Ircbot Analysisinfo

IOB - Indicator of Behavior (185)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en168
de10
zh2
it2
ru2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

SourceCodester Online Exam System6
Microsoft Internet Explorer4
SourceCodester Lost and Found Information System4
Oracle Java SE4
OpenSSH2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Microsoft IIS uncpath cross site scripting5.25.0$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.013870.02CVE-2017-0055
2Omron CX-One CX-Programmer Password Storage information disclosure5.95.7$0-$5k$0-$5kNot definedOfficial fix 0.000580.04CVE-2015-0988
3Lexar F35 Authentication Module access control4.34.3$0-$5k$0-$5kNot definedNot defined 0.000970.00CVE-2021-46390
4SourceCodester Online Exam System GET Parameter updateCourse.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000530.07CVE-2023-2642
5SourceCodester Online Internship Management System POST Parameter login.php sql injection8.17.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.000530.04CVE-2023-2641
6OpenCV wechat_qrcode Module decoded_bit_stream_parser.cpp decodeHanziSegment memory leak6.06.0$0-$5k$0-$5kNot definedOfficial fix 0.000370.05CVE-2023-2618
7OpenCV wechat_qrcode Module decoded_bit_stream_parser.cpp decodeByteSegment null pointer dereference5.65.5$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.000400.02CVE-2023-2617
8SourceCodester Online Reviewer System GET Parameter user-update.php sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot defined 0.000530.00CVE-2023-2596
9SourceCodester Billing Management System POST Parameter ajax_service.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000530.06CVE-2023-2595
10SourceCodester Food Ordering Management System Registration sql injection8.17.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.001050.04CVE-2023-2594
11SourceCodester Multi Language Hotel Management Software POST Parameter ajax.php cross site scripting4.44.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000700.02CVE-2023-2565
12jja8 NewBingGoGo cross site scripting4.44.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000700.05CVE-2023-2560
13External Media without Import Plugin external-media-without-import.php print_media_new_panel cross site scripting4.44.3$0-$5k$0-$5kNot definedOfficial fix 0.000850.02CVE-2017-20183
14SourceCodester Online Tours & Travels Management System disapprove_delete.php exec sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000520.03CVE-2023-2619
15PHP-Login POST Parameter class.loginscript.php checkLogin sql injection8.18.0$0-$5k$0-$5kNot definedOfficial fix 0.000440.02CVE-2016-15031
16JFrog Artifactory Pro SAML SSO Signature Validator signature verification8.07.7$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.007050.04CVE-2018-19971
17IBM QRadar SIEM improper authentication7.77.7$5k-$25k$5k-$25kNot definedNot defined 0.002070.02CVE-2019-4210
18Audacity DLL Loader avformat-55.dll access control6.56.5$0-$5k$0-$5kNot definedNot defined 0.013740.00CVE-2017-1000010
19Banana Dance search.php sql injection7.37.3$0-$5k$0-$5kNot definedNot defined 0.004200.00CVE-2011-5175
20CodePeople CP Media Player Plugin cross-site request forgery4.84.8$0-$5k$0-$5kNot definedNot defined 0.000910.00CVE-2024-31941

IOC - Indicator of Compromise (22)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (18)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (143)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/budget/manage_budget.phppredictiveHigh
2File/admin/edit_subject.phppredictiveHigh
3File/admin/save_teacher.phppredictiveHigh
4File/admin/service.phppredictiveHigh
5File/building/backmgr/urlpage/mobileurl/configfile/jx2_config.inipredictiveHigh
6File/cas/logoutpredictiveMedium
7File/catcompany.phppredictiveHigh
8File/changeimage.phppredictiveHigh
9File/dosen/datapredictiveMedium
10File/fantasticblog/single.phppredictiveHigh
11File/jurusan/datapredictiveHigh
12File/kelas/datapredictiveMedium
13File/kelasdosen/datapredictiveHigh
14File/Log/Query?appid=0B736354-9473-4D66-B9C0-15CAC149EB05&tabid=tab_0B73635494734D66B9C015CAC149EB05predictiveHigh
15File/mahasiswa/datapredictiveHigh
16File/paysystem/branch.phppredictiveHigh
17File/proc/self/cwdpredictiveHigh
18File/xxxxxxxx/xxxxxx/xxxxxx/xxxxxx/xxxxxx/xxxxx/xxxx-xxxxxx.xxxpredictiveHigh
19File/xxxx_xxxxx.xxx?xxxxxxxxx=xxxxxxxpredictiveHigh
20File/xxxxxxxx-xxxx/xxx_xx/xxxxxx.xxxxpredictiveHigh
21File/xxxxxxx/predictiveMedium
22File/xx-xxxxx/xxxxxxx-xxxxxxx.xxxpredictiveHigh
23Filexxxxx/predictiveLow
24Filexxxxx/?xxxx=xxxxxxxxxx/xxxxxx_xxxxxxxxpredictiveHigh
25Filexxxxx/xxxxx.xxxpredictiveHigh
26Filexxxxx/xxxxxxxxx.xxxpredictiveHigh
27Filexxxxx/xxxxxxxx_xxxxx_xxxx.xxxpredictiveHigh
28Filexxxxxxx/xxxxxxxxxx.xxxpredictiveHigh
29Filexxxxxxxxxx/xxxxx/xxxxxxx_xxxxx/xxxxxxxxxxxx.xxxpredictiveHigh
30Filexxxxx_xxx.xxx?xxxxxx=xxxpredictiveHigh
31Filexxxx.xxxpredictiveMedium
32Filexxxx_xxxxxxx.xxxpredictiveHigh
33Filexxx_xxxxxx.xxxpredictiveHigh
34Filexxxxx-xxxxx.xpredictiveHigh
35Filexxxx/xxxxxxxxxxxxxxxxxxxxxxxxx.xxx:xxxpredictiveHigh
36Filexxxx/xxxxxxxx.xpredictiveHigh
37Filex:\xxxxxxx xxxxx (xxx)\xxxxxxxx\xxx\xxxxxx.xxxpredictiveHigh
38Filexxx.xpredictiveLow
39Filexxxxxxx/xxxxxx.xxx?x=xxxx_xxxxxxxpredictiveHigh
40Filexxxxx.xxxpredictiveMedium
41Filexxxxxx.xpredictiveMedium
42Filexxxx/xxxxxxxx.xxpredictiveHigh
43Filexxxxx.xxxpredictiveMedium
44Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
45Filexxxxxxxx.xxxpredictiveMedium
46Filexxxxxxx_xxxxxxxx.xxxxx.xxxpredictiveHigh
47Filexxxxxxxxxx_xxxxxx.xxxpredictiveHigh
48Filexxxxx.xxxpredictiveMedium
49Filexxxxxxxxxxxxx.xxxpredictiveHigh
50Filexxxxxxx.xxxpredictiveMedium
51Filexxxxxxxx/xxx/xxx.xxx.xxxpredictiveHigh
52Filexxxxxxxx-xxxxx-xxxxxxx-xxxxxx.xxxpredictiveHigh
53Filexxxxxxxxxxxx.xxxpredictiveHigh
54Filexx_xxxxxxx.xxxpredictiveHigh
55Filexxxxxxxxxxxxxxxx.xxxpredictiveHigh
56Filexxxxxxxxxx.xxxxx.xxxpredictiveHigh
57Filexxxxxxxxxxxxxxxxx.xxxpredictiveHigh
58Filexxxxxxxxxx.xxxpredictiveHigh
59Filexxxxx.xxxpredictiveMedium
60Filexxxxx/xxxx.xxxpredictiveHigh
61Filexxxxx/xxxxxxx/xxxxx.xxxxxxxxxxx.xxxpredictiveHigh
62Filexxxxx_x.xxpredictiveMedium
63Filexxxxxx_xxxxxxx.xxxpredictiveHigh
64Filexxxxxx.xpredictiveMedium
65Filexxxxxxx.xpredictiveMedium
66Filexxxxxx.xpredictiveMedium
67Filexxxxxxxxx.xpredictiveMedium
68Filexxxxxx/xxxxxxx/xxxxxxx_xxx_xxxxxx_xxxxxx.xxxpredictiveHigh
69Filexxxxx.xxxpredictiveMedium
70Filexxxxxxxx/xxxxxx_xxxxxxxx.xxxpredictiveHigh
71Filexxxx/xxx/xxx_xxxx.xpredictiveHigh
72Filexxxxxx.xxxpredictiveMedium
73Filexxxxxxx_xxxxxxxxxxxxx.xxxpredictiveHigh
74Filexxxxxxx.xxxpredictiveMedium
75Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
76Filexxxx_xxxx.xxxpredictiveHigh
77Filexxxxxx.xxxpredictiveMedium
78Filexxxxxx.xpredictiveMedium
79Filexxxxxxxx.xxxpredictiveMedium
80Filexxxxxxxx/xxxxxxxxxx.xpredictiveHigh
81Filexxxxx/xxxx_xxxx.xxxpredictiveHigh
82Filexxxx_xxxxxx.xxxpredictiveHigh
83Filexxx.xxxxxxxx.xxxpredictiveHigh
84Filexxxxxxx.xxxxpredictiveMedium
85Libraryxxxxxxxx.xxxpredictiveMedium
86Libraryxxxxxxxx-xx.xxxpredictiveHigh
87Libraryxxxxxxx.xxxpredictiveMedium
88Libraryxxxxxxx/xxxxxxx.xpredictiveHigh
89Argument$_xxxxxx['xxxxx_xxxxxx']predictiveHigh
90Argumentxxxxxxxx_xxxxpredictiveHigh
91ArgumentxxxxxpredictiveLow
92ArgumentxxxxxxpredictiveLow
93ArgumentxxxxxxxxpredictiveMedium
94ArgumentxxxxxxxxpredictiveMedium
95ArgumentxxxxxxxxxxpredictiveMedium
96ArgumentxxxxxxxxxxpredictiveMedium
97Argumentxxx_xxpredictiveLow
98Argumentxx_xxpredictiveLow
99Argumentxxxxxx_xxpredictiveMedium
100Argumentxxxx_xxpredictiveLow
101Argumentxxxxxxx[x][xxxx]predictiveHigh
102Argumentxxxxxxxxx_xxxxpredictiveHigh
103ArgumentxxxxxxxxpredictiveMedium
104Argumentxxxx_xxxxxxxxpredictiveHigh
105Argumentxxxx/xxxx/xxxxxxxxxpredictiveHigh
106ArgumentxxxxxpredictiveLow
107ArgumentxxxxxxxxpredictiveMedium
108ArgumentxxxxpredictiveLow
109ArgumentxxxxxxxxpredictiveMedium
110ArgumentxxxxxxpredictiveLow
111Argumentxxxxxxxx/xxxxxxx/xxxxxxxpredictiveHigh
112ArgumentxxxxxxpredictiveLow
113ArgumentxxpredictiveLow
114ArgumentxxxxxpredictiveLow
115ArgumentxxxxxxxpredictiveLow
116ArgumentxxxxxxxpredictiveLow
117ArgumentxxxxxxxxxxpredictiveMedium
118ArgumentxxxxpredictiveLow
119ArgumentxxxxxxpredictiveLow
120Argumentxxx_xxxxxxxxpredictiveMedium
121ArgumentxxxxpredictiveLow
122ArgumentxxxxxxxpredictiveLow
123ArgumentxxxxxxxpredictiveLow
124ArgumentxxxxxxxpredictiveLow
125Argumentxxxx/xxxxpredictiveMedium
126ArgumentxxxxxxpredictiveLow
127ArgumentxxxxxpredictiveLow
128ArgumentxxxpredictiveLow
129Argumentxxx/xxxxx/xxxxx/xxxxxx/xxxx-xxxxpredictiveHigh
130ArgumentxxxxxxxxpredictiveMedium
131Argumentxxxxxxxx-xxxx-xxpredictiveHigh
132Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
133Argumentxxxx_xxpredictiveLow
134Input Value-xpredictiveLow
135Input ValuexxxxxxpredictiveLow
136Input Valuexxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx' xxx xxxx=xxxx xxx 'xxxx'='xxxxpredictiveHigh
137Input Value<xxxxxx>xxxxx(xxxxxxxx.xxxxxx)</xxxxxx>predictiveHigh
138Input ValuexxxxxpredictiveLow
139Input ValuexxxxxxpredictiveLow
140Pattern|xx|predictiveLow
141Network Portxxx/xx (xxx xxxxxxxx)predictiveHigh
142Network Portxxx/xxxpredictiveLow
143Network Portxxx xxxxxx xxxxpredictiveHigh

References (10)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!