India Police Analysis

IOB - Indicator of Behavior (184)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en164
es10
zh6
de2
fr2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us86
cn30
au14
ag10
nl4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows10
WordPress6
Adiscon LogAnalyzer4
QNAP QTS4
QNAP QuTS Hero4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Microsoft IIS IP/Domain Restriction access control6.55.7$25k-$100k$0-$5kUnprovenOfficial Fix0.050.00817CVE-2014-4078
2Adiscon LogAnalyzer Login Button Referer Field login.php cross site scripting5.24.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.020.00268CVE-2018-19877
3Apple iOS IOMobileFramebuffer memory corruption8.38.1$25k-$100k$0-$5kNot DefinedOfficial Fix0.000.00167CVE-2016-4654
4Bitrix Site Manager Vote Module Remote Code Execution7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00329CVE-2022-27228
5WordPress Password Reset wp-login.php mail password recovery6.15.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.050.03548CVE-2017-8295
6Jalios JCMS ajaxPortal.jsp cross site scripting5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.040.00141CVE-2020-15497
7XiongMai uc-httpd memory corruption8.58.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.030.03403CVE-2018-10088
8Websense Forcepoint User ID Service Port 5001 unrestricted upload8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.040.16917CVE-2019-6139
9F5 BIG-IP Configuration Utility path traversal4.33.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000.03339CVE-2015-4040
10WordPress WP_Query class-wp-query.php sql injection8.58.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.050.00318CVE-2017-5611
11Microsoft Windows Remote Desktop Service code injection10.09.0$100k and more$0-$5kHighOfficial Fix0.050.69476CVE-2012-0002
12Kentico CMS os command injection6.76.7$0-$5k$0-$5kNot DefinedNot Defined0.040.00805CVE-2018-7046
13Drei 3Kundenzone X.509 Certificate cryptographic issues6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000.00049CVE-2014-5828
14vsftpd deny_file unknown vulnerability3.73.6$0-$5k$0-$5kNot DefinedOfficial Fix0.160.00312CVE-2015-1419
15GitLab Community Edition/Enterprise Edition Runner Registration Token information disclosure7.67.5$0-$5k$0-$5kNot DefinedOfficial Fix0.040.05444CVE-2022-0735
16OpenSSH FIDO Authentication improper authentication5.65.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.050.00107CVE-2021-36368
17Fortinet FortiADC cross site scripting6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.070.00046CVE-2022-38374
18WAPPushManager sql injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.650.00301CVE-2014-8507
19Linux Kernel nfnetlink_queue.c nfqnl_mangle denial of service6.56.2$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00134CVE-2022-36946
20aaPanel Websocket webssh os command injection4.64.6$0-$5k$0-$5kNot DefinedNot Defined0.050.00294CVE-2021-37840

Campaigns (1)

These are the campaigns that can be associated with the actor:

  • Spyware

IOC - Indicator of Compromise (44)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
15.1.82.1065-1-82-106.static.creoline.netIndia PoliceSpyware06/28/2022verifiedHigh
28.5.1.33India PoliceSpyware06/28/2022verifiedHigh
38.5.1.49India PoliceSpyware06/28/2022verifiedHigh
434.246.254.156ec2-34-246-254-156.eu-west-1.compute.amazonaws.comIndia PoliceSpyware06/28/2022verifiedMedium
536.86.63.182India PoliceSpyware06/28/2022verifiedHigh
652.4.209.250ec2-52-4-209-250.compute-1.amazonaws.comIndia PoliceSpyware06/28/2022verifiedMedium
754.210.47.225ec2-54-210-47-225.compute-1.amazonaws.comIndia PoliceSpyware06/28/2022verifiedMedium
864.15.205.100India PoliceSpyware06/28/2022verifiedHigh
964.15.205.101India PoliceSpyware06/28/2022verifiedHigh
10XX.XXX.XXX.XXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
11XX.XXX.XXX.XXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
12XX.XX.XXX.XXXxxxx.xxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
13XX.X.XXX.XXXxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
14XX.XXX.XX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
15XX.XXX.XXX.XXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
16XXX.XXX.XXX.XXXxxx-x.xxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
17XXX.XXX.XXX.XXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
18XXX.XXX.XX.XXXxxx-xxx-xx-xxx.xxxxxx-xx-xxxxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
19XXX.X.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
20XXX.X.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
21XXX.XXX.XX.XXXxxx-xxxxx.xxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
22XXX.XXX.XX.XXXxxx.xx.xxx.xxx.xx.xxxxxxxxxxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedMedium
23XXX.XX.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
24XXX.XXX.XX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
25XXX.XX.XXX.XXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
26XXX.XX.XXX.XXXxxx.xxxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
27XXX.XXX.XX.XXXxxx-xxx-xx-xxx.xxxx-xxxxx.xxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
28XXX.XXX.XX.XXxxxxxxxxx.xxxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
29XXX.XXX.XX.XXxxxxxxxxx.xxxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
30XXX.XXX.XXX.XXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
31XXX.XX.XXX.XXXxxx.xx.xxx.xxx.xxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
32XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xxxxxx.xxxxxxxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
33XXX.XXX.XXX.XXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
34XXX.XX.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
35XXX.XX.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
36XXX.XX.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
37XXX.XX.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
38XXX.XXX.XX.XXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
39XXX.XX.XX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
40XXX.XX.XX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
41XXX.XX.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
42XXX.XX.XX.XXXxxx-xx-xx-xxx.xxx.xxxxxxxxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
43XXX.XXX.XXX.XXXXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh
44XXX.XX.XX.XXXxxx.xxxxx.xxxXxxxx XxxxxxXxxxxxx06/28/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (15)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (99)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File%PROGRAMDATA%\Razer Chroma\SDK\AppspredictiveHigh
2File.htaccesspredictiveMedium
3File/cgi-bin/webviewer_login_pagepredictiveHigh
4File/mgmt/tm/util/bashpredictiveHigh
5File/recordings/index.phppredictiveHigh
6File/uncpath/predictiveMedium
7File/websshpredictiveLow
8Fileadd_vhost.phppredictiveHigh
9Fileadmin-ajax.phppredictiveHigh
10Fileand/orpredictiveLow
11Filearsys/servlet/AttachServletpredictiveHigh
12Filexxxxxxxx.xxxpredictiveMedium
13Filexxx-xxx/xxxxx/xxxxx.xxxpredictiveHigh
14Filexxxxx/xxxxxxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
15Filexxxxx.xxxxxxxxx.xxxpredictiveHigh
16Filexxxxxx/xxxxx.xpredictiveHigh
17Filexxxx/xxxxxxxxxxxxxx.xxxpredictiveHigh
18Filexxxxxxxxxxxxx.xxxxpredictiveHigh
19Filexxx/xxxx/xxxx.xpredictiveHigh
20Filexxxxxxxxxxxx.xxxpredictiveHigh
21Filexxxxxxxx_xxxpredictiveMedium
22Filexxxxxxxxx/xxxx-xxxxxxx-xxx.xxxpredictiveHigh
23Filexxxxx.xxxpredictiveMedium
24Filexxxx_xxxx.xpredictiveMedium
25Filexxxxx.xxxpredictiveMedium
26Filexxxxx/xxxxxxxx/xxxxxxxxxxxx/xxxxxxxxxxxxpredictiveHigh
27Filexxxx.xxxpredictiveMedium
28Filexxxx_xxxx.xxxpredictiveHigh
29Filexxxxx/xxxxxx/xxxxxxxxxx.xxxpredictiveHigh
30Filexx/xxx/xxxxxxxx/xxx_xxxxxxxxx/xxx_xxxxxxxx_xxxxx/_/xxxxxxx_xxxpredictiveHigh
31Filexxxxx.xxxpredictiveMedium
32Filexxxxxxx/predictiveMedium
33Filexxxxxxxx.xpredictiveMedium
34Filexxxxxxx/xxxxxxxx/xxxxxxx/xxxxxxx.xxxx_xxxxxx.xxx/xxxx_xxxxxx.xxxpredictiveHigh
35Filexxxxxxx\xxxxxxxxx\xxxxxxx.xxxpredictiveHigh
36Filexxx/xxxxxxxxx/xxxxxxxxx_xxxxx.xpredictiveHigh
37Filexxxx.xxxpredictiveMedium
38Filexxxx_xxx_xxxxxxx.xpredictiveHigh
39Filexxxxxxxxxx.xxx.xxxpredictiveHigh
40Filexxxxxxx.xxxpredictiveMedium
41Filexxxxx_xxx.xxxpredictiveHigh
42Filexxx.xpredictiveLow
43Filexxxxxxxx.xxxpredictiveMedium
44Filexxxxxxxx.xxpredictiveMedium
45Filexxxxxx.xxxxpredictiveMedium
46Filexxxxxx_xxxxxxx.xxxpredictiveHigh
47Filexxxxxxxx/xxxx/xxxx.xxx?xxxxxx=xxxxxxxxxxxxxxxxpredictiveHigh
48Filexxx%xxxxx-xxxxxxxxxxxxx+xxxxxxx/xxxxxxx+xxxxx+xxxx/predictiveHigh
49Filexxxxx/xxxxxx.xpredictiveHigh
50Filexxxx.xpredictiveLow
51Filexxxx/xxxxxxxx/xxxxxxxx.xxxxpredictiveHigh
52Filexxxxxxxx.xxxpredictiveMedium
53Filexxxxx/xxxxxxxxpredictiveHigh
54Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxpredictiveHigh
55Filexx-xxxxx.xxxpredictiveMedium
56Filexx/xx/xxxxxpredictiveMedium
57Filexxxxxxxxxxxxx.xxpredictiveHigh
58Libraryxxxxxxxx_xxxxxxxxx.xxx.xxxpredictiveHigh
59Libraryxxx/xxxxxxxxx.xxxpredictiveHigh
60LibraryxxxxxxpredictiveLow
61Argument--xxxpredictiveLow
62Argumentxxxxxxx xx/xxxxxxx xxxxpredictiveHigh
63ArgumentxxxxxxpredictiveLow
64ArgumentxxxxxxpredictiveLow
65ArgumentxxxxxpredictiveLow
66ArgumentxxxxxxxxxxpredictiveMedium
67Argumentxxx[xxxxxx][xxxxxxxxx]predictiveHigh
68ArgumentxxxpredictiveLow
69ArgumentxxxpredictiveLow
70Argumentxxxx_xxpredictiveLow
71ArgumentxxxxxxpredictiveLow
72ArgumentxxxxxpredictiveLow
73ArgumentxxxxxxxxpredictiveMedium
74ArgumentxxxxxxxxxpredictiveMedium
75ArgumentxxxxpredictiveLow
76ArgumentxxpredictiveLow
77ArgumentxxxxxxpredictiveLow
78ArgumentxxxxxxxpredictiveLow
79Argumentxxxx_xxxxxx_xxpredictiveHigh
80ArgumentxxxxxpredictiveLow
81Argumentxxxxx_xxxxxxxxpredictiveHigh
82ArgumentxxxpredictiveLow
83ArgumentxxxxxxxxpredictiveMedium
84ArgumentxxxxxxxxpredictiveMedium
85ArgumentxxxxxxxxxpredictiveMedium
86ArgumentxxxpredictiveLow
87ArgumentxxxxxpredictiveLow
88ArgumentxxxxpredictiveLow
89ArgumentxxxxxxpredictiveLow
90ArgumentxxxxxxxxpredictiveMedium
91Argumentxxxxxx_xxxxxxxxpredictiveHigh
92Argument_xxxxxxxpredictiveMedium
93Input Value%xxpredictiveLow
94Input Value'>[xxx]predictiveLow
95Input Valuexxx.xxxx.%xxx.%xxxpredictiveHigh
96Input Value</xxxxxx><xxxxxx>xxxxx(x)</xxxxxx>predictiveHigh
97Input ValuexxxxxpredictiveLow
98Pattern|xx xx xx xx|predictiveHigh
99Network Portxxx/xxxx (xxx)predictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!