FFDroider Analysisinfo

IOB - Indicator of Behavior (46)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en38
ru8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

cPanel4
Apache HTTP Server4
PHP4
Yii2
Juniper Junos OS2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1PHP UTF-32LE Encoding mb_strtolower stack-based overflow7.47.3$5k-$25k$0-$5kNot definedOfficial fix 0.100970.00CVE-2020-7065
2Moment.js path traversal6.96.7$0-$5k$0-$5kNot definedOfficial fix 0.005060.06CVE-2022-24785
3Actian Zen PSQL permission7.17.0$0-$5k$0-$5kNot definedOfficial fix 0.002620.00CVE-2022-40756
4Supermicro X10DRH-iT Web Interface config_user.cgi cross-site request forgery7.06.8$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.003830.00CVE-2020-15046
5cloud-init cc_set_passwords.py rand_user_password Policy insufficiently protected credentials4.24.2$0-$5k$0-$5kNot definedOfficial fix 0.000540.00CVE-2020-8632
6VMware Spring Framework HTTP Request denial of service7.57.4$5k-$25k$0-$5kNot definedOfficial fix 0.014750.03CVE-2024-22233
7PHP PHAR phar_dir_read buffer overflow8.28.2$5k-$25k$0-$5kNot definedOfficial fixpossible0.607060.08CVE-2023-3824
8Rexroth Nexo Cordless Nutrunner hard-coded credentials8.78.7$0-$5k$0-$5kNot definedNot defined 0.003740.00CVE-2023-48250
9Lanner IAC-AST2500A spx_restservice KillDupUsr_func out-of-bounds write9.99.8$0-$5k$0-$5kNot definedNot defined 0.004480.07CVE-2021-26728
10VMware vCenter Server information disclosure4.34.2$5k-$25k$0-$5kNot definedOfficial fix 0.003660.00CVE-2023-34056
11Red Hat rpcbind libtirpc svc_dg_getargs resource management7.56.7$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.080800.00CVE-2013-1950
12PHP cgi_main.c command injection8.58.4$25k-$100k$0-$5kHighOfficial fixverified0.943860.00CVE-2012-1823
13chart.js Options Parameter code injection5.35.1$0-$5k$0-$5kNot definedOfficial fix 0.001550.00CVE-2020-7746
14Yii Yii2 Gii cross site scripting4.44.4$0-$5k$0-$5kNot definedNot defined 0.001090.02CVE-2022-34297
15DataTables Plugin 6776.php cross site scripting4.34.3$0-$5k$0-$5kNot definedNot defined 0.002220.00CVE-2015-6584
16Yii Framework runAction sql injection8.07.9$0-$5k$0-$5kNot definedOfficial fix 0.116460.12CVE-2023-26750
17Portainer access control8.08.0$0-$5k$0-$5kNot definedNot defined 0.043730.00CVE-2020-24264
18Apache HTTP Server mod_session heap-based overflow7.37.0$25k-$100k$5k-$25kNot definedOfficial fixpossible0.464490.07CVE-2021-26691
19Best Practical Request Tracker Ticket Search redirect5.85.7$0-$5k$0-$5kNot definedOfficial fix 0.001890.00CVE-2022-25803
20Tawk.To Live Chat Plugin AJAX Action tawkto_removewidget authorization5.75.7$0-$5k$0-$5kNot definedOfficial fix 0.001030.00CVE-2021-24914

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
1152.32.228.19FFDroider07/29/2022verifiedMedium
2XXX.X.XXX.XXxxxx-xxxxx.xxxXxxxxxxxx07/29/2022verifiedMedium

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (17)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/var/log/nginxpredictiveHigh
2Filecgi/config_user.cgipredictiveHigh
3Filecloudinit/config/cc_set_passwords.pypredictiveHigh
4Filexxx_xxxxxx.xpredictiveMedium
5Filexxxxx.xxxpredictiveMedium
6Filexxxxx/xxxx_xxxxxxx/xxxxxxxxx/xxxx.xxxpredictiveHigh
7Filexxx/xxxxxxxxx/xx_xxxxxx_xxx.xpredictiveHigh
8Filexxxx/xxx/xxx_xxxx.xpredictiveHigh
9LibraryxxxxxxxxpredictiveMedium
10Argument$_xxxxxx['xxxxx_xxxxxx']predictiveHigh
11ArgumentxxpredictiveLow
12ArgumentxxxpredictiveLow
13ArgumentxxxxxpredictiveLow
14ArgumentxxxxxxxpredictiveLow
15ArgumentxxpredictiveLow
16Input Value-xpredictiveLow
17Network Portxxx/xx (xxx xxxxxxxx)predictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!