FlawedAmmyy Analysisinfo

IOB - Indicator of Behavior (28)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

sv8
en8
it6
de6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Matt Wright Matt Wright Guestbook2
jdownloads2
LogicBoard CMS2
Lars Ellingsen Guestserver2
ProFTPD2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Basti2web Book Panel books.php sql injection7.37.0$0-$5k$0-$5kHighOfficial fixpossible0.003050.03CVE-2009-4889
2Matt Wright Matt Wright Guestbook guestbook.pl cross site scripting4.33.9$0-$5k$0-$5kProof-of-ConceptUnavailable 0.009490.06CVE-2006-1697
3Matt Wright Matt Wright Guestbook cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptUnavailable 0.003350.09CVE-2006-1698
4SmartISoft phpBazar picturelib.php code injection7.37.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.005170.07CVE-2010-2315
5DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.009700.27CVE-2010-0966
6Lars Ellingsen Guestserver guestbook.cgi cross site scripting4.34.3$0-$5k$0-$5kNot definedNot defined 0.002970.02CVE-2005-4222
7SignKorn Guestbook admin.php privileges management5.35.3$0-$5k$0-$5kNot definedNot defined 0.000000.05
8LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot definedUnavailable 0.000000.29
9Csphere ClanSphere Error Message information disclosure5.35.3$0-$5k$0-$5kNot definedNot defined 0.002830.00CVE-2011-3714
10JContentSubscription register.php Local Privilege Escalation5.35.3$0-$5k$0-$5kNot definedNot defined 0.000000.06
11Flat PHP Board path traversal3.33.3$0-$5k$0-$5kNot definedNot defined 0.000000.07
12Linux Kernel NFS Export nfs3xdr.c no_subtree_check path traversal6.46.2$5k-$25k$0-$5kNot definedOfficial fix 0.006900.02CVE-2021-3178
13jdownloads categories.php order sql injection7.47.4$0-$5k$0-$5kNot definedNot defined 0.002640.00CVE-2020-19455
14ProFTPD link following5.45.3$0-$5k$0-$5kNot definedOfficial fix 0.000650.04CVE-2017-7418
15Palo Alto Network Traps ESM Console Agent License input validation6.46.1$0-$5k$0-$5kNot definedOfficial fix 0.005110.00CVE-2017-7408

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
1136.243.104.235static.235.104.243.136.clients.your-server.deFlawedAmmyy10/31/2023verifiedMedium

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (17)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/forum/away.phppredictiveHigh
2Fileadmin/admin.phppredictiveHigh
3Filebooks.phppredictiveMedium
4Filexxxxxxxxxx/xxx_xxxxxxxxxx/xxxxxxx/xxxxxxxxxx.xxxpredictiveHigh
5Filexx/xxxx/xxxxxxx.xpredictiveHigh
6Filexxxxxxxxx.xxxpredictiveHigh
7Filexxxxxxxxx.xxpredictiveMedium
8Filexxx/xxxxxx.xxxpredictiveHigh
9Filexxxx/xxxxxxxx.xxxpredictiveHigh
10Libraryxxxxxxxxxx.xxxpredictiveHigh
11ArgumentxxxxxxxxpredictiveMedium
12ArgumentxxxxxxpredictiveLow
13ArgumentxxxpredictiveLow
14Argumentxxx_xxxxpredictiveMedium
15Argumentxxxxxx_xxxxxpredictiveMedium
16Argumentxxxxxxxxx_xxxxxxxx_xxxxpredictiveHigh
17ArgumentxxxxxxxxpredictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!