Icloader Analysis

IOB - Indicator of Behavior (105)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en86
ru10
de6
zh4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

ru86
us12
ua8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft SQL Server4
AT&T U-verse4
Apple Mac OS X4
Wireshark2
Tor Browser2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1IBM Security AppScan Enterprise Enterprise Source Database cryptographic issues9.88.5$5k-$25k$0-$5kUnprovenOfficial Fix0.050.01055CVE-2013-3989
2Microsoft SQL Server Privilege Escalation8.17.4$25k-$100k$5k-$25kUnprovenOfficial Fix0.000.01150CVE-2022-23276
3PHP Everywhere Plugin Shortcode Privilege Escalation6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000.01086CVE-2022-24663
4HP 3PAR Service Processor SP information disclosure4.34.3$5k-$25k$0-$5kNot DefinedNot Defined0.020.01055CVE-2015-5443
5Oracle Java SE/Java SE Embedded Deployment memory corruption10.09.5$25k-$100k$0-$5kNot DefinedOfficial Fix0.010.01319CVE-2013-5788
6WooCommerce PayU India Payment Gateway Plugin Purchase Price input validation6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.040.00885CVE-2019-14978
7WooCommerce Instamojo Payment Gateway Plugin Purchase amount Price input validation7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.020.00000CVE-2019-14977
8Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.340.25090CVE-2017-0055
9Omron CX-One CX-Programmer Password Storage information disclosure5.95.7$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00885CVE-2015-0988
10Apache HTTP Server smbvalid/smbval authensmb memory corruption10.09.5$25k-$100k$0-$5kNot DefinedOfficial Fix0.010.01055CVE-1999-1237
11Add Link to Facebook Plugin profile.php cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.010.00885CVE-2018-5214
12VMware ESXi/Workstation/Fusion/Cloud Foundation USB 2.0 controller out-of-bounds write8.88.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.190.01036CVE-2022-31705
13Django QuerySet.aggregate sql injection6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.17909CVE-2022-28346
14ThinkPHP unrestricted upload7.17.1$0-$5k$0-$5kNot DefinedNot Defined0.000.00885CVE-2022-44289
15Microsoft Windows Kernel Privilege Escalation8.17.4$25k-$100k$5k-$25kUnprovenOfficial Fix0.010.01178CVE-2022-37991
16Microsoft Visual Studio Remote Code Execution7.36.7$5k-$25k$0-$5kUnprovenOfficial Fix0.080.01528CVE-2022-41119
17DEXIS Imaging Suite SQL Server hard-coded credentials9.89.6$0-$5k$0-$5kNot DefinedWorkaround0.060.01055CVE-2016-6532
18Microsoft SQL Server Common Controls TabStrip ActiveX MSCOMCTL.OCX code injection9.68.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.020.48722CVE-2012-1856
19Microsoft SQL Server Privilege Escalation7.56.8$25k-$100k$5k-$25kUnprovenOfficial Fix0.050.01967CVE-2022-29143
20eSyndicat Directory Software suggest-listing.php cross site scripting3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.190.00000

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (15)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (70)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/objects/getImageMP4.phppredictiveHigh
2File/payu/icpcheckout/predictiveHigh
3File/uncpath/predictiveMedium
4Fileadmin.phppredictiveMedium
5Fileasn1fix_retrieve.cpredictiveHigh
6Filebigsam_guestbook.phppredictiveHigh
7Filebooks.phppredictiveMedium
8Filecard/pay/.../amountpredictiveHigh
9Filexxxxxxxx.xxxpredictiveMedium
10Filexxxxx.xxxpredictiveMedium
11Filexxxxxx.xxxpredictiveMedium
12Filexx/xx_xxxxxxx.xxxpredictiveHigh
13Filexxxxxxxx.xxxpredictiveMedium
14Filexxxxxxx/xxxx/xxxxxx/xxxxxxx.xpredictiveHigh
15Filexxxxxxxx.xxxpredictiveMedium
16Filexxxxxxx.xxxpredictiveMedium
17Filexxx/xxxxxx.xxxpredictiveHigh
18Filexxxxx.xxx/xxxxxx.xxx/xxxxxxxxxxxxx.xxx/xxxxxxxx.xxxpredictiveHigh
19Filexxxxxxx/xxxxxxxxxxxxx.xxxxpredictiveHigh
20Filexxxx_xxxx.xxxpredictiveHigh
21Filexxxxxxxx.xxxpredictiveMedium
22Filexxx/xxxx/xxxx_xxxx.xpredictiveHigh
23Filexxx/xxxxx.xxxxpredictiveHigh
24Filexxxxx-xxxxxxx.xxxpredictiveHigh
25Filexxxxxxx.xxxpredictiveMedium
26Filexxxx.xxxpredictiveMedium
27Filexxxxxxx.xxxpredictiveMedium
28Filexxxx-xx.xxx/xxx.xxxxx/xxx-xxxxxxxx-xxxx.xxxpredictiveHigh
29Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
30Filexxx/xxxx/xxxx/xxx.xxxxxxxx.xxxxxxx/xxxxxxx/xxx/xxxxxx.xxxxpredictiveHigh
31Filexxxxxxx-xxxxxxx.xxxpredictiveHigh
32Filexx/xx/xxxxxxxxx_xxxxxxxxxxx.xxxpredictiveHigh
33Filexxxx.xxxpredictiveMedium
34Filexxxx/xxxxxxxxxxxx.xxxpredictiveHigh
35Filexxx.xxxxxxxx.xxxpredictiveHigh
36Filexxxxxxxx.xxxpredictiveMedium
37Filexx-xxxxx/xxxxxxx.xxxpredictiveHigh
38Libraryxxxxxx.xxxpredictiveMedium
39Libraryxxx/xxxxxxx-xxxxxxxxx-x.x.x.xxxpredictiveHigh
40Libraryxxxxxxxx.xxx.xxxpredictiveHigh
41Argumentxxxxx_xxxxxxxx_xxpredictiveHigh
42ArgumentxxxxxxxxxpredictiveMedium
43ArgumentxxxxxxxxpredictiveMedium
44ArgumentxxxxxxpredictiveLow
45Argumentxxx_xxxpredictiveLow
46ArgumentxxxpredictiveLow
47Argumentxxx_xxpredictiveLow
48ArgumentxxxpredictiveLow
49Argumentxxxx_xxpredictiveLow
50ArgumentxxxxxxxxpredictiveMedium
51ArgumentxxpredictiveLow
52ArgumentxxpredictiveLow
53Argumentxxxx_xxpredictiveLow
54ArgumentxxpredictiveLow
55ArgumentxxxxxxxxxxxxxxxxpredictiveHigh
56ArgumentxxxxxxpredictiveLow
57ArgumentxxxxpredictiveLow
58ArgumentxxxxxxxpredictiveLow
59Argumentxxx_xxpredictiveLow
60ArgumentxxxpredictiveLow
61ArgumentxxxxpredictiveLow
62ArgumentxxxxxpredictiveLow
63ArgumentxxxpredictiveLow
64ArgumentxxxxxxpredictiveLow
65ArgumentxxxxxxxxpredictiveMedium
66Argumentxxxxxxxx/xxxxpredictiveHigh
67Argumentxxxxxxxx:xxxxxxxxpredictiveHigh
68Input Valuexxx[…]predictiveMedium
69Input Valuexxxxxxxxx:xxxxxxxxpredictiveHigh
70Network PortxxxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!