FireEye Exploitation: Project Zero’s Vulnerability of the Beast
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Data Domains - T1583.001 Domains - T1584.001 Malware - T1587.001 Malware - T1588.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Rootkit - T1014 Sudo - T1169 Rootkit |
Common Information
Type | Value |
---|---|
UUID | 70742203-90ce-4ae5-9cdf-27a1f150dbce |
Fingerprint | a6333938693346c1 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Dec. 15, 2015, 1:03 p.m. |
Added to db | Jan. 18, 2023, 9:44 p.m. |
Last updated | Nov. 17, 2024, 5:56 p.m. |
Headline | Project Zero |
Title | FireEye Exploitation: Project Zero’s Vulnerability of the Beast |
Detected Hints/Tags/Attributes | 58/2/17 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 184 | www.fireeye.com |
|
Details | Domain | 831 | example.com |
|
Details | File | 1 | notices.html |
|
Details | File | 103 | test.txt |
|
Details | File | 1 | test.jar |
|
Details | File | 1 | decompiler.opt |
|
Details | File | 1 | ions.opt |
|
Details | File | 1 | fireeye.jar |
|
Details | IPv4 | 12 | 192.168.2.0 |
|
Details | IPv4 | 262 | 192.168.1.1 |
|
Details | IPv4 | 6 | 192.168.2.2 |
|
Details | IPv4 | 32 | 192.168.2.1 |
|
Details | IPv4 | 141 | 255.255.255.0 |
|
Details | IPv4 | 56 | 192.168.1.2 |
|
Details | Url | 1 | https://www.fireeye.com/support/notices.html |
|
Details | Url | 1 | http://192.168.2.2/test.txt |
|
Details | Url | 1 | http://192.168.2.2/fireeye.jar |