Redcore and Bluecore Analysis

IOB - Indicator of Behavior (65)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en66

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us34
fr16
gb12
cn4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel14
Microsoft Windows14
Apple macOS6
Google Chrome6
Microsoft Edge4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Huawei SXXX VRP MPLS LSP Ping information disclosure5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000960.17CVE-2014-8570
2OpenSLP out-of-bounds write8.58.5$0-$5k$0-$5kHighNot Defined0.032720.05CVE-2019-5544
3VMware ESXi/Fusion/Workstation Virtual USB 1.1 UHCI memory corruption5.55.4$0-$5k$0-$5kNot DefinedOfficial Fix0.006650.05CVE-2019-5519
4Linux Kernel keyboard.c k_ascii integer overflow6.56.5$5k-$25k$0-$5kNot DefinedNot Defined0.000770.00CVE-2020-13974
5Linux Kernel slip.c use after free6.66.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000460.00CVE-2020-14416
6Linux Kernel VFIO PCI Driver exceptional condition6.46.4$5k-$25k$0-$5kNot DefinedNot Defined0.000470.00CVE-2020-12888
7Linux Kernel btree.c btree_gc_coalesce input validation4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.001100.00CVE-2020-12771
8Linux Kernel ACPI Table acpi_configfs.c authorization5.45.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000470.04CVE-2020-15780
9Linux Kernel blktrace.c __blk_add_trace use after free7.47.4$5k-$25k$5k-$25kNot DefinedNot Defined0.009680.00CVE-2019-19768
10Linux Kernel ext4 Image xattr.c ext4_xattr_set_entry out-of-bounds write6.56.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000990.00CVE-2019-19319
11Palo Alto PAN-OS Management Server buffer overflow7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000970.00CVE-2020-2015
12Palo Alto PAN-OS Management Server os command injection7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.002380.00CVE-2020-2014
13Palo Alto PAN-OS Proxy Service authentication bypass7.77.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002910.00CVE-2020-2018
14Microsoft Visual Studio Code Python Extension input validation7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.037690.04CVE-2020-1171
15Microsoft Edge/ChakraCore Scripting Engine memory corruption6.05.7$25k-$100k$5k-$25kNot DefinedOfficial Fix0.020460.03CVE-2020-1065
16Microsoft .NET Framework privileges management7.06.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.00CVE-2020-1066
17Microsoft .NET Core/.NET Framework denial of service6.46.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.001440.00CVE-2020-1108
18Microsoft Visual Studio/ASP.NET Core input validation6.46.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.001440.00CVE-2020-1161
19Microsoft Windows Print Spooler privileges management7.87.5$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000430.00CVE-2020-1070
20Microsoft Windows Win32k privileges management7.97.7$25k-$100k$5k-$25kHighOfficial Fix0.004540.03CVE-2020-1054

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
12.4.17.15lfbn-mon-1-592-15.w2-4.abo.wanadoo.frRedcore and Bluecore06/03/2020verifiedHigh
2XXX.XXX.XX.XXXxxxxxx Xxx Xxxxxxxx06/03/2020verifiedHigh

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (14)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Filedrivers/acpi/acpi_configfs.cpredictiveHigh
2Filedrivers/md/bcache/btree.cpredictiveHigh
3Filexxxxxxx/xxx/xxxxxxxxxx/xxxxxx.xpredictiveHigh
4Filexxxxxxx/xxx/xxxx/xxxx.xpredictiveHigh
5Filexxxxxxx/xxxx/xxxxxx/xx.xpredictiveHigh
6Filexxxxxxx/xxx/xx/xxxxxxxx.xpredictiveHigh
7Filexx/xxxx/xxxxx.xpredictiveHigh
8Filexx/xxxxxxx.xpredictiveMedium
9Filexxxxxx/xxxxx/xxxxxxxx.xpredictiveHigh
10Filexx/xxxxxxx.xpredictiveMedium
11Filexx/xxxxxxx.xpredictiveMedium
12Filexxx/xxxx/xxxx_xxxx.xpredictiveHigh
13Filexxxxxxxx.xxxpredictiveMedium
14Filexxxx.xpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!