Deep dive in Lexmark Perceptive Document Filters Exploitation
Tags
attack-pattern: | Data Direct Exploits - T1587.004 Exploits - T1588.005 Hardware - T1592.001 Software - T1592.002 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | 379a3a42-c99e-4fa7-9a92-a6e35c01a70f |
Fingerprint | b0121c17e82d50a1 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | June 14, 2017, 2:41 p.m. |
Added to db | Oct. 9, 2022, 4:16 p.m. |
Last updated | Oct. 16, 2024, 2:30 a.m. |
Headline | Vulnerability Information |
Title | Deep dive in Lexmark Perceptive Document Filters Exploitation |
Detected Hints/Tags/Attributes | 57/1/20 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 3 | libisys11df.so |
|
Details | Domain | 1 | libisysautocad.so |
|
Details | Domain | 1 | libisysgraphics.so |
|
Details | Domain | 1 | libisyspdf6.so |
|
Details | Domain | 3 | libisysreadershd.so |
|
Details | Domain | 3 | libisysreaders.so |
|
Details | Domain | 2 | libisysshared.so |
|
Details | Domain | 1 | parser.in |
|
Details | Domain | 9 | checksec.sh |
|
Details | Domain | 1 | libisysreadersh.so |
|
Details | Domain | 1 | ropper.py |
|
Details | Domain | 1 | file.my |
|
Details | File | 2 | malicious.xls |
|
Details | File | 11 | config.cfg |
|
Details | File | 1 | poc.xls |
|
Details | File | 1 | payload.xls |
|
Details | File | 2 | template.xls |
|
Details | File | 1 | explo_test.py |
|
Details | File | 1 | ropper.py |
|
Details | Url | 1 | http://www.evil.localdomain/malicious.xls |