BLM Analysisinfo

IOB - Indicator of Behavior (48)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en48

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

RosarioSIS2
EVOLUCARE ECS Imaging2
Zoho ManageEngine ServiceDesk Plus2
Novell GroupWise2
u5cms2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Microsoft Internet Explorer memory corruption6.96.6$25k-$100k$0-$5kProof-of-ConceptOfficial fixpossible0.618730.00CVE-2017-0202
2Guo Xu Guos Posting System print.asp sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.013220.00CVE-2007-0554
3Libra File Manager Php Filemanager fileadmin.php improper authentication6.56.4$0-$5k$0-$5kFunctionalUnavailable 0.022200.00CVE-2008-4319
4u5cms loginsave.php redirect5.55.5$0-$5k$0-$5kNot definedNot defined 0.161040.00CVE-2022-32444
5MidiCart midicart.mdb information disclosure5.35.0$0-$5k$0-$5kProof-of-ConceptNot defined 0.075150.00CVE-2002-1432
6Microsoft Host Integration Server input validation7.56.7$5k-$25k$0-$5kProof-of-ConceptOfficial fixpossible0.677850.07CVE-2011-2007
7Microsoft Windows Bitlocker Password Output information disclosure3.73.6$5k-$25k$0-$5kNot definedOfficial fix 0.008220.08CVE-2008-3893
8Novell GroupWise WebAccess webacc improper authentication6.55.9$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.000000.06
9D-Link DSL-320B login.xgi information disclosure5.34.8$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.000000.00
10ZyXEL XGS2210-52HP rpSys.html Stored cross site scripting4.84.8$0-$5k$0-$5kNot definedNot defined 0.001500.08CVE-2019-13495
11Symantec Raptor Firewall Secure Webserver 1.1 privileges management5.35.1$5k-$25k$0-$5kNot definedOfficial fix 0.008220.00CVE-2002-1535
12Hitachi Cosminexus Portal Framework information disclosure5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.005960.06CVE-2004-2452
13Linux Kernel ICMP Error Message ip_options_echo resource management7.56.5$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.063710.05CVE-2006-0454
14Stoverud PHPhotoalbum File Upload upload.php unrestricted upload7.36.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.025580.05CVE-2009-4819
15Jetbox One CMS memory corruption5.95.9$0-$5k$0-$5kNot definedNot defined 0.021920.00CVE-2004-1448
16Jetbox One CMS cleartext storage5.34.9$0-$5k$0-$5kProof-of-ConceptWorkaround 0.006560.00CVE-2004-1447
17Ethereal Protocol Dissector memory corruption5.65.4$5k-$25k$0-$5kNot definedOfficial fix 0.023060.00CVE-2003-0428
18Netscape Communicator Mail Password missing encryption5.35.1$0-$5k$0-$5kNot definedOfficial fix 0.003050.00CVE-1999-1002
19Mozilla Firefox XHTML DOM Node Name Remote Code Execution6.35.7$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.037270.00CVE-2005-2260
20nginx ngx_http_mp4_module memory corruption10.09.5$0-$5k$0-$5kNot definedOfficial fix 0.037850.00CVE-2012-2089

IOC - Indicator of Compromise (6)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
16.43.51.17BLM06/15/2020verifiedLow
282.202.65.125125-65-202-82.hicoria.comBLM06/15/2020verifiedLow
3XX.XXX.XX.XXXxxx-xx-xxx-xx.xxxxxxx.xxxXxx06/15/2020verifiedLow
4XX.XXX.XX.XXXxxx-xx-xxx-xx.xxxxxxx.xxxXxx06/15/2020verifiedLow
5XX.XXX.XXX.XXXxxx-xxx-xxx-xx.xxxxxxx.xxxXxx06/15/2020verifiedLow
6XX.XXX.XXX.XXxx-xxx-xxx-xx.xxx.xx.xxXxx06/15/2020verifiedLow

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (47)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/loginsave.phppredictiveHigh
2File/mc-admin/page.phppredictiveHigh
3File/servlet/webaccpredictiveHigh
4File/showfile.phppredictiveHigh
5File/Side.phppredictiveMedium
6File/textpattern/index.phppredictiveHigh
7Filexxxx_xxx.xxxpredictiveMedium
8Filexxxxxxx/xxxxxxxx.xpredictiveHigh
9Filexxxxxxxxxxxx/xxxxxxxxxxxxxxxxxx.xxpredictiveHigh
10Filexxxx_xxxx.xxxpredictiveHigh
11Filexxxxxxx.xxxxpredictiveMedium
12Filexxxxxx.xxxpredictiveMedium
13Filexxxxxxxxx.xxxpredictiveHigh
14Filexxxxxxxxxxxx.xxxpredictiveHigh
15Filexxxxx.xxx?xxx=xxxx&xxxxxx=xxxxxxxxxpredictiveHigh
16Filexxxxx.xxxpredictiveMedium
17Filexxxxxxxx.xxxpredictiveMedium
18Filexxxxx.xxxpredictiveMedium
19Filexxxx.xxxpredictiveMedium
20Filexxxxx.xxxxpredictiveMedium
21Filexxxxxx.xxxpredictiveMedium
22Filexxxxxxxx.xxxxpredictiveHigh
23Filexxxxx/xxxxx_xxxxx.xxx / xxxxx.xxxpredictiveHigh
24Filexxxx.xxxpredictiveMedium
25Filexxxxxx.xxxpredictiveMedium
26Filexxxx_xxxx.xxxpredictiveHigh
27Filexxxxxxx/xxxxxxxxx/xxxxxxxxxxxx.xxxpredictiveHigh
28Filexx-xxxxx/xxxx.xxxpredictiveHigh
29ArgumentxxxxxpredictiveLow
30ArgumentxxxxpredictiveLow
31ArgumentxxxpredictiveLow
32ArgumentxxxxxxxxxxpredictiveMedium
33Argumentxx_xxpredictiveLow
34ArgumentxxxxxxxpredictiveLow
35ArgumentxxxxpredictiveLow
36ArgumentxxxxpredictiveLow
37ArgumentxxxxxxxxpredictiveMedium
38Argumentxxxx_xxxx[]predictiveMedium
39ArgumentxxpredictiveLow
40Argumentxxxx_xxpredictiveLow
41ArgumentxxxxxpredictiveLow
42Argumentxxxx/xxxxxxxxpredictiveHigh
43ArgumentxxxxxpredictiveLow
44ArgumentxxxxxpredictiveLow
45Argumentxxx/xxxxx.xxxx.xxxxxxxx.xxxxx/xxxxxxxxpredictiveHigh
46Input ValuexxxxxxpredictiveLow
47Network Portxxx xxxxxx xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!