Internet Explorer 0-day exploited by North Korean actor APT37
Tags
Common Information
Type | Value |
---|---|
UUID | 3f443fb9-e553-48ae-894b-6dc897d5f74e |
Fingerprint | b8982d978fcedba7 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Dec. 7, 2022, midnight |
Added to db | Oct. 22, 2023, 9:27 p.m. |
Last updated | Nov. 15, 2024, 1:37 p.m. |
Headline | Internet Explorer 0-day exploited by North Korean actor APT37 |
Title | Internet Explorer 0-day exploited by North Korean actor APT37 |
Detected Hints/Tags/Attributes | 33/2/16 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 35 | ✔ | Threat Analysis Group (TAG) | https://blog.google/threat-analysis-group/rss/ | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 29 | cve-2022-41128 |
|
Details | CVE | 269 | cve-2017-0199 |
|
Details | CVE | 3 | cve-2021-34480 |
|
Details | Domain | 1 | word-template.net |
|
Details | Domain | 3 | openxmlformat.org |
|
Details | Domain | 3 | ms-office.services |
|
Details | Domain | 3 | ms-offices.com |
|
Details | Domain | 1 | template-openxml.com |
|
Details | File | 29 | jscript9.dll |
|
Details | sha256 | 1 | 56ca24b57c4559f834c190d50b0fe89dd4a4040a078ca1f267d0bbc7849e9ed7 |
|
Details | sha256 | 1 | af5fb99d3ff18bc625fb63f792ed7cd955171ab509c2f8e7c7ee44515e09cebf |
|
Details | sha256 | 1 | 926a947ea2b59d3e9a5a6875b4de2bd071b15260370f4da5e2a60ece3517a32f |
|
Details | sha256 | 1 | 3bff571823421c013e79cc10793f238f4252f7d7ac91f9ef41435af0a8c09a39 |
|
Details | sha256 | 1 | c49b4d370ad0dcd1e28ee8f525ac8e3c12a34cfcf62ebb733ec74cca59b29f82 |
|
Details | sha256 | 1 | 08f93351d0d3905bee5b0c2b9215d448abb0d3cf49c0f8b666c46df4fcc007cb |
|
Details | Threat Actor Identifier - APT | 277 | APT37 |