3LOSH Analys

IOB - Indicator of Behavior (8)

Tidslinje

Lang

en8

Land

Skådespelare

Aktiviteter

Intressera

Tidslinje

Typ

Säljare

Produkt

Responsive Menus2
Bitrix Site Manager2
Storytlr2

Sårbarheter

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-adressHostnameSkådespelareKampanjerIdentifiedTypFörtroende
194.130.207.164static.164.207.130.94.clients.your-server.de3LOSH29/07/2022verifiedHög
2XXX.XX.XX.XXxxxx.xx-xxx-xx-xx.xxXxxxx29/07/2022verifiedHög

TTP - Tactics, Techniques, Procedures (2)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSårbarheterÅtkomstvektorTypFörtroende
1T1059.007CWE-79Cross Site ScriptingpredictiveHög
2TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHög

IOA - Indicator of Attack (10)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlassIndicatorTypFörtroende
1Filedata/gbconfiguration.datpredictiveHög
2Filegoto.phppredictiveMedium
3Filexxxx.xxx.xxxpredictiveMedium
4Filexxxxxxxx.xxxpredictiveMedium
5Filexxxxxxxxxx_xxxxx.xxxxxxpredictiveHög
6Argumentxxx_x_xxxpredictiveMedium
7ArgumentxxxxpredictiveLåg
8ArgumentxxxxxxpredictiveLåg
9ArgumentxxxpredictiveLåg
10Argumentx-xxxxxxxxx-xxxpredictiveHög

Referenser (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!