PoshC2 分析

IOB - Indicator of Behavior (7)

时间轴

语言

en8

国家/地区

演员

活动

利益

时间轴

类型

供应商

产品

OpenResty2
Microsoft Windows2
Thruk2
Zoom Chat2

漏洞

活动 (1)

These are the campaigns that can be associated with the actor:

  • PoshC2

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP地址Hostname参与者活动类型可信度
135.202.253.4545.253.202.35.bc.googleusercontent.comPoshC2verified
2XXX.XXX.XXX.XXXxxxxXxxxxxverified

TTP - Tactics, Techniques, Procedures (2)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechnique漏洞访问向量类型可信度
1T1059.007CWE-79Cross Site Scriptingpredictive
2TXXXXCWE-XXXxx Xxxxxxxxxpredictive

IOA - Indicator of Attack (8)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

ID分类Indicator类型可信度
1File/thruk/#cgi-bin/extinfo.cgi?type=2predictive
2Filecat.asppredictive
3Filexxxxxxxx.xxxpredictive
4Filexxx_xxxx_xxx_xxxxxxxxxx.xpredictive
5Argumentxxxpredictive
6Argumentxxxx/xxxxxxx/xxxxxxxpredictive
7Argumentxxxxpredictive
8Argumentxxpredictive

参考 (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!