Borat RAT Analysis

IOB - Indicator of Behavior (45)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en28
pl16
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us18

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Apple tvOS10
Samsung Mobile Devices10
Apple Safari4
Apple watchOS4
libEMF4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1VMware vCenter Server/Cloud Foundation File permission4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.014170.04CVE-2022-22948
2HumHub privileges management7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.001910.18CVE-2017-20028
3Google Android SystemUI access control5.35.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000480.00CVE-2021-39787
4Apple Safari WebKit memory corruption7.57.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.005670.00CVE-2017-7095
5Apple watchOS SQLite memory corruption8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.009490.00CVE-2017-10989
6Apple tvOS CFNetwork Proxies input validation3.83.6$0-$5k$0-$5kNot DefinedOfficial Fix0.009300.03CVE-2017-7083
7Apple tvOS Kernel memory corruption8.38.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.002330.03CVE-2017-7114
8Apple Safari WebKit memory corruption7.57.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.005760.00CVE-2017-7099
9Apple Safari WebKit memory corruption7.57.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.005760.00CVE-2017-7104
10Apple Safari WebKit memory corruption7.57.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.005670.00CVE-2017-7111
11Apple watchOS libc resource consumption5.95.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.013430.00CVE-2017-1000373
12Apple watchOS SQLite memory corruption8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.015430.00CVE-2017-7129
13Apple watchOS SQLite memory corruption8.38.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.002130.00CVE-2017-7127
14Apple watchOS zlib numeric error8.88.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.013500.00CVE-2016-9842
15Apple tvOS libc resource management6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.017660.00CVE-2017-7086
16Apple tvOS libc resource consumption5.95.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.013430.00CVE-2017-1000373
17Apple tvOS libexpat xml external entity reference7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.003040.00CVE-2017-9233
18Apple tvOS SQLite out-of-bounds8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.009490.03CVE-2017-10989
19Apple tvOS WebKit memory corruption7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.005760.00CVE-2017-7087
20Apple tvOS WebKit memory corruption7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.007060.00CVE-2017-7092

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
13.22.97.180ec2-3-22-97-180.us-east-2.compute.amazonaws.comBorat RAT12/29/2023verifiedMedium
2XX.XXX.XXX.XXXxxx-xx-xxx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxx Xxx12/29/2023verifiedMedium

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (4)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/setup/install/setup.phppredictiveHigh
2File/xxxpredictiveLow
3Filexxxxxxx.xxpredictiveMedium
4Argumentxxxxxx_xxxpredictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!