Hakai 分析

IOB - Indicator of Behavior (9)

时间轴

语言

en6
ja2
pl2

国家/地区

演员

活动

利益

时间轴

类型

供应商

产品

PHP-Fusion2
Thomas R. Pasawicz HyperBook Guestbook2
Zkoss ZK Framework2
Microsoft Windows2
ADOdb Library2

漏洞

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP地址Hostname参与者活动Identified类型可信度
146.166.185.42emeg.jacketzine.comHakai2024-02-12verified
2XX.XX.XX.XXXXxxxx2024-02-12verified
3XXX.XX.XXX.XXxxxxxxxxx.xxxxxxxxxxxxxx.xxxXxxxx2024-02-12verified
4XXX.XXX.XXX.XXXXxxxx2024-02-12verified

TTP - Tactics, Techniques, Procedures (4)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechnique分类漏洞访问向量类型可信度
1T1059.007CAPEC-209CWE-79Cross Site Scriptingpredictive
2TXXXXCAPEC-108CWE-XXXxx Xxxxxxxxxpredictive
3TXXXXCAPEC-50CWE-XXXXxxxxxxxxxx Xxxxxxxxxxpredictive
4TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive

IOA - Indicator of Attack (6)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

ID分类Indicator类型可信度
1Filedata/gbconfiguration.datpredictive
2Fileregister.phppredictive
3Filexx-xxxxxxxx/xx/xxxxxxxxxxxxpredictive
4Filexx-xxxxx.xxxpredictive
5Argumentxxx_xxpredictive
6Argumentxxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!