otx.alienvault.com
Open in
urlscan Pro
108.138.36.104
Public Scan
URL:
https://otx.alienvault.com/indicator/hostname/qzt3iqkb6erl9oohic20f9bal1rsfh.oastify.com
Submission: On October 17 via api from IN — Scanned from DE
Submission: On October 17 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
× Loading... * Browse * Scan Endpoints * Create Pulse * Submit Sample * API Integration * Login | Sign Up All * Login | Sign Up * Hostname qzt3iqkb6erl9oohic20f9bal1rsfh.oastify.com Add to Pulse Pulses 5 Passive DNS 3 URLs 0 Files 0 Loading Analysis Analysis Overview WHOIS Registrar: Amazon Registrar, Inc., Creation Date:Feb 21, 2022 Related Pulses LevelBlue Labs Pulses (1) , OTX User-Created Pulses (4) Related Tags 18 Related Tags WSFTPSVR_WTM , C# , Windows API , PowerShell , Curl More External Resources Whois, UrlVoid, VirusTotal WHOIS Show 10 25 50 100 entries Search: Record Value Emails abuse@amazonaws.com Name On behalf of oastify.com owner Name Servers NS1.OASTIFY.COM Org Whois Privacy Service Address P.O. Box 81226 City Seattle Country US Creation Date 2022-02-21T15:22:14 Dnssec unsigned Domain Name OASTIFY.COM SHOWING 1 TO 10 OF 26 ENTRIES 1 2 3 Next RELATED DOMAINS Show 10 25 50 100 entries Search: Domain Related Via condomanagementsmart.com abuse@amazonaws.com flastagee.com abuse@amazonaws.com codwfare.com abuse@amazonaws.com gamepaytoplay.com abuse@amazonaws.com chelsearadin.com abuse@amazonaws.com churchdatalytics.com abuse@amazonaws.com dnsaround.com abuse@amazonaws.com amazonaws.com abuse@amazonaws.com lenekasaza.com abuse@amazonaws.com chinastarkitchennj.com abuse@amazonaws.com SHOWING 1 TO 10 OF 100 ENTRIES 1 2 3 4 5 ... 10 Next Analysis Related Pulses Comments (0) WHOIS Show 10 25 50 100 entries Search: Record Value Emails abuse@amazonaws.com Name On behalf of oastify.com owner Name Servers NS1.OASTIFY.COM Org Whois Privacy Service Address P.O. Box 81226 City Seattle Country US Creation Date 2022-02-21T15:22:14 Dnssec unsigned Domain Name OASTIFY.COM SHOWING 1 TO 10 OF 26 ENTRIES 1 2 3 Next PASSIVE DNS Status Hostname Query Type Address First Seen Last Seen ASN Country Unknown qzt3iqkb6erl9oohic20f9bal1rsfh.oastify.com A 3.248.33.252 2023-10-09 06:312024-06-08 05:46AS16509 amazon.com inc Ireland Unknown qzt3iqkb6erl9oohic20f9bal1rsfh.oastify.com A 54.77.139.23 2023-10-09 06:312024-06-08 05:46AS16509 amazon.com inc Ireland Unknown qzt3iqkb6erl9oohic20f9bal1rsfh.oastify.com CNAME PublicInteractionNLB-3bddf5ff6abb91b6.elb.eu-west-1.amazonaws.com 2023-10-09 06:312023-10-09 06:33AS16509 amazon.com inc Ireland ASSOCIATED FILES Show 10 25 50 100 entries Date Hash Avast AVG Clamav MSDefender No Entries Found HTTP SCANS Show 10 25 50 100 entries Search: Record Value 80 Body html body 5bfudevdzav7lmncg51ot2zjjgz /body /html 80 HeaderHTTP/1.1 200 OK Server: Burp Collaborator https://burpcollaborator.net/ X Collaborator Version: 4 Content Type: text/html Content Length: 53 443 Certificate Subject*.oastify.com443 Certificate IssuerGB443 Certificate IssuerGreater Manchester443 Certificate IssuerSalford443 Certificate IssuerSectigo Limited443 Certificate IssuerSectigo RSA Domain Validation Secure Server CA443 Certificate Version3443 Certificate Serialnumber86B545927F4EA2F976189B3B2FDB7C30 SHOWING 1 TO 10 OF 16 ENTRIES 1 2 Next RELATED DOMAINS Show 10 25 50 100 entries Search: Domain Related Via condomanagementsmart.com abuse@amazonaws.com flastagee.com abuse@amazonaws.com codwfare.com abuse@amazonaws.com gamepaytoplay.com abuse@amazonaws.com chelsearadin.com abuse@amazonaws.com churchdatalytics.com abuse@amazonaws.com dnsaround.com abuse@amazonaws.com amazonaws.com abuse@amazonaws.com lenekasaza.com abuse@amazonaws.com chinastarkitchennj.com abuse@amazonaws.com SHOWING 1 TO 10 OF 100 ENTRIES 1 2 3 4 5 ... 10 Next * LevelBlue Labs (1) * User Created (4) Threat Actors Actively Exploiting Progress WS_FTP via Multiple Attack Chains hostname Indicator Active * Created 1 year ago * Modified 10 months ago by AlienVault * Public * TLP: White FileHash-SHA1: 19 | Hostname: 3 Starting on September 30, 2023, SentinelOne has observed actors exploiting the recently disclosed flaws in Progress’ WS_FTP against Windows servers running a vulnerable version of the software. The two highest severity vulnerabilities–CVE-2023-40044 and CVE-2023-42657–were assigned a CVSS score of 10 and 9.9, respectively. We observed at least three types of multi-stage attack chains, which begin with exploitation, and then commands to download a payload from a remote server, often via an IP-literal URL. WSFTPSVR_WTM, C#, Windows API, PowerShell, Curl, Active Directory (AD) * 288,458 Subscribers Threat Actors Actively Exploiting Progress WS_FTP via Multiple Attack Chains hostname Indicator Active * Created 1 year ago * Modified 11 months ago by feisty-swim1410 * Public * TLP: White FileHash-SHA1: 19 | Domain: 1 | Hostname: 3 Starting on September 30, 2023, SentinelOne has observed actors exploiting the recently disclosed flaws in Progress’ WS_FTP against Windows servers running a vulnerable version of the software. The two highest severity vulnerabilities–CVE-2023-40044 and CVE-2023-42657–were assigned a CVSS score of 10 and 9.9, respectively. We observed at least three types of multi-stage attack chains, which begin with exploitation, and then commands to download a payload from a remote server, often via an IP-literal URL. WSFTPSVR_WTM, C#, Windows API, PowerShell, Curl, Active Directory (AD) * 45 Subscribers Threat Actors Actively Exploiting Progress WS_FTP via Multiple Attack Chains hostname Indicator Active * Created 1 year ago * Modified 11 months ago by tr2222200 * Public * TLP: White FileHash-SHA1: 19 | Domain: 1 | Hostname: 3 WSFTPSVR_WTM, C#, Windows API, PowerShell, Curl, Active Directory (AD) * 139 Subscribers Threat Actors Actively Exploiting Progress WS_FTP via Multiple Attack Chains hostname Indicator Active * Created 12 months ago * Modified 11 months ago by Tr1sa111 * Public * TLP: White FileHash-SHA1: 19 | Domain: 1 | Hostname: 3 WSFTPSVR_WTM, C#, Windows API, PowerShell, Curl, Active Directory (AD) * 139 Subscribers Threat Actors Actively Exploiting Progress WS_FTP via Multiple Attack Chains - SentinelOne hostname Indicator Active * Created 1 year ago * Modified 11 months ago by AL-SOC@ascendlearning.com * Public * TLP: White CVE: 2 | FileHash-SHA1: 19 | URL: 14 | Domain: 2 | Hostname: 4 Stay up-to-date with the latest updates from SentinelOne, the world’s leading cybersecurity company, at the OneCon23 event in Las Vegas, USA, on 23 May. powershell, attack chain, c curl, progress, variable, temp, curl, ssw0rd123, moveit transfer, september, virustotal, june * 26 Subscribers COMMENTS You must be logged in to leave a comment. Refresh Comments * © Copyright 2024 LevelBlue, Inc. * Legal * Status