Dracarys Analysis

IOB - Indicator of Behavior (162)

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Lang

en158
fr2
de2

Country

us25
tr23
es1
cn1

Actors

Activities

Interest

Product

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need you unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1SmarterTools SmarterMail path traversal6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.040.10289CVE-2019-7213
2cumin Server Certificate Validator certificate validation7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00885CVE-2013-0264
3Netgear R7000P httpd buffer overflow5.55.3$5k-$25k$5k-$25kNot DefinedNot Defined0.070.00885CVE-2022-44188
4Microsoft Windows CryptoAPI authentication spoofing6.86.2$25k-$100k$5k-$25kUnprovenOfficial Fix0.110.02251CVE-2022-34689
5Dell Hybrid Client UI redos4.03.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-34428
6Google Chrome Logging use after free6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.040.01055CVE-2022-3314
7Cisco SD-WAN CLI argument injection6.76.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-20930
8CPO Shortcodes Plugin cross site scripting3.63.6$0-$5k$0-$5kNot DefinedNot Defined0.060.00885CVE-2022-40672
9MediaTek MT8797 vow out-of-bounds write5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.030.01036CVE-2022-26457
10Zephyr Flag tcp.c tcp_flags out-of-bounds write6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.040.00885CVE-2022-1841
11SoX File formats_i.c lsx_read_w_buf buffer overflow5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.030.01018CVE-2021-23159
12dmitrylitvinov Uploading SVG, WEBP and ICO Files Plugin unrestricted upload5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.000.00885CVE-2022-36285
13Softing Secure Integration Server uncontrolled search path7.27.2$0-$5k$0-$5kNot DefinedNot Defined0.040.01440CVE-2022-2334
14OpenZeppelin Contracts Signature ECDSA.tryRecover integrity check6.26.1$0-$5k$0-$5kNot DefinedOfficial Fix0.070.00890CVE-2022-35961
15Google Android PermissionController permission5.35.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.01036CVE-2022-20271
16Google Android exynos5_i2c_irq out-of-bounds write6.76.5$25k-$100k$5k-$25kNot DefinedOfficial Fix0.040.01036CVE-2022-20372
17Google Android NotificationManagerService.java permission3.33.2$5k-$25k$5k-$25kNot DefinedOfficial Fix0.000.00000CVE-2022-20359
18Contiki-NG Routing Protocol set_ip_from_prefix buffer overflow8.17.9$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00954CVE-2022-35927
19IBM DataPower Gateway Web UI cross site scripting4.44.4$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-32750
20RainLoop Email Viewer cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.040.00885CVE-2022-29360

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsTypeConfidence
194.140.114.22DracarysverifiedHigh

TTP - Tactics, Techniques, Procedures (21)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (75)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/acms/classes/Master.php?f=delete_cargopredictiveHigh
2File/admin.php/news/admin/topic/savepredictiveHigh
3File/admin/comn/service/update.jsonpredictiveHigh
4File/dev/shmpredictiveMedium
5File/dl/dl_print.phppredictiveHigh
6File/getcfg.phppredictiveMedium
7File/ofcms/company-c-47predictiveHigh
8File/usr/sbin/httpdpredictiveHigh
9File/util/print.cpredictiveHigh
10File/xxx/xxxxxxxxxx.xxxxpredictiveHigh
11Filexxx-xxxx.xpredictiveMedium
12Filexxxxxxxx/xxxxxxx_xxxxxxx.xxxpredictiveHigh
13Filexxxxx.xxx/xxxxx/xxxxxxxxx/xxxxx/xxxxx/xxxxxx.xxxxpredictiveHigh
14Filexxxxx/xxxxxx/xxxxx-xxxxxx-xxxxxxxx.xxxpredictiveHigh
15Filexxxxxxxx.xxxpredictiveMedium
16Filexxx-xxxx.xxxpredictiveMedium
17Filexxxxxxxxx.xpredictiveMedium
18Filexxxxxxx.xxxpredictiveMedium
19Filexxxxxxx/xxx/xx/xxxxxxxxxx.xpredictiveHigh
20Filexxxxxxxx.xxxpredictiveMedium
21Filexxxxxxx_x.xpredictiveMedium
22Filexxxxx_xxxxxxxx.xxxpredictiveHigh
23Filexxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
24Filexxxxx.xxxpredictiveMedium
25Filexxxxx.xxx?x=/xxxx/xxxxxxxxpredictiveHigh
26Filexxxxxxxxx/xxxxxxxxx/xxxxxxxxx_xxxxx_xxx.xxxpredictiveHigh
27Filexxxxxxxx/xxxx_xxxx.xpredictiveHigh
28Filexxx_xxxxxx_xxxxxx.xxpredictiveHigh
29Filexxx/xxxxxxxxx/x_xxxxxx.xpredictiveHigh
30Filexxxxxxxxxxxxxxxx.xxxpredictiveHigh
31Filexxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
32Filexxxxxxx/xx_xxxxx_xxxx/xxxx.xxxpredictiveHigh
33Filexxxxxxx.xxxpredictiveMedium
34Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]predictiveHigh
35Filexxxxxxx.xxxpredictiveMedium
36Filexx_xxxx/xx_xxxxxx.xpredictiveHigh
37Filexxx_xxxxxxxx.xpredictiveHigh
38Filexxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
39Filexxxxxx/xxx/xx/xxx.xpredictiveHigh
40Filexxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
41Filexxxxxxxxx/xxxxxxxxx/xxxx-xxx.xxx.xxxpredictiveHigh
42Filexxxxxxx/xxxxx.xxxpredictiveHigh
43Filexxxxxxxxxxx_xxxxxx_xxxx.xxxx.xxxpredictiveHigh
44Filexxxxxx.xxxpredictiveMedium
45Filexxxxxxxx/xxxxxxxxpredictiveHigh
46Filexxxxx/xxxxx.xxpredictiveHigh
47Filexxxxxx/xx/xxxx.xxxpredictiveHigh
48Filexxxxxxxxx.xxxpredictiveHigh
49Argument$_xxxxxxx["xxx"]predictiveHigh
50Argumentxxx_xxxxxxxxxxpredictiveHigh
51Argumentxxxxxxxx_x/xxxxxxxx_xpredictiveHigh
52ArgumentxxxxxxxxxpredictiveMedium
53ArgumentxxxpredictiveLow
54ArgumentxxxxxxxxxxxxxxxpredictiveHigh
55ArgumentxxxxxxxxxpredictiveMedium
56ArgumentxxxxxxxxxpredictiveMedium
57Argumentxxxxxx x xxx xxxxxxxxxxpredictiveHigh
58Argumentxxxxxx_xxxx_xxxxxxxxpredictiveHigh
59ArgumentxxxxxxxxxpredictiveMedium
60ArgumentxxpredictiveLow
61ArgumentxxxpredictiveLow
62ArgumentxxxxxxxxxpredictiveMedium
63ArgumentxxxxpredictiveLow
64ArgumentxxxxxxpredictiveLow
65ArgumentxxxxxxxpredictiveLow
66ArgumentxxxxxxxxpredictiveMedium
67ArgumentxxxxxpredictiveLow
68Argumentx_xxpredictiveLow
69Argumentxxxxxx xxxxpredictiveMedium
70ArgumentxxxxpredictiveLow
71ArgumentxxxxxxxxpredictiveMedium
72ArgumentxxxxxxxxpredictiveMedium
73ArgumentxxxxxxxxpredictiveMedium
74ArgumentxxxxxpredictiveLow
75ArgumentxxxxxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!