奇安信威胁情报中心
Common Information
Type Value
UUID 1ccc997e-08c1-4b3a-9928-5f3a41f9f196
Fingerprint 90c91595e2754382
Analysis status DONE
Considered CTI value 2
Text language
Published Nov. 29, 2018, midnight
Added to db Sept. 26, 2022, 9:33 a.m.
Last updated Nov. 17, 2024, 6:54 p.m.
Headline UNKNOWN
Title 奇安信威胁情报中心
Detected Hints/Tags/Attributes 78/3/65
Attributes
Details Type #Events CTI Value
Details CVE 9
cve-2017-12824
Details CVE 58
cve-2018-0798
Details Domain 2
khurram.com.pk
Details Domain 2
nethosttalk.com
Details Domain 2
wcnchost.ddns.net
Details Domain 4
referfile.com
Details Domain 4
errorfeedback.com
Details Domain 1
jospubs.com
Details Domain 1
pp5.zapto.org
Details Domain 1
xiovo416.net
Details Domain 1
newmysticvision.com
Details Domain 2
traxbin.com
Details Domain 58
ti.qianxin.com
Details Domain 1
www.inpage.com
Details Domain 622
en.wikipedia.org
Details Domain 16
www.anquanke.com
Details Domain 122
www.kaspersky.com
Details Domain 261
blog.talosintelligence.com
Details File 49
nuxt.js
Details File 1
c:\conf\ smss.exe
Details File 2
sylog.log
Details File 1
simple.jpg
Details File 1
executed.dll
Details File 1018
rundll32.exe
Details File 4
rundll32.dll
Details File 2
aflup64.dll
Details File 1
c:\ programdata\ adobe64\ aflup64.dll
Details File 18
go.php
Details File 1
mobile-malware-campaign-uses-malicious-mdm.html
Details File 2
mobile-malware-campaign-uses-malicious-mdm-part2.html
Details File 1
appendix-confucius-update-new-tools-techniques-connections-patchwork-updated.pdf
Details md5 2
863f2bfed6e8e1b8b4516e328c8ba41b
Details md5 2
c3f5add704f2c540f3dd345f853e2d84
Details md5 2
1c2a3aa370660b3ac2bf0f41c342373b
Details md5 1
ce2a6437a308dfe777dec42eec39d9ea
Details md5 1
43920ec371fae4726d570fdef1009163
Details md5 1
694040b229562b8dca9534c5301f8d73
Details md5 1
fec0ca2056d679a63ca18cb132223332
Details md5 1
74aeaeaca968ff69139b2e2c84dc6fa6
Details md5 1
ec834fa821b2ddbe8b564b3870f13b1b
Details md5 1
09d600e1cc9c6da648d9a367927e6bff
Details md5 1
91e3aa8fa918caa9a8e70466a9515666
Details md5 1
c9c1ec9ae1f142a8751ef470afa20f15
Details md5 1
61a107fee55e13e67a1f6cbc9183d0a4
Details md5 2
f9aeac76f92f8b2ddc253b3f53248c1d
Details md5 2
8dda6f85f06b5952beaabbfea9e28cdd
Details md5 2
25689fc7581840e851c3140aa8c3ac8b
Details md5 1
4f9ef6f18e4c641621f4581a5989284c
Details md5 1
afed882f6af66810d7637ebcd8287ddc
Details sha256 1
9bf55fcf0a25a2f7f6d03e7ba6123d5a31c3e6c1196efae453a74d6fff9d43bb
Details Url 24
https://ti.qianxin.com
Details Url 1
http://www.inpage.com
Details Url 1
https://en.wikipedia.org/wiki/inpage
Details Url 2
https://ti.qianxin.com/blog/articles/analysis-of-apt-campaign-bitter
Details Url 1
https://www.anquanke.com/post/id/84910
Details Url 1
https://www.kaspersky.com/blog/inpage-exploit/6292
Details Url 1
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/08/attack-uses-malicious-inpage-document-and-outdated-vlc-media-player-to-give-attackers-backdoor-access-to-targets
Details Url 1
https://blog.talosintelligence.com/2018/07/mobile-malware-campaign-uses-malicious-mdm.html
Details Url 2
https://blog.talosintelligence.com/2018/07/mobile-malware-campaign-uses-malicious-mdm-part2.html
Details Url 2
https://blog.trendmicro.com/trendlabs-security-intelligence/confucius-update-new-tools-and-techniques-further-connections-with-patchwork
Details Url 1
https://documents.trendmicro.com/assets/appendix-confucius-update-new-tools-techniques-connections-patchwork-updated.pdf
Details Url 1
https://researchcenter.paloaltonetworks.com/2016/09/unit42-confucius-says-malware-families-get-further-by-abusing-legitimate-websites
Details Url 2
https://researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families
Details Url 1
https://www.virustotal.com/gui/file/9bf55fcf0a25a2f7f6d03e7ba6123d5a31c3e6c1196efae453a74d6fff9d43bb/submissions
Details Windows Registry Key 11
HKCU\Environment