xxxxx/xxxx.xxx | predictive | Высокий |
38 | Library | xxx/xxxxxxxxx/xxxxxxxx.xxx | predictive | Высокий |
39 | Argument | xxx_xxxx_xx | predictive | Средний |
40 | Argument | xxxxxxxx | predictive | Средний |
41 | Argument | xxxxxxx xxxx | predictive | Средний |
42 | Argument | xxxxxxxxx->xxxxxxxxx | predictive | Высокий |
43 | Argument | xxxxxxxxxx | predictive | Средний |
44 | Argument | xx | predictive | Низкий |
45 | Argument | xx/xxx/xxxxx | predictive | Средний |
46 | Argument | xxxxxxxxxxx | predictive | Средний |
47 | Argument | xxxxx | predictive | Низкий |
48 | Argument | xxxxxx | predictive | Низкий |
49 | Argument | xxxxxxxx | predictive | Средний |
50 | Argument | xxxx_xxxxx | predictive | Средний |
51 | Argument | xxxxxxxxxx | predictive | Средний |
52 | Argument | xxxx | predictive | Низкий |
53 | Argument | xxxxxxxxx/xxxxxxx | predictive | Высокий |
54 | Argument | xxx | predictive | Низкий |
55 | Argument | xxxxxxxx | predictive | Средний |
56 | Argument | xxx_xxxxxx_xxxxxxx_xx_xxx | predictive | Высокий |
57 | Input Value | 'xx x=x | predictive | Низкий |
58 | Input Value | ../.. | predictive | Низкий |
59 | Input Value | xxxx | predictive | Низкий |
60 | Input Value | <xxx xxx=x xxxxxxx=xxxxxx(x)> | predictive | Высокий |
61 | Input Value | xxxxxxxx.+xxx | predictive | Высокий |
62 | Input Value | xxxxxxxxx/xxxxxxxxx | predictive | Высокий |
63 | Input Value | {{ }} | predictive | Низкий |
Ссылки (5)
The following list contains external sources which discuss the actor and the associated activities:
- https://github.com/vuldb/cyber_threat_intelligence/tree/main/actors/Scarlet%20Mimic
- xxxxx://xxxxxxxx.xxxxxxxxxx.xxx/xxxx/xxxxx-xxxxx-xxxx-x-xxxxx-xx-xxxxxxx-xxxxxx-xxxxxx-xxxxxxxxxxxx-xxxxxxxx-xxxxxxxxx-xxxxxxx/
- xxxxx://xxxxxx.xxxxxxxxxxxxxxxx.xxx/xxxxxxx-xxxxx-xxxxx-xxxx-xxxxxxxxx-xxxxxxx-xxxxxxxx-xxxxxxxxx/
- xxxxx://xxx.xxxxxxxxxxx.xxx/xxxxxx.xxx?x=xxxxxxx-xxxxx-xxxx-xxxxxx_xxxxxxxxxxxxxxxx.xxx&x=xxxx
- xxxxx://xxx.xxxxxxxxxxx.xxx/xxxxxx.xxx?x=xxxxxxxxxxxxxxx_xxxxxxxxxxxxxxxxxxxxxx-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx-xxxxxxxxxxxxx.xxx&x=xxxx