Generic Analysisinfo

IOB - Indicator of Behavior (79)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en62
pl14
zh2
fr2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

cURL4
libcURL4
Linux Kernel4
Apache Log4j2
Space Coast Credit Union2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1cURL/libcURL Cookie File stat toctou4.74.6$0-$5k$0-$5kNot definedOfficial fix 0.000000.03CVE-2023-32001
2Hypersilence Silentum Guestbook silentum_guestbook.php sql injection7.37.1$0-$5k$0-$5kHighUnavailablepossible0.001030.36CVE-2009-4687
3F5 BIG-IP Configuration Utility path traversal9.39.1$5k-$25k$0-$5kNot definedOfficial fix 0.130940.00CVE-2023-41373
4Google WebP libwebp heap-based overflow8.07.9$5k-$25k$0-$5kHighOfficial fixverified0.793950.00CVE-2023-4863
5D-Link DIR-859 HTTP POST Request hedwig.cgi path traversal7.67.5$5k-$25k$0-$5kProof-of-ConceptNot definedpossible0.575600.00CVE-2024-0769
6ZyXEL P660HN-T1A Remote System Log Forwarder ViewLog.asp command injection9.09.0$0-$5k$0-$5kHighNot definedverified0.937500.03CVE-2017-18368
7FreeType out-of-bounds write6.86.8$0-$5k$0-$5kNot definedNot defined 0.041140.44CVE-2025-27363
8nhairs python-json-logger inclusion of functionality from untrusted control sphere7.57.4$0-$5k$0-$5kNot definedOfficial fix 0.006080.04CVE-2025-27607
9Kentico CMS GET Request Parameter AccessDenied.aspx cross site scripting4.34.3$0-$5k$0-$5kNot definedNot defined 0.000680.00CVE-2024-12907
10Apache Tomcat Incomplete Fix CVE-2024-50379 toctou7.27.1$0-$5k$0-$5kNot definedOfficial fix 0.046350.00CVE-2024-56337
11GNU wget HTTP Shorthand Format server-side request forgery6.46.1$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.004720.04CVE-2024-10524
12Linux Kernel page_pool skb_mark_for_recycle memory leak5.65.5$0-$5k$0-$5kNot definedOfficial fix 0.000880.03CVE-2024-27393
13Linux Kernel ICMP Timestamp/Netmask information disclosure3.93.9$5k-$25k$0-$5kNot definedNot defined 0.006120.00CVE-1999-0524
14SailPoint IdentityIQ Lifecycle Manager input validation5.85.7$0-$5k$0-$5kNot definedOfficial fix 0.002720.04CVE-2024-1714
15Bricks Plugin improper authentication8.68.5$0-$5k$0-$5kNot definedNot definedexpected0.922190.04CVE-2024-25600
16agnivade easy-scrypt scrypt.go VerifyPassphrase timing discrepancy3.53.5$0-$5k$0-$5kNot definedOfficial fix 0.000740.00CVE-2014-125055
17GNU C Library __vsyslog_internal heap-based overflow7.87.8$0-$5k$0-$5kNot definedNot defined 0.045340.03CVE-2023-6246
18Apache Tomcat Commons FileUpload denial of service5.55.4$5k-$25k$0-$5kNot definedOfficial fix 0.022420.00CVE-2023-42794
19HP Integrated Lights-Out IPMI Protocol credentials management8.28.1$5k-$25k$0-$5kHighWorkaroundpossible0.680390.00CVE-2013-4786
20Microsoft Outlook authentication replay9.28.9$5k-$25k$0-$5kHighOfficial fixverified0.936270.00CVE-2023-23397

IOC - Indicator of Compromise (33)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
152.15.72.79ec2-52-15-72-79.us-east-2.compute.amazonaws.comGeneric04/08/2022verifiedLow
252.15.194.28ec2-52-15-194-28.us-east-2.compute.amazonaws.comGeneric04/08/2022verifiedLow
352.72.89.116ec2-52-72-89-116.compute-1.amazonaws.comGeneric04/08/2022verifiedLow
452.204.47.183ec2-52-204-47-183.compute-1.amazonaws.comGeneric04/08/2022verifiedLow
564.98.145.30url.hover.comGeneric04/08/2022verifiedMedium
667.228.43.214d6.2b.e443.ip4.static.sl-reverse.comGeneric04/08/2022verifiedMedium
768.65.121.51strategic.com.uaGeneric04/08/2022verifiedMedium
8XX.XX.XX.XXxxxxxxxxx-x.xxxxxxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedLow
9XX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxx.xxxxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
10XX.XX.XXX.XXXxxxxx.xxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
11XX.XXX.XXX.XXXxxxxxx04/08/2022verifiedMedium
12XXX.XX.XX.XXXxxxxxx04/08/2022verifiedMedium
13XXX.XX.XXX.XXXxxxxxx04/08/2022verifiedMedium
14XXX.XX.XXX.XXXXxxxxxx04/08/2022verifiedMedium
15XXX.XXX.XX.XXxx-xxx-xxx-xx-xx.xxxxxx.xxxxxxxxxxxx.xxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
16XXX.XXX.XXX.XXXxxxxxx.xxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
17XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxxxxx.xxxxxxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
18XXX.XXX.XXX.XXxxx-xxx-xxx-xx-xxxx.xxxxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
19XXX.XXX.XXX.XXXXxxxxxx04/08/2022verifiedMedium
20XXX.XXX.XXX.XXXxx-xx-xxxx.xxxxx.xxxXxxxxxx04/08/2022verifiedMedium
21XXX.XX.XXX.XXXxxxxxx04/08/2022verifiedMedium
22XXX.XX.XXX.XXxxxxxx.xxxxxxx.xxXxxxxxx04/08/2022verifiedMedium
23XXX.XXX.XXX.XXXxx-xxx-xxx-xxx-xxx.xx.xxxxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
24XXX.XXX.XXX.XXxxxx-xxxxxxx-xxxxxxx.xxxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedLow
25XXX.XX.XXX.XXXXxxxxxx04/08/2022verifiedMedium
26XXX.XX.XXX.XXXXxxxxxx04/08/2022verifiedMedium
27XXX.XXX.XXX.XXXxx.xxxxxxxxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
28XXX.XX.XX.XXXxxx-xx-xx-xxx.xxx.xxxxxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
29XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxxxxxxx.xxxxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedMedium
30XXX.XX.XXX.XXxxxxxxxx.xxx.xxxxx.xxxXxxxxxx04/08/2022verifiedMedium
31XXX.XX.XXX.XXxxxxxxxxx.xxxxxxxxxxxxx.xxxXxxxxxx04/08/2022verifiedLow
32XXX.XXX.XX.XXXxxxxxx04/08/2022verifiedMedium
33XXX.XXX.XXX.XXXXxxxxxx04/08/2022verifiedMedium

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (36)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/accountancy/admin/accountmodel.phppredictiveHigh
2File/apply_noauth.cgipredictiveHigh
3File/dev/mapper/controlpredictiveHigh
4File/hedwig.cgipredictiveMedium
5Fileannouncements.phppredictiveHigh
6Filexxxxxxxx.xxxpredictiveMedium
7Filexxxxxxxxxxxx_xxxx.xxxpredictiveHigh
8Filexxx/xxxxxx.xxxpredictiveHigh
9Filexxxxxxx.xxxpredictiveMedium
10Filexxxxx.xxxpredictiveMedium
11Filexxxxxxxx/xxxxxxxxxpredictiveHigh
12Filexxxxxxxx.xxxpredictiveMedium
13Filexxxxxxxx.xxxpredictiveMedium
14Filexxxx_xxx.xpredictiveMedium
15Filexxxxxx.xxpredictiveMedium
16Filexxxxxxxx_xxxxxxxxx.xxxpredictiveHigh
17Filexxxx-xxxxx.xxxpredictiveHigh
18Filexx /xxxxxxxxxxx/xxxxxxxxxxxx.xxxxpredictiveHigh
19Filexxxxxxx.xxxpredictiveMedium
20Filexxx.xxxpredictiveLow
21Filexx-xxxxxxxx/xxxxxxx-xxxxxxxx.xxxpredictiveHigh
22Filexxxx/xxxx_xxxxxx.xpredictiveHigh
23ArgumentxxxxxxxxxxxpredictiveMedium
24ArgumentxxxxxxxxpredictiveMedium
25ArgumentxxxxxxxxpredictiveMedium
26ArgumentxxxxpredictiveLow
27ArgumentxxxxxpredictiveLow
28Argumentxxxx_xxxxpredictiveMedium
29ArgumentxxxxxxxxxpredictiveMedium
30ArgumentxxxxxpredictiveLow
31Argumentxxxxxxx_xxxpredictiveMedium
32Argumentxxxxxx_xxxxpredictiveMedium
33ArgumentxxxxxxxpredictiveLow
34ArgumentxxxxxxxxxpredictiveMedium
35ArgumentxxxxxxxpredictiveLow
36Input Value../../../../xxxxxx/xxxxxx/xxxxxx/xxxxxx.xxxxxx-x.xxxpredictiveHigh

References (9)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!