Grandoreiro Analysis

IOB - Indicator of Behavior (261)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en238
es14
it4
pt4
zh2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us26
es10
cn2
pt2
it2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Apache HTTP Server8
HTML Include2
Replace Macro Plugin2
Cisco HyperFlex Software2
SAS Web Report Studio2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1SOCKS 5 Proxy Config privileges management7.37.1$0-$5k$0-$5kNot DefinedWorkaround0.050.00000
2nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined4.610.00000CVE-2020-12440
3PHP GD Extension imageloadfont buffer size6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.070.00052CVE-2022-31630
4OrangeScrum AWS Credential cross site scripting5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.030.00049CVE-2023-1783
5Apache HTTP Server mod_auth_digest stack-based overflow5.65.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.070.00632CVE-2020-35452
6Oracle HTTP Server OSSL Module server-side request forgery9.08.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.97515CVE-2021-40438
7Apache HTTP Server mod_proxy server-side request forgery7.37.3$25k-$100k$25k-$100kNot DefinedNot Defined0.090.97515CVE-2021-40438
8Apache HTTP Server MPM Event Worker access control6.56.4$5k-$25k$0-$5kProof-of-ConceptNot Defined0.030.97436CVE-2019-0211
9Apache HTTP Server mod_proxy_uwsgi buffer overflow8.58.5$25k-$100k$5k-$25kNot DefinedNot Defined0.130.01081CVE-2020-11984
10Apache HTTP Server ap_escape_quotes buffer overflow5.65.6$25k-$100k$25k-$100kNot DefinedNot Defined0.000.03739CVE-2021-39275
11HPE iLO 4 privileges management9.99.4$25k-$100k$0-$5kHighOfficial Fix0.030.97377CVE-2017-12542
12AMI Megarac API password recovery7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.040.00091CVE-2022-26872
13Docmint CMS file inclusion5.64.9$0-$5k$0-$5kProof-of-ConceptUnavailable0.040.36664CVE-2006-5240
14Smartisoft phpBazar classified_right.php file inclusion6.56.2$0-$5k$0-$5kProof-of-ConceptUnavailable0.030.00937CVE-2006-2528
15F5 BIG-IP iControl REST Authentication bash missing authentication9.89.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.070.97480CVE-2022-1388
16Docmint index.php cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.060.03319CVE-2010-0319
17DZCP deV!L`z Clanportal browser.php information disclosure5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.190.02257CVE-2007-1167
18SAS Web Report Studio javascript: URL logonAndRender.do cross site scripting3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.040.00089CVE-2022-25256
19Pre News Manager news_detail.php sql injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.040.00000
20Host Web Server phpinfo.php phpinfo information disclosure5.35.2$5k-$25k$0-$5kNot DefinedWorkaround0.030.00000

IOC - Indicator of Compromise (14)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (36)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/cgi-bin/wapopenpredictiveHigh
2File/mgmt/tm/util/bashpredictiveHigh
3File/SASWebReportStudio/logonAndRender.dopredictiveHigh
4File/uncpath/predictiveMedium
5Fileaccount/login.phppredictiveHigh
6Filexxxxx/xxx/xxxxxxx/xxx/xxxx.xxxpredictiveHigh
7Filexxxxxxxxxx_xxxxx.xxxpredictiveHigh
8Filexxxxxxxxx_xxxxxxx.xxxpredictiveHigh
9Filexxxxxxxx.xxxpredictiveMedium
10Filexxxx_xxxx.xpredictiveMedium
11Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
12Filexxxxx.xxxpredictiveMedium
13Filexxxx.xxxxpredictiveMedium
14Filexxxx_xxxxxx.xxxpredictiveHigh
15Filexxxxxxx.xxxpredictiveMedium
16Filexxxx.xxxpredictiveMedium
17Filexxxxxxx.xxxpredictiveMedium
18Filexxxxx/xxxxxxx.xpredictiveHigh
19ArgumentxxxxxxxxxxxpredictiveMedium
20Argumentxxxxx_xxxxx_xxxpredictiveHigh
21Argumentxxxxxxx_xxpredictiveMedium
22ArgumentxxxxxxpredictiveLow
23ArgumentxxxxpredictiveLow
24ArgumentxxxxxxxxxxpredictiveMedium
25Argumentxxxxxxx[xx_xxx_xxxx]predictiveHigh
26ArgumentxxpredictiveLow
27ArgumentxxxxxxxxxxxxxxpredictiveHigh
28Argumentxxxxxxxx_xxxpredictiveMedium
29Argumentxx_xxx[xxxx_xxxxxx_xxx]predictiveHigh
30Argumentxxxxxx_xxxxxxx_xxxxxxxxx_xxxx/xxxxxx_xxxxxxx_xxxxxxx_xxxxpredictiveHigh
31ArgumentxxxxxxpredictiveLow
32ArgumentxxxxxxxxpredictiveMedium
33Argument\xxx\predictiveLow
34Input Value../..predictiveLow
35Input ValuexxxxxpredictiveLow
36Network Portxxx/xxxxxpredictiveMedium

References (7)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!