Apache ActiveMQ 취약점(CVE-2023-46604) 취약점을 공격하는 Mauri 랜섬웨어 공격자 - ASEC
Tags
attack-pattern: | Powershell - T1059.001 Connection Proxy - T1090 Powershell - T1086 |
Common Information
Type | Value |
---|---|
UUID | 59e64f16-b4d4-4ba7-a33d-a8454eb91601 |
Fingerprint | 7ab1065863166111 |
Analysis status | DONE |
Considered CTI value | 1 |
Text language | |
Published | Dec. 2, 2024, 8:42 a.m. |
Added to db | Dec. 2, 2024, 9:48 a.m. |
Last updated | Dec. 17, 2024, 7:48 a.m. |
Headline | Apache ActiveMQ 취약점(CVE-2023-46604) 취약점을 공격하는 Mauri 랜섬웨어 공격자 |
Title | Apache ActiveMQ 취약점(CVE-2023-46604) 취약점을 공격하는 Mauri 랜섬웨어 공격자 - ASEC |
Detected Hints/Tags/Attributes | 25/1/12 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://asec.ahnlab.com/ko/84894/ |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 18 | ✔ | ASEC | https://asec.ahnlab.com/ko/feed/ | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 91 | cve-2023-46604 |
|
Details | Domain | 2 | user.zip |
|
Details | File | 2 | pocw.xml |
|
Details | File | 2 | user.zip |
|
Details | File | 62 | 2.exe |
|
Details | File | 4 | user.bat |
|
Details | File | 6 | read_to_decrypt.html |
|
Details | File | 6 | files_encrypted.html |
|
Details | IPv4 | 4 | 18.139.156.111 |
|
Details | IPv4 | 14 | 1.3.0.0 |
|
Details | Url | 3 | http://18.139.156.111:83/pocw.xml |
|
Details | Url | 3 | https://t.me/calojohn666 |