Trusted Design

MMD-0034-2015 - New ELF Linux/DES.Downloader

概要

Elasticsearch [link] has vulnerability which is now exploited in the wild, this post is one of the attack which aiming the CVE-2015-1427 [link], quoted: a vulnerability in Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script. Elasticsearch's Groovy dynamic scripting disabled by default from v1.4.3 due to this vulnerability [link], which is a recommendable way to mitigate this on going attack. In this incident, the attacker is using the shell command to download and execute the malware shell script file, to collect sensitive information of the unix system hosted by Elasticsearch and send it to the remote host, parallel with download+install the ELF malware functioned as the botnet agent backdoor & downloader on the victim's host.It also audits the victim's system with Lynis [link] and send the result to the remote host too.

Created: 2026-02-23

Indicators

Indicatorsは見つかっていない。

類似Pulses

このPulseに関連する脅威アクター (事実ベース)

Ember Bear

Score: 12.87
Matched TTPs:
  • T1114 - Email Collection
  • T1078.001 - Default Accounts
  • T1203 - Exploitation for Client Execution
  • T1588.005 - Exploits
MITREへのリンク →

Silent Librarian

Score: 3.62
Matched TTPs:
  • T1114 - Email Collection
MITREへのリンク →

Magic Hound

Score: 13.96
Matched TTPs:
  • T1114 - Email Collection
  • T1078.001 - Default Accounts
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Scattered Spider

Score: 8.10
Matched TTPs:
  • T1114 - Email Collection
  • T1059.004 - Unix Shell
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Sandworm Team

Score: 11.51
Matched TTPs:
  • T1588.006 - Vulnerabilities
  • T1584.005 - Botnet
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
MITREへのリンク →

Volt Typhoon

Score: 11.95
Matched TTPs:
  • T1588.006 - Vulnerabilities
  • T1584.005 - Botnet
  • T1059.004 - Unix Shell
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Storm-0501

Score: 6.59
Matched TTPs:
  • T1588.006 - Vulnerabilities
  • T1218.010 - Regsvr32
MITREへのリンク →

Lazarus Group

Score: 23.28
Matched TTPs:
  • T1202 - Indirect Command Execution
  • T1574.013 - KernelCallbackTable
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1027.007 - Dynamic API Resolution
  • T1021.001 - Remote Desktop Protocol
  • T1566.003 - Spearphishing via Service
  • T1529 - System Shutdown/Reboot
MITREへのリンク →

RedCurl

Score: 6.68
Matched TTPs:
  • T1202 - Indirect Command Execution
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
MITREへのリンク →

FIN13

Score: 6.46
Matched TTPs:
  • T1078.001 - Default Accounts
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

UNC3886

Score: 7.95
Matched TTPs:
  • T1078.001 - Default Accounts
  • T1059.004 - Unix Shell
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

APT29

Score: 22.84
Matched TTPs:
  • T1550.003 - Pass the Ticket
  • T1203 - Exploitation for Client Execution
  • T1090.004 - Domain Fronting
  • T1562.008 - Disable or Modify Cloud Logs
  • T1651 - Cloud Administration Command
  • T1204.001 - Malicious Link
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

APT32

Score: 10.63
Matched TTPs:
  • T1550.003 - Pass the Ticket
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
MITREへのリンク →

BRONZE BUTLER

Score: 6.53
Matched TTPs:
  • T1550.003 - Pass the Ticket
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
MITREへのリンク →

HAFNIUM

Score: 4.81
Matched TTPs:
  • T1584.005 - Botnet
  • T1071.001 - Web Protocols
MITREへのリンク →

Axiom

Score: 11.30
Matched TTPs:
  • T1584.005 - Botnet
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
  • T1001.002 - Steganography
MITREへのリンク →

Contagious Interview

Score: 15.10
Matched TTPs:
  • T1497 - Virtualization/Sandbox Evasion
  • T1059.004 - Unix Shell
  • T1543.001 - Launch Agent
  • T1204.001 - Malicious Link
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Saint Bear

Score: 6.70
Matched TTPs:
  • T1497 - Virtualization/Sandbox Evasion
  • T1203 - Exploitation for Client Execution
  • T1204.001 - Malicious Link
MITREへのリンク →

Darkhotel

Score: 9.47
Matched TTPs:
  • T1497 - Virtualization/Sandbox Evasion
  • T1497.002 - User Activity Based Checks
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

FIN7

Score: 7.14
Matched TTPs:
  • T1497.002 - User Activity Based Checks
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
MITREへのリンク →

Aquatic Panda

Score: 4.48
Matched TTPs:
  • T1059.004 - Unix Shell
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

TeamTNT

Score: 4.02
Matched TTPs:
  • T1059.004 - Unix Shell
  • T1071.001 - Web Protocols
MITREへのリンク →

Rocke

Score: 4.02
Matched TTPs:
  • T1059.004 - Unix Shell
  • T1071.001 - Web Protocols
MITREへのリンク →

APT41

Score: 7.16
Matched TTPs:
  • T1059.004 - Unix Shell
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Sea Turtle

Score: 5.51
Matched TTPs:
  • T1059.004 - Unix Shell
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
MITREへのリンク →

TA551

Score: 3.93
Matched TTPs:
  • T1218.010 - Regsvr32
  • T1071.001 - Web Protocols
MITREへのリンク →

Cobalt Group

Score: 8.44
Matched TTPs:
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
MITREへのリンク →

Blue Mockingbird

Score: 4.39
Matched TTPs:
  • T1218.010 - Regsvr32
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Leviathan

Score: 10.40
Matched TTPs:
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
  • T1027.015 - Compression
MITREへのリンク →

Kimsuky

Score: 11.07
Matched TTPs:
  • T1218.010 - Regsvr32
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
  • T1588.005 - Exploits
MITREへのリンク →

Inception

Score: 5.43
Matched TTPs:
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
MITREへのリンク →

WIRTE

Score: 3.93
Matched TTPs:
  • T1218.010 - Regsvr32
  • T1071.001 - Web Protocols
MITREへのリンク →

APT19

Score: 3.93
Matched TTPs:
  • T1218.010 - Regsvr32
  • T1071.001 - Web Protocols
MITREへのリンク →

Sidewinder

Score: 4.04
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
MITREへのリンク →

APT28

Score: 4.04
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
MITREへのリンク →

Threat Group-3390

Score: 5.83
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1027.015 - Compression
MITREへのリンク →

Dragonfly

Score: 3.14
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

EXOTIC LILY

Score: 5.38
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1204.001 - Malicious Link
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Confucius

Score: 4.04
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
MITREへのリンク →

Patchwork

Score: 4.50
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
MITREへのリンク →

Higaisa

Score: 5.83
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1027.015 - Compression
MITREへのリンク →

APT37

Score: 6.30
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1529 - System Shutdown/Reboot
MITREへのリンク →

Mustang Panda

Score: 8.17
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1027.007 - Dynamic API Resolution
  • T1204.001 - Malicious Link
MITREへのリンク →

APT3

Score: 4.50
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
MITREへのリンク →

OilRig

Score: 8.21
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

APT33

Score: 4.04
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
MITREへのリンク →

MuddyWater

Score: 4.04
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
MITREへのリンク →

Moonstone Sleet

Score: 3.71
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Dark Caracal

Score: 3.71
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Medusa Group

Score: 6.46
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
  • T1529 - System Shutdown/Reboot
MITREへのリンク →

APT38

Score: 6.17
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
  • T1529 - System Shutdown/Reboot
MITREへのリンク →

Wizard Spider

Score: 4.20
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
MITREへのリンク →

FIN8

Score: 4.20
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
MITREへのリンク →

Windshift

Score: 5.07
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Gamaredon Group

Score: 5.70
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1204.001 - Malicious Link
  • T1027.015 - Compression
MITREへのリンク →

APT39

Score: 4.20
Matched TTPs:
  • T1071.001 - Web Protocols
  • T1021.001 - Remote Desktop Protocol
  • T1204.001 - Malicious Link
MITREへのリンク →

Equation

Score: 4.13
Matched TTPs:
  • T1564.005 - Hidden File System
MITREへのリンク →

Strider

Score: 4.13
Matched TTPs:
  • T1564.005 - Hidden File System
MITREへのリンク →

Mustard Tempest

Score: 5.90
Matched TTPs:
  • T1608.006 - SEO Poisoning
  • T1204.001 - Malicious Link
MITREへのリンク →

FIN6

Score: 4.17
Matched TTPs:
  • T1021.001 - Remote Desktop Protocol
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Molerats

Score: 4.51
Matched TTPs:
  • T1204.001 - Malicious Link
  • T1027.015 - Compression
MITREへのリンク →

TA2541

Score: 4.51
Matched TTPs:
  • T1204.001 - Malicious Link
  • T1027.015 - Compression
MITREへのリンク →

Mofang

Score: 4.51
Matched TTPs:
  • T1204.001 - Malicious Link
  • T1027.015 - Compression
MITREへのリンク →

このPulseに関連する脅威アクター (推論ベース)

APT29

Score: 0.77
Matched TTPs:
  • T1562.008 - Disable or Modify Cloud Logs
  • T1203 - Exploitation for Client Execution
  • T1566.003 - Spearphishing via Service
  • T1090.004 - Domain Fronting
  • T1651 - Cloud Administration Command
  • T1550.003 - Pass the Ticket
  • T1204.001 - Malicious Link
MITREへのリンク →

Lazarus Group

Score: 0.75
Matched TTPs:
  • T1202 - Indirect Command Execution
  • T1574.013 - KernelCallbackTable
  • T1203 - Exploitation for Client Execution
  • T1027.007 - Dynamic API Resolution
  • T1071.001 - Web Protocols
  • T1566.003 - Spearphishing via Service
  • T1021.001 - Remote Desktop Protocol
  • T1529 - System Shutdown/Reboot
MITREへのリンク →

Related CVEs

Pulse – 脅威アクター グラフ


← Pulse一覧に戻る