LockBit 3.0 Ransomware Victim: bonta-viva[.]it
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: 85d1135dd2bb5d21ad16ce99e30d9696SHA1: 0b0fa3c027bf94fa88af705a6477d624c8a2735dANALYSIS DATE: 2023-03-11T09:12:23ZTTPS: T1005, T1081, T1012, T1060,...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:laplas, family:pseudomanuscrypt, family:redline, family:smokeloader, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, botnet:pub1, botnet:sprg, backdoor, clipper, discovery, infostealer, loader, persistence,...
Score: 1 MALWARE FAMILY: TAGS:MD5: aa64fb557f18e0240ccb88532ec897dbSHA1: e067b415bfbcbb4d5b218942cbe5eb57f64b023bANALYSIS DATE: 2023-03-11T09:37:11ZTTPS: T1112 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:laplas, family:smokeloader, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, botnet:pub1, botnet:sprg, backdoor, clipper, discovery, persistence, ransomware, spyware, stealer, trojanMD5:...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: 8525f75b65ad910ccd74c1a08d70efa8SHA1: c230ffced0fe8e2122ed655b7331ad5e692b1490ANALYSIS DATE: 2023-03-11T09:24:10ZTTPS: T1005, T1081, T1012, T1082,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: cd9756f38524bab1b74b7c39db74c4b9SHA1: 0a128916538431c21b9413f98119082bf21890aaANALYSIS DATE: 2023-03-11T11:02:20ZTTPS: T1005, T1081, T1012, T1082,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: e8dcd90463339d7a2c9f28cdea5fa8dfSHA1: 215c67423859b770f595bb6b9ec46f392f8de7c0ANALYSIS DATE: 2023-03-11T10:33:59ZTTPS: T1082, T1012, T1005, T1081,...
Score: 5 MALWARE FAMILY: evasionTAGS:evasionMD5: 4a84df07dff0c3424bc90ce8d0938b06SHA1: b883da20bd85c49972b46c50db40589767dd201cANALYSIS DATE: 2023-03-11T10:58:22ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...
Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 5bf3877b8fd815085586d2de55398d00SHA1: c542cf69aee77009d8a4727e423a88900726979fANALYSIS DATE: 2023-03-11T11:01:03ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...
Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: ac9b8ee2453bae125e950f895d79846dSHA1: 70ab4b5ef6e73202b0cb9655f020682af2b2be9dANALYSIS DATE: 2023-03-11T11:05:15ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: da75c7fe6dca73c9e3df80dacf68d82eSHA1: 191d3ad1944f32f6beeb6194f006b3f21d0b5615ANALYSIS DATE: 2023-03-11T11:11:02ZTTPS: T1082, T1130, T1112, T1060,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: 8e72f80f57f0a2061ed8707b4ae8bd0bSHA1: 067df8847a06e814faa9709ff132934f1bb954e5ANALYSIS DATE: 2023-03-11T11:11:02ZTTPS: T1005, T1081, T1060, T1112,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:694f12963bedb0c6040fb3c74aac71e5, discovery, persistence, ransomware, spyware, stealerMD5: 8e335bde5ed8b1c9f9f459074421901bSHA1: 1a6e47d0857208e0570b63d09532dde77494a816ANALYSIS DATE: 2023-03-11T11:11:02ZTTPS: T1005, T1081, T1012, T1082,...
NAME__________AIDE denial of servicePlatforms Affected:Risk Level:5.3Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________AIDE is vulnerable to a denial of service, caused by...
NAME__________Fortinet FortiAuthenticator denial of servicePlatforms Affected:Fortinet FortiAuthenticator 6.4Risk Level:3.7Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Fortinet FortiAuthenticator is vulnerable to a denial of service,...
NAME__________Sourcecodester Online Graduate Tracer System SQL injectionPlatforms Affected:Risk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Sourcecodester Online Graduate Tracer System is vulnerable to SQL injection....
NAME__________OpenHarmony denial of servicePlatforms Affected:OpenHarmony OpenHarmony 3.0-LTS OpenHarmony OpenHarmony 3.1-Release OpenHarmony OpenHarmony 3.1.4 OpenHarmony OpenHarmony 3.0.7-LTSRisk Level:5.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________OpenHarmony...
NAME__________SEIKO EPSON printers/network interface Web Config cross-site scriptingPlatforms Affected:SEIKO EPSON Web ConfigRisk Level:4.8Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________SEIKO EPSON printers/network interface Web Config...
NAME__________Fortinet FortiDeceptor denial of servicePlatforms Affected:Fortinet FortiDeceptor 3.1Risk Level:3.7Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Fortinet FortiDeceptor is vulnerable to a denial of service,...
NAME__________HashiCorp Consul and Consul Enterprise denial of servicePlatforms Affected:Risk Level:4.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________HashiCorp Consul and Consul Enterprise are vulnerable to...
NAME__________OpenHarmony denial of servicePlatforms Affected:OpenHarmony OpenHarmony 3.1-Release OpenHarmony OpenHarmony 3.1.4Risk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________OpenHarmony is vulnerable to a denial of...