Fox Kitten Analysisinfo

IOB - Indicator of Behavior (440)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en310
fr78
es28
ru12
de6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel8
Microsoft IIS6
WordPress6
MikroTik RouterOS6
Foxit PDF Reader6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1nginx request smuggling6.96.9$0-$5k$0-$5kNot definedNot defined 0.000000.13CVE-2020-12440
2Linux Kernel KVM access control7.07.0$0-$5k$0-$5kNot definedOfficial fix 0.000300.00CVE-2018-1087
3XenForo privileges management8.67.9$0-$5k$0-$5kNot definedOfficial fix 0.000000.00
4Cisco FirePOWER Management Center Web Interface redirect5.85.6$5k-$25k$0-$5kNot definedOfficial fix 0.002630.00CVE-2020-3311
5Ecommerce Online Store Kit shop.php sql injection9.88.8$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.028070.02CVE-2004-0300
6jQuery Property extend Pollution cross site scripting6.66.3$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.020220.04CVE-2019-11358
7Grafana HTTP API access control6.46.3$0-$5k$0-$5kNot definedOfficial fixexpected0.907900.07CVE-2019-15043
8nginx Range Filter integer overflow6.46.3$0-$5k$0-$5kNot definedWorkaroundexpected0.919090.07CVE-2017-7529
9gunicorn wsgi.py process_headers crlf injection7.47.2$0-$5k$0-$5kNot definedOfficial fix 0.014840.04CVE-2018-1000164
10Ajax Load More Plugin admin-ajax.php sql injection6.76.1$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.005340.03CVE-2021-24140
11phpMyAdmin grab_globals.lib.php path traversal4.84.4$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.079740.04CVE-2005-3299
12Bootstrap scrollspy cross site scripting5.25.1$0-$5k$0-$5kNot definedOfficial fix 0.068260.06CVE-2018-14041
13OAuth2 Proxy Domain Whitelist access control5.55.3$0-$5k$0-$5kNot definedOfficial fix 0.003260.07CVE-2021-21291
14Metabase Custom GeoJSON Map file inclusion7.17.0$0-$5k$0-$5kAttackedOfficial fixverified0.944040.02CVE-2021-41277
15Microsoft Exchange Server information disclosure5.44.7$5k-$25k$0-$5kUnprovenOfficial fixexpected0.914360.03CVE-2021-41349
16OpenSSH auth2-gss.c information disclosure5.35.2$5k-$25k$0-$5kHighOfficial fixexpected0.904730.02CVE-2018-15473
17PHP-Fusion Shoutbox Message Panel shoutbox_archive.php redirect5.15.1$0-$5k$0-$5kNot definedNot defined 0.001210.00CVE-2020-23182
18Microsoft IIS WebDAV ScStoragePathFromUrl Immortal/ExploidingCan memory corruption9.08.9$25k-$100k$0-$5kAttackedOfficial fixverified0.943580.04CVE-2017-7269
19Joomla CMS default.php access control6.46.3$5k-$25k$0-$5kNot definedOfficial fix 0.000100.06CVE-2016-9837
20Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaroundpossible0.029560.00CVE-2007-1192

IOC - Indicator of Compromise (21)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
113.53.124.246ec2-13-53-124-246.eu-north-1.compute.amazonaws.comFox Kitten09/18/2024verifiedMedium
218.134.0.66ec2-18-134-0-66.eu-west-2.compute.amazonaws.comFox Kitten09/18/2024verifiedMedium
318.221.150.202ec2-18-221-150-202.us-east-2.compute.amazonaws.comFox Kitten06/17/2024verifiedLow
445.76.65.4245.76.65.42.vultrusercontent.comFox Kitten09/18/2024verifiedVery High
551.16.51.81ec2-51-16-51-81.il-central-1.compute.amazonaws.comFox Kitten09/18/2024verifiedMedium
6XX.XX.XXX.XXXxxx-xx-xx-xxx-xxx.xx-xxxxx-x.xxxxxxx.xxxxxxxxx.xxxXxx Xxxxxx09/18/2024verifiedMedium
7XX.XXX.XXX.XXxx.xxx.xxx.xx.xxxxxxxxxxxxxxxx.xxxXxx Xxxxxx09/18/2024verifiedVery High
8XX.XX.XXX.XXxx.xx.xxx.xx.xxxxxxxxxxxxxxxx.xxxXxx Xxxxxx09/18/2024verifiedVery High
9XX.XXX.XXX.XXXxx.xxx.xxx.xxx.xxxxxxxxxxxxxxxx.xxxXxx Xxxxxx09/18/2024verifiedVery High
10XX.XXX.XX.XXXXxx Xxxxxx06/17/2024verifiedHigh
11XX.XXX.XXX.XXXxxxx.xxxx.xxx-xx.xx.xxxxxxxx.xxxXxx Xxxxxx06/17/2024verifiedHigh
12XX.XXX.XXX.XXXxx Xxxxxx06/17/2024verifiedHigh
13XX.XXX.XXX.XXXXxx Xxxxxx06/17/2024verifiedHigh
14XX.XXX.XXX.XXXXxx Xxxxxx06/17/2024verifiedHigh
15XXX.XXX.XX.XXXXxx Xxxxxx09/18/2024verifiedVery High
16XXX.XX.XX.XXXxx Xxxxxx09/18/2024verifiedVery High
17XXX.XX.XXX.XXXXxx Xxxxxx09/18/2024verifiedVery High
18XXX.XX.XXX.XXXXxx Xxxxxx06/17/2024verifiedHigh
19XXX.XXX.XXX.XXXxx Xxxxxx09/18/2024verifiedVery High
20XXX.XXX.XXX.XXXXxx Xxxxxx09/18/2024verifiedVery High
21XXX.XX.XXX.XXXxx Xxxxxx09/18/2024verifiedVery High

TTP - Tactics, Techniques, Procedures (18)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (248)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.procmailrcpredictiveMedium
2File/admin/maintenance/manage_category.phppredictiveHigh
3File/admin/vacancy/index.phppredictiveHigh
4File/api/swaggerui/staticpredictiveHigh
5File/backend/system.htmlpredictiveHigh
6File/goform/QuickIndexpredictiveHigh
7File/include/stat/stat.phppredictiveHigh
8File/manage/IPSetup.phppredictiveHigh
9File/out.phppredictiveMedium
10File/php-fusion/infusions/shoutbox_panel/shoutbox_archive.phppredictiveHigh
11File/redpass.cgipredictiveMedium
12File/shop.phppredictiveMedium
13File/uncpath/predictiveMedium
14File/user/profilepredictiveHigh
15File/user/zs_elite.phppredictiveHigh
16File/usr/bin/atpredictiveMedium
17File/var/log/nginxpredictiveHigh
18File/var/WEB-GUI/cgi-bin/telnet.cgipredictiveHigh
19File/wp-admin/admin-ajax.phppredictiveHigh
20File5.2.9\syscrb.exepredictiveHigh
21Fileaccountrecoveryendpoint/recoverpassword.dopredictiveHigh
22Fileadmin.php3predictiveMedium
23Fileadmin/review.phppredictiveHigh
24FileadmincgipredictiveMedium
25Fileadmin_add.phppredictiveHigh
26Fileapps/app_article/controller/rating.phppredictiveHigh
27Fileattachment.dopredictiveHigh
28Fileauth2-gss.cpredictiveMedium
29Filebackupmgt/getAlias.phppredictiveHigh
30Filebitrix/modules/main/tools.phppredictiveHigh
31Fileboard.phppredictiveMedium
32Filebooks.phppredictiveMedium
33Filebuy.phppredictiveLow
34Filecalendar.phppredictiveMedium
35Filexxxx.xxxpredictiveMedium
36Filexxx.xxxpredictiveLow
37Filexxxxxxxx.xxxpredictiveMedium
38Filexxxxxxxx.xxxpredictiveMedium
39Filexxxxxxxx_xxxx.xxxpredictiveHigh
40Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
41Filexxx-xxx/xxxxxxpredictiveHigh
42Filexxx-xxx/xxx/xxxxxx.xxpredictiveHigh
43Filexxxxxx_xxx.xpredictiveMedium
44Filexxxxxxxx.xxx.xxxpredictiveHigh
45Filexxxxxxxx.xxxpredictiveMedium
46Filexxxxxxxx/xxxxpredictiveHigh
47Filexxxxxx.xxx.xxxpredictiveHigh
48Filexxxxxxx.xxxpredictiveMedium
49Filexx_xxxx.xpredictiveMedium
50Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
51Filexx_xxxxxxx_xxxxxxx.xxxpredictiveHigh
52Filexx.xxxpredictiveLow
53Filexxxxxx.xxxpredictiveMedium
54Filexxxxxx.xxxpredictiveMedium
55Filexxxxxxx.xxxpredictiveMedium
56Filexxxxxxx.xxxpredictiveMedium
57Filexxxxxxxxxxxxx.xxxxpredictiveHigh
58Filexxxxxx/xxxxxxxx.xpredictiveHigh
59Filexxxxxx/xxxxxx.xxxpredictiveHigh
60Filexxxxxx/xxx/xxxxxxx.xxxpredictiveHigh
61Filexxxx-xxxxxxxx-xxxxxx.xxxpredictiveHigh
62Filexxxxxxx.xxxpredictiveMedium
63Filexxxxxxxxx.xxxpredictiveHigh
64Filexxxx/xxx.xxxpredictiveMedium
65Filexxxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
66Filexxxxxxx.xxxpredictiveMedium
67Filexxxx.xxxpredictiveMedium
68Filexxxxx.xxxpredictiveMedium
69Filexxxx_xxxxxxx.xxx.xxxpredictiveHigh
70Filexxxxxxxx/xxxx/xxxx.xxpredictiveHigh
71Filexxxx/xxxxxxx.xxxpredictiveHigh
72Filexxxxxx/xxxxxxxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
73Filexxx/xxxxxx.xxxpredictiveHigh
74Filexxxxx.xxxpredictiveMedium
75Filexxxxxxx.xpredictiveMedium
76Filexxxxxx.xxxpredictiveMedium
77Filexxxx.xxxpredictiveMedium
78Filexxxxxxxxxx.xxxpredictiveHigh
79Filexxxx_xxxxxxx.xxxpredictiveHigh
80Filexxxx_xxxx.xxxpredictiveHigh
81Filexxxx/xxx/xxxxx/xxx/xxxx/xxxxxxxxx.xxxxpredictiveHigh
82Filexx/xxxxxx.xxxxxxxxxxx.xxpredictiveHigh
83Filexx/xxxxxxxxxxxx.xxpredictiveHigh
84Filexxx/xxx/xxxx.xxxpredictiveHigh
85Filex_xxxxxxxx_xxxxxpredictiveHigh
86Filexxxxxx.xpredictiveMedium
87Filexxxxxx/xxxxx/xxxx.xpredictiveHigh
88Filexxxx.xxxpredictiveMedium
89Filexxxxx.xxxpredictiveMedium
90Filexxxx.xxxpredictiveMedium
91Filexxxx.xxxxpredictiveMedium
92Filexxxx.xxxpredictiveMedium
93Filexxxx/xxxxxxxxxx/xxxxxxxxxx/xxxxxx.xxxpredictiveHigh
94Filexxxxxx/xxxxxxxx.xxxpredictiveHigh
95Filexxxxxxx/xxxxx/xxxxx.xpredictiveHigh
96Filexxxx.xxxpredictiveMedium
97Filexxx_xxxx.xxxpredictiveMedium
98Filexxxxx.xxxpredictiveMedium
99Filexxxxxxxxxxxx.xxxpredictiveHigh
100Filexxxxx.xxxpredictiveMedium
101Filexxxx.xxxpredictiveMedium
102Filexxxxxxx.xxxxxx.xxxpredictiveHigh
103Filexxxxxxx.xxxpredictiveMedium
104Filexxxxxxxxxxxxx.xxxpredictiveHigh
105Filexxxxxxxx.xxxpredictiveMedium
106Filexxxxxxxxxx.xxxpredictiveHigh
107Filexxxxxxx_xxxxxxx.xxxpredictiveHigh
108Filexxxxxxxxxxxxxx.xxxpredictiveHigh
109Filexxxx/xxxxxpredictiveMedium
110Filexxxxx.xxxpredictiveMedium
111Filexxxxxxxx.xxxpredictiveMedium
112Filexxxxxxx.xxpredictiveMedium
113Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveHigh
114Filexxxxxxx.xxxpredictiveMedium
115Filexxx.xxxpredictiveLow
116Filexxxxxx.xxxpredictiveMedium
117Filexxxxxxxxxxxxx.xxxxpredictiveHigh
118Filexxxxxx_xxxx.xxxpredictiveHigh
119Filexxxxx/xxxxx-xxxxxxxxxx-xxxxxxxx.xxxpredictiveHigh
120Filexxx_xxx.xxx?xxx=xxx.xxx.x.x&xxxx=xx&xxxx=xxxpredictiveHigh
121Filexxxx.xxxpredictiveMedium
122Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
123Filexxxxxxx.xxxpredictiveMedium
124Filexxxxxxxxxxx.xxxpredictiveHigh
125Filexxxxxxxxxxxxxxxx.xxpredictiveHigh
126Filexxxxxx.xxxpredictiveMedium
127Filexxxxxxxx.xxxpredictiveMedium
128Filexxx/xxxxxxxxxx_xxxxpredictiveHigh
129Filexxx.xxxpredictiveLow
130Filexxxxx.xxxpredictiveMedium
131Filexxxxxxxxx/xxxxx/xxxx/xxx_xxxxxxx/xxxxxxx/xxxxxxx.xxxpredictiveHigh
132Filexxxx-xxxxxxxx.xxxpredictiveHigh
133Filexxxx_xxx_xxxx.xxxpredictiveHigh
134Filexxxxxx_xxxx_xxxxxxx.xxxpredictiveHigh
135Filexxxxxxxxxxx/xxxxx/xxxxxxxx.xxpredictiveHigh
136Filexxxx.xpredictiveLow
137Filexxxxx.xxxpredictiveMedium
138Filexxxx.xxxpredictiveMedium
139Filexxxx/xxxxxxxxxxxx.xxxpredictiveHigh
140Filexxxx_xxxx.xxxpredictiveHigh
141Filexxxx_xxxx.xxxpredictiveHigh
142Filexxxx_xxxxxxx.xxxpredictiveHigh
143Filexxxx_xxxxxxx.xxxpredictiveHigh
144Filexxxxxxxxxxxx.xxxpredictiveHigh
145Filexxxxx_xxxxpredictiveMedium
146Filexxx.xxxpredictiveLow
147Filexxxxxx/xxxxx/xxxx_xxx.xxxpredictiveHigh
148Filexxxxxxxxxx.xxxpredictiveHigh
149Filexxxxxx.xxxpredictiveMedium
150Filexx-xxxxxxx/xxxxxxx/xxxxxx-xxxxxxxx/xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
151Filexx-xxxxxxxx/xxxx.xxxpredictiveHigh
152Filexx-xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
153File~/xxx/xxxxxxx/xxx/xxxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
154Libraryxxxxxx/xxx/xxxxxxx_xxxxxx_xxxx.xxxpredictiveHigh
155Libraryxxxx/xxx/xxxxxx/xx-xxxx-xxxxxx.xxxpredictiveHigh
156Libraryxxxxxx.xxxpredictiveMedium
157Libraryxxx/xxxx/xxx/xxx.xxxpredictiveHigh
158LibraryxxxxxxxxxpredictiveMedium
159Libraryxxxxxxxxx/xxxxxx_xxxxxxxxxx.xxx.xxxpredictiveHigh
160Libraryxxxxxx.xxxpredictiveMedium
161Libraryxxxxxxx.xxxpredictiveMedium
162Libraryxxxxxxxx.xxxpredictiveMedium
163Argument$xxxxpredictiveLow
164Argument$xxx_xxxx_xxxxpredictiveHigh
165Argument--xxxpredictiveLow
166Argumentxxx_xxxxpredictiveMedium
167ArgumentxxxxxxpredictiveLow
168ArgumentxxxxxxpredictiveLow
169ArgumentxxxxxxxxpredictiveMedium
170ArgumentxxxxxxpredictiveLow
171ArgumentxxxxxxpredictiveLow
172ArgumentxxxxxxxxpredictiveMedium
173ArgumentxxxxxpredictiveLow
174ArgumentxxxpredictiveLow
175ArgumentxxxxxxxxxxpredictiveMedium
176ArgumentxxxxxpredictiveLow
177ArgumentxxxxxpredictiveLow
178Argumentxxx_xxpredictiveLow
179ArgumentxxxpredictiveLow
180Argumentxxxx_xxpredictiveLow
181ArgumentxxxxxxxxxpredictiveMedium
182ArgumentxxxpredictiveLow
183ArgumentxxxxxxpredictiveLow
184ArgumentxxxxxxpredictiveLow
185Argumentxxxxx_xxxxxxxxpredictiveHigh
186ArgumentxxxxpredictiveLow
187Argumentxxxxxxx[xx_xxx_xxxx]predictiveHigh
188ArgumentxxxxpredictiveLow
189ArgumentxxxxpredictiveLow
190ArgumentxxxxpredictiveLow
191ArgumentxxpredictiveLow
192ArgumentxxpredictiveLow
193Argumentxx/xxxxpredictiveLow
194ArgumentxxxxxxxpredictiveLow
195Argumentxxxxx.xxx?xxxxxx=xxx_xxxxxxx/xxxx=xxxxxxx/xx=x/xxxxxxxx=xxxxxpredictiveHigh
196ArgumentxxpredictiveLow
197ArgumentxxxxpredictiveLow
198ArgumentxxxxxxpredictiveLow
199ArgumentxxxxxxpredictiveLow
200Argumentxxxx_xxpredictiveLow
201Argumentx_xxxxxxxxpredictiveMedium
202ArgumentxxxxpredictiveLow
203Argumentxxx_xxxxxxx_xxxpredictiveHigh
204Argumentxxxxxx_xxpredictiveMedium
205Argumentxxx*predictiveLow
206Argumentxxx_xxxxxxpredictiveMedium
207ArgumentxxxxxxpredictiveLow
208Argumentxxxx_xxxxpredictiveMedium
209ArgumentxxxxxxxxxxxxxpredictiveHigh
210ArgumentxxxxxxpredictiveLow
211Argumentxxxxxxx_xxpredictiveMedium
212Argumentxxxxxxx_xxxxpredictiveMedium
213Argumentxxxxxxx_xxxxxxxpredictiveHigh
214ArgumentxxxpredictiveLow
215ArgumentxxxxxxxxxxpredictiveMedium
216ArgumentxxxxxxxxpredictiveMedium
217Argumentxxxxxxx_xxxxx_xxxxx_xxxxxxx=xxxxxpredictiveHigh
218Argumentxxxx_xxxxpredictiveMedium
219ArgumentxxxxxxxxxxxxpredictiveMedium
220ArgumentxxxxxxxxxxxxpredictiveMedium
221Argumentxxxxxxx_xxxxxpredictiveHigh
222Argumentxxxxxx_xxxxpredictiveMedium
223ArgumentxxxxxxpredictiveLow
224Argumentxxxxxxx_xxpredictiveMedium
225ArgumentxxxpredictiveLow
226ArgumentxxxxxxpredictiveLow
227ArgumentxxpredictiveLow
228ArgumentxxxxxpredictiveLow
229ArgumentxxxxxxxpredictiveLow
230ArgumentxxxxxxxxxxxpredictiveMedium
231ArgumentxxxpredictiveLow
232ArgumentxxxxpredictiveLow
233ArgumentxxxxxxxxxpredictiveMedium
234ArgumentxxxxpredictiveLow
235Argumentxxxxxxxx_xxxxpredictiveHigh
236ArgumentxxxpredictiveLow
237ArgumentxxxxxxxxpredictiveMedium
238Argumentxxxx_xxxxxpredictiveMedium
239ArgumentxxxxpredictiveLow
240ArgumentxxxxxxxpredictiveLow
241Argument\xxxxxx\predictiveMedium
242Argument_xxxxxxx_xxxxpredictiveHigh
243Argument_xxxxxxxpredictiveMedium
244Input Value.xxxpredictiveLow
245Input Valuexxx_xxxxxxxxpredictiveMedium
246Patternx|xx|x|xx|_|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|x|xx|predictiveHigh
247Pattern|xx|xx|xx|predictiveMedium
248Network PortxxxxpredictiveLow

References (3)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!