UAC-0098 分析

IOB - Indicator of Behavior (173)

时间轴

语言

en146
ru12
de6
zh2
es2

国家/地区

us102
ru46
cn22
de2
it2

演员

活动

利益

时间轴

类型

供应商

产品

GNU binutils14
Microsoft Windows6
GNU C Library4
Cisco TelePresence Video Communication Server4
Moxa EDR-8104

漏洞

#漏洞BaseTemp0day今天修正EPSSCTICVE
1DGLogik DGLux Server IoT API 权限升级8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.012600.02CVE-2019-1010009
2SolarWinds Serv-U 信息公开6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.058350.03CVE-2021-35250
3libxslt EXSLT Math.random Prediction 弱加密5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000860.00CVE-2015-9019
4GNU C Library fnmatch_loop.c fnmatch 信息公开5.65.4$0-$5k$0-$5kNot DefinedOfficial Fix0.005460.00CVE-2015-8984
5GNU C Library strxfrm 内存损坏9.18.6$0-$5k$0-$5kNot DefinedOfficial Fix0.006700.03CVE-2015-8982
6Extreme EXOS 内存损坏7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.002090.00CVE-2017-14328
7IBM System Storage TS3100-TS3200 Tape Library 权限升级8.08.0$5k-$25k$5k-$25kNot DefinedNot Defined0.001830.00CVE-2016-9005
8Deltek Vision RPC over HTTP SQL SQL注入8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.005760.02CVE-2018-18251
9SonicWALL Secure Remote Access 跨网站脚本3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.033500.02CVE-2021-20028
10XiongMai uc-httpd 内存损坏8.58.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.022010.00CVE-2018-10088
11Apache Spark UI 权限升级7.17.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.972710.02CVE-2022-33891
12Dropbear TCP Listener 内存损坏7.26.8$0-$5k$0-$5kNot DefinedOfficial Fix0.004990.03CVE-2017-9078
13Telligent Systems Zimbra Collaboration Remote Code Execution9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.007580.02CVE-2013-7217
14DeDeCMS recommend.php SQL注入8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.028340.04CVE-2017-17731
15libxml2 Recover Mode 拒绝服务4.03.9$0-$5k$0-$5kNot DefinedOfficial Fix0.003780.02CVE-2017-5969
16elfutils elf_getdata.c _libelf_set_rawdata_wrlock 内存损坏5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.012720.00CVE-2016-10255
17elfutils ELF File common.h allocate_elf 内存损坏5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.009860.00CVE-2016-10254
18GNU C Library wstrops.c IO_wstr_overflow 内存损坏7.77.3$0-$5k$0-$5kNot DefinedOfficial Fix0.005080.00CVE-2015-8983
19Google Chrome Skia 内存损坏8.07.9$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000850.03CVE-2024-1283
20TrueConf Server SQL注入8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.006560.02CVE-2022-46764

活动 (3)

These are the campaigns that can be associated with the actor:

IOC - Indicator of Compromise (32)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP地址Hostname参与者活动Identified类型可信度
15.199.173.152UAC-00982022-07-21verified
25.199.174.219UAC-00982022-07-21verified
364.190.113.51UAC-00982022-07-21verified
484.32.188.29UAC-0098Cobalt Strike2022-04-29verified
584.32.190.34UAC-0098Ukraine2022-09-07verified
687.251.64.5UAC-00982022-07-21verified
7134.209.144.87UAC-0098IcedID2022-04-29verified
8XXX.XX.XXX.XXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
9XXX.XX.XXX.XXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
10XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
11XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
12XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
13XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
14XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
15XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
16XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
17XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
18XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
19XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
20XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
21XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
22XXX.XX.XXX.XXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
23XXX.XX.XXX.XXXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
24XXX.XX.XXX.XXXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
25XXX.XX.XXX.XXXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
26XXX.XX.XXX.XXXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
27XXX.XX.XXX.XXXXxx-xxxxXxxxxx Xxxxxx2022-04-29verified
28XXX.XXX.X.XXXxx-xxxxXxxxxx2022-04-29verified
29XXX.XXX.XXX.XXXxx-xxxx2022-07-21verified
30XXX.XXX.XXX.XXXXxx-xxxx2022-07-21verified
31XXX.XXX.XXX.XXXxxxxxx.xxxxxxxxxxxxx.xxxXxx-xxxxXxxxxx2022-04-29verified
32XXX.XXX.XX.XXXxx-xxxx2022-07-21verified

TTP - Tactics, Techniques, Procedures (17)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (79)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

ID分类Indicator类型可信度
1File/cgi-bin/wlogin.cgipredictive
2File/etc/shadowpredictive
3File/goform/net\_Web\_get_valuepredictive
4File/goform/net_WebCSRGenpredictive
5File/goform/WebRSAKEYGenpredictive
6File/lam/tmp/predictive
7File/uncpath/predictive
8File/wp-content/plugins/woocommerce/templates/emails/plain/predictive
9Fileadd-category.phppredictive
10Fileadmin/dashboard.phppredictive
11Filexxxx_xxxxx_xxxx.xxxpredictive
12Filexxxx_xxx_xxxx.xxxpredictive
13Filexxx/xxxxxxx.xpredictive
14Filexxxxxx.xxxpredictive
15Filexxxxxx.xpredictive
16Filexxxxxx.xxxpredictive
17Filexxxxx.xpredictive
18Filexxxxxx.xpredictive
19Filexxx.xpredictive
20Filexxx_xxxxxxx.xpredictive
21Filexxx/xxxxx/xxxxx.xpredictive
22Filexxxxxxx_xxxx.xpredictive
23Filexxxx/xxxxxxx?xxxxx=xpredictive
24Filexxxxxxx.xxxpredictive
25Filexxxx.xpredictive
26Filexxxxxx/xxxxxxxxxxxpredictive
27Filexxxx.xpredictive
28Filexxxxx.xxpredictive
29Filexxxx_xxxx.xxxpredictive
30Filexxxxxx/xxxxxx/xxxx.xpredictive
31Filexxxxx/xxxxxxx.xpredictive
32Filexxxxxxxxx/xxxxxxx/xxxxxx/xxxxxxxxxx.xxxpredictive
33Filexxxxx.xxxpredictive
34Filexxxxx.xxxpredictive
35Filexxxxx.xxxxpredictive
36Filexxxxxxxx-xxxxx-xxxxx.xxxpredictive
37Filexxxxxxx.xxpredictive
38Filexxx_xxx_xxxxxxx.xxxpredictive
39Filexxxx/xxxxxxxxx.xxxpredictive
40Filexxxxxxxx.xxxpredictive
41Filexxxxxx.xxxpredictive
42Filexxxxxxx/xxxxxxxxxxxpredictive
43Filexxxx-xxxxxx.xpredictive
44Filexxxxxxx.xxxpredictive
45Filexxxxx-xxxx.xxxpredictive
46Filexx-xxxxxxxx/xxxxxxxx/xxxxxxx/xxxxxxxxxxxxxxxx.xxxpredictive
47File\xxxxx\xxxxxx.xxxx.xxxpredictive
48Libraryxxxxxxx/xxx/xxxxxxxxx/xxxxx_xxxxxx_xxxxxxxx.xxxpredictive
49Argument$_xxxxxpredictive
50Argumentxx/xxpredictive
51Argumentxxxxxxxxxxxxxx_xxxxpredictive
52Argumentxxpredictive
53Argumentxxxpredictive
54Argumentxxxxxxxx/xxxxxxxxxxxxpredictive
55Argumentxxpredictive
56Argumentxxxx_xxpredictive
57Argumentxxxxxxxxxxxxxxpredictive
58Argumentxxxx_xxxpredictive
59Argumentxxpredictive
60Argumentxxxxxpredictive
61Argumentxx_xxxxxxx_xxxxpredictive
62Argumentxxxxpredictive
63Argumentxxxxxpredictive
64Argumentxxxxpredictive
65Argumentxxxxxxxxxxxxxx_xxxpredictive
66Argumentxxxxxxxxpredictive
67Argumentxxxxxxxxxxpredictive
68Argumentxxxxxxx xxxxxpredictive
69Argumentxxxxxxx[xxxx]predictive
70Argumentxxxxxxxxxxxxxxpredictive
71Argumentxxxxxxxxxxxxxxpredictive
72Argumentxxxxxx\_xxxxpredictive
73Argumentxxxxxxxxpredictive
74Argumentx_xxxx/x_xxxxxxx/x_xxxxxxx/xxxxpredictive
75Argumentxxxxxxxxxxxxxxxpredictive
76Argument\xxxxxx\predictive
77Pattern|xx xx xx xx xx xx xx xx|predictive
78Pattern|xx xx xx|predictive
79Network Portxxx xxxxxx xxxxpredictive

参考 (6)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!