APT38 Analysis

IOB - Indicator of Behavior (37)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en38

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Google Chrome6
Google Android4
Microsoft Internet Explorer2
WordPress2
Kingsoft WPS Office2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Microsoft Windows DNSAPI DNSAPI.dll access control8.37.9$25k-$100k$5k-$25kNot DefinedOfficial Fix0.449120.00CVE-2017-11779
2Microsoft Windows DNSAPI DNSAPI.dll access control8.18.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.223170.02CVE-2018-8225
3Google Chrome IPC/Gamepad API/V8 code7.36.4$25k-$100k$0-$5kUnprovenOfficial Fix0.062700.00CVE-2015-1233
4Google Chrome Blink doSerialize privileges management7.36.4$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.000000.05
5Google Chrome v8 json-stringifier.h SerializeJSArray memory corruption7.37.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.020920.00CVE-2015-6764
6nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002412.07CVE-2020-12440
7Microsoft Word memory corruption7.06.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.019120.03CVE-2019-1201
8Microsoft Edge AppContainer Sandbox access control6.56.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.007030.00CVE-2019-0938
9WordPress Thumbnail input validation7.57.5$5k-$25k$5k-$25kNot DefinedNot Defined0.009900.03CVE-2018-1000773
10Google Chrome Catalog Service input validation8.07.9$25k-$100k$0-$5kNot DefinedOfficial Fix0.004910.02CVE-2018-6055
11Sir GNUboard sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.001120.00CVE-2014-2339
12Zakkis Technology Php Excel Parser file inclusion7.36.4$0-$5k$0-$5kProof-of-ConceptUnavailable0.100260.00CVE-2007-2857
13Microsoft Windows DNSAPI DNSAPI.dll data processing5.25.1$25k-$100k$0-$5kNot DefinedOfficial Fix0.004250.02CVE-2018-8304
14Oracle HTTP Server Web Listener memory corruption5.35.1$5k-$25k$0-$5kHighOfficial Fix0.972450.02CVE-2010-0425
15Kingsoft WPS Office Free WpsCloudSvr access control6.16.1$0-$5k$0-$5kNot DefinedNot Defined0.000420.05CVE-2018-6400
16Kingsoft WPS Office kso.dll _alloc_iostr_data input validation4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.001520.05CVE-2018-6217
17Google Chrome Sandbox memory corruption5.34.6$25k-$100k$5k-$25kUnprovenOfficial Fix0.023690.00CVE-2015-1252
18Microsoft Office memory corruption7.57.2$5k-$25kCalculatingNot DefinedOfficial Fix0.157680.00CVE-2018-0795
19OpenSSH Authentication Username information disclosure5.34.8$5k-$25k$0-$5kHighOfficial Fix0.107370.26CVE-2016-6210
20Dell EMC Avamar Server/Integrated Data Protection Appliance Installation Manager credentials management8.58.2$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.793770.03CVE-2018-1217

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveHigh
2T1068CAPEC-122CWE-264, CWE-269, CWE-284Execution with Unnecessary PrivilegespredictiveHigh
3TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveHigh
4TXXXXCAPEC-CWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveHigh
5TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
6TXXXX.XXXCAPEC-CWE-XXXxxxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (13)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Filejson-stringifier.hpredictiveHigh
2Filemm/memory.cpredictiveMedium
3File\\.\pipe\WPSCloudSvr\WpsCloudSvrpredictiveHigh
4Libraryxxxxxx.xxxpredictiveMedium
5Libraryxxx.xxxpredictiveLow
6Libraryxxxxxx.xxxpredictiveMedium
7Libraryxxxxxx/xxxxxxxxx/xxxxx.xxxpredictiveHigh
8ArgumentxxxxxxxpredictiveLow
9Argumentxxxxx->xxxxpredictiveMedium
10Argumentxxxxxxxx.xxxxpredictiveHigh
11Argumentxxxxxx_xxxxpredictiveMedium
12ArgumentxxxxxxxxpredictiveMedium
13Input Valuexx-xxxx://predictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!