HenBox Analysisinfo

IOB - Indicator of Behavior (21)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en18
de4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Francisco Burzi PHP-Nuke2
Drupal2
Microsoft Windows2
Apache Tomcat2
Apple iOS2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Drupal Database API sql injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.005560.03CVE-2015-6659
2Tenda AC9/AC10 doSystemCmd os command injection7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.003130.00CVE-2018-16334
3Google Android Kernel binder.c binder_release_work use after free7.87.5$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000420.04CVE-2020-0423
4Microsoft Outlook memory corruption7.77.0$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.169400.03CVE-2020-16947
5Microsoft Windows Hyper-V memory corruption7.36.6$25k-$100k$5k-$25kProof-of-ConceptOfficial Fix0.003070.00CVE-2020-1047
6QEMU ATI VGA Device ati_2d.c ati_2d_blt denial of service4.54.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2020-24352
7Google Android Bluetooth Server gatt_cl.cc gatt_process_read_by_type_rsp out-of-bounds6.46.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000880.00CVE-2020-0377
8Apache Tomcat UTF-8 Decoder resource consumption6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.020530.00CVE-2018-1336
9Apache Tomcat VirtualDirContext Source information disclosure6.46.3$5k-$25k$0-$5kHighOfficial Fix0.905090.06CVE-2017-12616
10Genivia gSOAP XML Document soap_get integer overflow6.86.5$0-$5k$0-$5kNot DefinedOfficial Fix0.190850.03CVE-2017-9765
11Francisco Burzi PHP-Nuke Downloads Module viewsdownload sql injection5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.001870.00CVE-2005-0996
12Claymore Dual GPU Miner Remote Management Interface memory corruption8.58.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.100100.00CVE-2017-16930
13Apple iOS HomeKit state issue7.47.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.004360.00CVE-2017-13903
14Intel CPU information disclosure6.16.1$5k-$25k$0-$5kNot DefinedNot Defined0.003370.00CVE-2017-5925
15Telligent Systems Zimbra path traversal5.35.3$0-$5k$0-$5kHighNot Defined0.973120.03CVE-2013-7091
16Synacor Zimbra Collaboration cross site scripting5.25.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001250.00CVE-2016-5721
17RoundCube Webmail Password Plugin access control7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.003380.04CVE-2017-8114
18Juniper Web Device Manager Authentication hard-coded credentials9.89.0$5k-$25k$0-$5kProof-of-ConceptWorkaround0.000000.00
19Google Android Qualcomm GPU Driver access control7.87.8$25k-$100k$25k-$100kNot DefinedNot Defined0.001670.00CVE-2016-8479
20Linux Kernel IPv4 UDP Socket datagram.c ip4_datagram_release_cb use after free6.56.4$5k-$25kCalculatingNot DefinedOfficial Fix0.000420.00CVE-2014-9914

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (7)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Filebinder.cpredictiveMedium
2Filegatt_cl.ccpredictiveMedium
3Filexx/xxxxxxx/xxx_xx.xpredictiveHigh
4Filexxx/xxxx/xxxxxxxx.xpredictiveHigh
5ArgumentxxxpredictiveLow
6ArgumentxxxpredictiveLow
7ArgumentxxxxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!