Adobe Flash and the Iranian Nuclear Program | Rapid7 Blog
Tags
country: | Iran |
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Exploits - T1587.004 Exploits - T1588.005 Malware - T1587.001 Malware - T1588.001 Server - T1583.004 Server - T1584.004 |
Common Information
Type | Value |
---|---|
UUID | ef5bf6bd-56b8-4dd4-aa90-449cd049a5ab |
Fingerprint | be91bcf098a7658b |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | March 8, 2012, 8:03 p.m. |
Added to db | Jan. 18, 2023, 8:44 p.m. |
Last updated | Nov. 17, 2024, 12:58 p.m. |
Headline | Adobe Flash and the Iranian Nuclear Program |
Title | Adobe Flash and the Iranian Nuclear Program | Rapid7 Blog |
Detected Hints/Tags/Attributes | 27/3/9 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://blog.rapid7.com/2012/03/08/cve-2012-0754/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 7 | cve-2012-0754 |
|
Details | File | 2 | situation.doc |
|
Details | File | 52 | exploit.swf |
|
Details | File | 2 | test.mp4 |
|
Details | IPv4 | 11 | 10.0.1.3 |
|
Details | IPv4 | 619 | 0.0.0.0 |
|
Details | IPv4 | 4 | 10.0.1.4 |
|
Details | Url | 1 | http://0.0.0.0:8080/2q0m2zpti8wu |
|
Details | Url | 1 | http://10.0.1.3:8080/2q0m2zpti8wu |