Elknot 分析
IOB - Indicator of Behavior (1)
活动
IOC - Indicator of Compromise (3)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | IP地址 | Hostname | 参与者 | 活动 | Identified | 类型 | 可信度 |
---|---|---|---|---|---|---|---|
1 | 115.231.218.64 | Elknot | 2022-02-11 | verified | 高 | ||
2 | XXX.XX.XXX.X | Xxxxxx | 2022-02-09 | verified | 高 | ||
3 | XXX.XX.XXX.XXX | xxx.xx.xxx.xxx.xxxxxx.xxxxxxxxx.xxx | Xxxxxx | 2022-02-09 | verified | 高 |
TTP - Tactics, Techniques, Procedures (1)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | Technique | 漏洞 | 访问向量 | 类型 | 可信度 |
---|---|---|---|---|---|
1 | T1068 | CWE-264 | J2EE Misconfiguration: Weak Access Permissions for EJB Methods | predictive | 高 |
参考 (3)
The following list contains external sources which discuss the actor and the associated activities:
- https://blog.netlab.360.com/new-elknot-billgates-variant-with-xor-like-c2-configuration-encryption-scheme/
- xxxxx://xxxx.xxxxxx.xxx.xxx/xx-xxxx-xxx-xxxxx-xxx-xx-xx-xxxxxxxx-xxxx-xxxxxxxxxxxx-xxxx-xxxxx-xx-xxx-xx-xx-xxxx-xx-xxx-xxx-xxxx/
- xxxxx://xxxxxx.xxx/xxxxx/xxxxx_xxxxxx_xxxxxxxxxxxx/xxxx/xxxx/xxxxxx/xxxxxx