Mushtik 分析

IOB - Indicator of Behavior (13)

时间轴

语言

en14

国家/地区

演员

活动

利益

时间轴

类型

供应商

产品

Apple iOS6
Apple iPadOS4
Kubernetes2
Cisco IOS2
Cisco IOS XE2

漏洞

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP地址Hostname参与者活动Identified类型可信度
118.228.7.109ec2-18-228-7-109.sa-east-1.compute.amazonaws.comMushtik2022-07-13verified
2XXX.XXX.XXX.XXXXxxxxxx2022-07-13verified

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechnique漏洞访问向量类型可信度
1T1068CWE-264Execution with Unnecessary Privilegespredictive
2TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxxpredictive
3TXXXXCWE-XXXXxxxxxxxxx Xxxxxxpredictive
4TXXXXCWE-XXXxx Xxxxxxxxxpredictive
5TXXXX.XXXCWE-XXXXxxxxxxxxxxxpredictive

IOA - Indicator of Attack (4)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

ID分类Indicator类型可信度
1Fileadmin-ajax.phppredictive
2Filexxxxxxxpredictive
3Argumentxxxxxxpredictive
4Network Portxxx/xxxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!