Bonaire, Sint Eustatius and Saba Unknown Analysis

IOB - Indicator of Behavior (9)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en10

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

CMS Made Simple2
Microsoft IIS2
Apache Cocoon2
Marketo MA2
Intel Chipset Device Software2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

IOC - Indicator of Compromise (29)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
145.12.70.30shttp-ashen.get-eye.comBonaire and Sint Eustatius and Saba Unknown11/09/2022verifiedHigh
245.12.71.30Bonaire and Sint Eustatius and Saba Unknown11/09/2022verifiedHigh
346.36.203.160Bonaire and Sint Eustatius and Saba Unknown11/09/2022verifiedHigh
446.36.203.168Bonaire and Sint Eustatius and Saba Unknown11/09/2022verifiedHigh
546.36.203.170Bonaire and Sint Eustatius and Saba Unknown11/09/2022verifiedHigh
663.245.41.0Bonaire and Sint Eustatius and Saba Unknown04/21/2023verifiedHigh
7XX.XXX.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
8XX.XX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
9XX.XX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
10XXX.XXX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
11XXX.X.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
12XXX.X.XX.Xxxx-xxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
13XXX.XXX.XX.Xxxx-xxxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
14XXX.XXX.XXX.Xxxx-xxxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
15XXX.XXX.XXX.Xxxx-xxxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
16XXX.XXX.XXX.Xxxx-xxxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
17XXX.X.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
18XXX.XX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
19XXX.XXX.XXX.Xxxxx-xxxxxxxx.xxxx.xxxxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
20XXX.XXX.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
21XXX.XXX.XX.XXXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
22XXX.XXX.XX.XXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
23XXX.XXX.XXX.XXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh
24XXX.XX.XX.XXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
25XXX.XX.XXX.XXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
26XXX.X.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
27XXX.XX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
28XXX.XXX.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx11/09/2022verifiedHigh
29XXX.XXX.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx04/21/2023verifiedHigh

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-126CWE-22Path TraversalpredictiveHigh
2T1059.007CAPEC-209CWE-79Cross Site ScriptingpredictiveHigh
3TXXXXCAPEC-CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
4TXXXX.XXXCAPEC-191CWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveHigh
5TXXXXCAPEC-1CWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
6TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (9)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/uncpath/predictiveMedium
2Fileadmin_store_formpredictiveHigh
3Filexxxx-xxxxxxpredictiveMedium
4Libraryxxxxx.xxxpredictiveMedium
5Argumentxxxxxxxxxxx_xxxxx_xxxx_xxxxxxxxpredictiveHigh
6ArgumentxxxxxxxxpredictiveMedium
7ArgumentxxxxxxxxxxxxxxxxxxxpredictiveHigh
8Input Value..predictiveLow
9Input Valuexxxxxxxx/xxxxxxxx/xxxxxxxxxpredictiveHigh

References (3)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!