Glupteba Analysis

IOB - Indicator of Behavior (5)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Wibu CodeMeter Runtime2
centreon2
Sourcecodehero ERP System Project2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

IOC - Indicator of Compromise (109)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsTypeConfidence
15.8.10.194GluptebaverifiedHigh
25.9.72.48cpanelbk.pcready.meGluptebaverifiedHigh
35.79.87.139GluptebaverifiedHigh
45.79.87.153GluptebaverifiedHigh
55.101.6.132amoglo.ruGluptebaverifiedHigh
623.5.238.97a23-5-238-97.deploy.static.akamaitechnologies.comGluptebaverifiedHigh
737.48.81.151GluptebaverifiedHigh
840.90.22.185GluptebaverifiedHigh
940.112.72.205GluptebaverifiedHigh
1043.231.4.7GluptebaverifiedHigh
1145.90.34.87GluptebaverifiedHigh
1246.165.244.129GluptebaverifiedHigh
1346.165.249.167GluptebaverifiedHigh
1446.165.249.195GluptebaverifiedHigh
1546.165.249.201GluptebaverifiedHigh
1646.165.249.203GluptebaverifiedHigh
1746.165.250.25GluptebaverifiedHigh
1869.55.5.249GluptebaverifiedHigh
1969.64.46.27dragon085.startdedicated.deGluptebaverifiedHigh
2072.21.81.240GluptebaverifiedHigh
2172.21.91.29GluptebaverifiedHigh
2274.67.240.204cpe-74-67-240-204.twcny.res.rr.comGluptebaverifiedHigh
23XX.XX.XX.XXXXxxxxxxxverifiedHigh
24XX.XX.XX.XXXxxxxxx.xxxxx.xxxxxxxxxxxxx.xxXxxxxxxxverifiedHigh
25XX.XX.XX.XXxxxxxxxx.xxxxxxxxx.xxxXxxxxxxxverifiedHigh
26XX.XX.XX.XXxxxxxxxx.xxxxxxxxx.xxxXxxxxxxxverifiedHigh
27XX.XX.XX.XXxxxxxxxx.xxxxxxxxx.xxxXxxxxxxxverifiedHigh
28XX.XX.XX.XXxxxxxxxx.xxxxxxxxx.xxxXxxxxxxxverifiedHigh
29XX.XX.XX.XXxxxxxxxx.xxxxxxxxx.xxxXxxxxxxxverifiedHigh
30XX.XX.XX.XXxxxxxxxx.xxxxxxxxx.xxxXxxxxxxxverifiedHigh
31XX.XX.XXX.XXXxxxxxxxverifiedHigh
32XX.XXX.XXX.XXxxxx.xxxx.xx.xxXxxxxxxxverifiedHigh
33XX.XXX.XXX.XXXxxxxxxxverifiedHigh
34XX.XXX.XXX.XXXxxxxxxxx.xxxx.xxxxxxxxxxxx-xxxxxxxx.xxxXxxxxxxxverifiedHigh
35XX.XXX.XXX.XXXxxxxxxxverifiedHigh
36XX.XXX.XXX.XXXXxxxxxxxverifiedHigh
37XX.XXX.XXX.XXXxxxxxx.xxxxx.xxxx.xxxxxx-xxxxxxx.xxxxxxXxxxxxxxverifiedHigh
38XX.XXX.XXX.Xxxxx.xxxxxxx.xxxxxxxxx.xxxxxx-xxxxxxx.xxxxxxXxxxxxxxverifiedHigh
39XX.XXX.XX.XXxxxxxxxxx.xx-xx-xxx-xx.xxXxxxxxxxverifiedHigh
40XX.XXX.XX.XXxxxxxxxxx.xxxXxxxxxxxverifiedHigh
41XX.XXX.XX.XXXxxxxx.xxxxxxxxxxxx.xxxxXxxxxxxxverifiedHigh
42XX.XXX.XXX.XXXxxxxxx.xxx.xxx.xxx.xx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxxxverifiedHigh
43XXX.XX.XX.XXXXxxxxxxxverifiedHigh
44XXX.XX.XX.XXXXxxxxxxxverifiedHigh
45XXX.XX.X.XXXxxxxxxxverifiedHigh
46XXX.XX.XX.XXXXxxxxxxxverifiedHigh
47XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
48XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
49XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
50XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
51XXX.XX.XXX.XXxxxxxxxverifiedHigh
52XXX.XX.X.XXXXxxxxxxxverifiedHigh
53XXX.XX.X.XXXXxxxxxxxverifiedHigh
54XXX.XX.XX.XXXxxxxxxxverifiedHigh
55XXX.XX.XX.XXXxxxxxxxverifiedHigh
56XXX.XX.XX.XXXxxxxxxxverifiedHigh
57XXX.XX.XX.XXXxxxxxxxverifiedHigh
58XXX.XX.XX.XXxxxxxxxverifiedHigh
59XXX.XX.XX.XXxxxxxxxverifiedHigh
60XXX.XX.XX.XXXXxxxxxxxverifiedHigh
61XXX.XX.XX.XXXXxxxxxxxverifiedHigh
62XXX.XX.XX.XXXxxxxxxxverifiedHigh
63XXX.XXX.XX.XXXxxxxxxxverifiedHigh
64XXX.XXX.XX.XXxxxxxxxx.xxxxxxxxx.xxxXxxxxxxxverifiedHigh
65XXX.X.XXX.XXXXxxxxxxxverifiedHigh
66XXX.XXX.XX.XXXXxxxxxxxverifiedHigh
67XXX.XX.XXX.XXxxxxxx.xx.xxx.xx.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxxxverifiedHigh
68XXX.XXX.XXX.XXxxxxxx.xx.xxx.xxx.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxxxverifiedHigh
69XXX.XXX.XXX.XXXXxxxxxxxverifiedHigh
70XXX.XXX.X.XXXxxxxxxxxx-xxx-xxx-xx-xxxx.xxxxx.xxxXxxxxxxxverifiedHigh
71XXX.XXX.XX.XXXxxxxxxxxx-xxx-xxx-xx-xxxx.xxxxx.xxxXxxxxxxxverifiedHigh
72XXX.XX.XXX.XXXxxxxxxxverifiedHigh
73XXX.XX.XXX.XXXxxxxxxxverifiedHigh
74XXX.XX.XXX.XXXxxxxxxxverifiedHigh
75XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
76XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
77XXX.XX.XXX.XXXxxxxxxxverifiedHigh
78XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
79XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
80XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
81XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
82XXX.XXX.XX.XXXxxxxxxxx-xx-xx.xxxxx.xxxXxxxxxxxverifiedHigh
83XXX.XXX.XX.XXXxxxxxxxx-xx-xxx.xxxxx.xxxXxxxxxxxverifiedHigh
84XXX.XXX.XXX.XXXxx-xx-xxxx.xxxxx.xxxXxxxxxxxverifiedHigh
85XXX.XXX.XXX.XXxx-xx-xxx.xxxxx.xxxXxxxxxxxverifiedHigh
86XXX.XXX.XXX.XXXxx-xx-xxxx.xxxxx.xxxXxxxxxxxverifiedHigh
87XXX.XXX.XXX.XXXxx-xx-xxxx.xxxxx.xxxXxxxxxxxverifiedHigh
88XXX.XXX.XXX.XXXxx-xx-xxxx.xxxxx.xxxXxxxxxxxverifiedHigh
89XXX.XXX.XXX.XXXxx-xx-xxxx.xxxxx.xxxXxxxxxxxverifiedHigh
90XXX.XXX.XXX.XXXxx-xx-xxxx.xxxxx.xxxXxxxxxxxverifiedHigh
91XXX.XXX.XXX.XXXxxxxxxxverifiedHigh
92XXX.XXX.XXX.XXXxxxxxxxverifiedHigh
93XXX.XXX.XXX.XXXXxxxxxxxverifiedHigh
94XXX.XXX.XXX.XXXXxxxxxxxverifiedHigh
95XXX.XXX.XXX.XXXxxxxxxxverifiedHigh
96XXX.XX.XXX.XXxxxx.xxxxxxxxxxx.xxxXxxxxxxxverifiedHigh
97XXX.XXX.XXX.XXXXxxxxxxxverifiedHigh
98XXX.XXX.XXX.XXXXxxxxxxxverifiedHigh
99XXX.XXX.XXX.XXXxxxxxx.xxx.xxx.xxx.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxxxverifiedHigh
100XXX.XX.XXX.XXXx-xxxx.x-xxxxxx.xxxXxxxxxxxverifiedHigh
101XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
102XXX.XXX.XXX.XXXxxxxxxxverifiedHigh
103XXX.XX.XXX.XXXxxxx.xxxx-xxx.xxXxxxxxxxverifiedHigh
104XXX.XX.XXX.XXXXxxxxxxxverifiedHigh
105XXX.X.XX.Xxx.xxxxxxxxx.xxxXxxxxxxxverifiedHigh
106XXX.XXX.XXX.XXXXxxxxxxxverifiedHigh
107XXX.XX.XXX.XXXxxxxx.xxxxxx.xxxx.xxxxxx-xxxxxxx.xxxxxxXxxxxxxxverifiedHigh
108XXX.XXX.XXX.XXxxxxxxxxxx.xxxxxxxxxxxxxx.xxxXxxxxxxxverifiedHigh
109XXX.XXX.XXX.XXXXxxxxxxxverifiedHigh

TTP - Tactics, Techniques, Procedures (3)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1059CWE-94Cross Site ScriptingpredictiveHigh
2TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
3TXXXXCWE-XXXX2xx Xxxxxxxxxxxxxxxx: Xxxx Xxxxxxxxxxxx Xxxxxxx XxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (6)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/pages/processlogin.phppredictiveHigh
2FileformContactGroup.phppredictiveHigh
3Libraryxxxxxxxx/xxx/xxx/xxxxxx.xxxpredictiveHigh
4Argumentxx_xxpredictiveLow
5Argumentxxxxxxxx_xxxxx=predictiveHigh
6ArgumentxxxxpredictiveLow

References (6)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!