LazyScripter Analysis

IOB - Indicator of Behavior (209)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en172
fr20
de10
zh4
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us178
ch4
cn4
de4
pl2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows6
baigo CMS4
DokuWiki4
Thomas R. Pasawicz HyperBook Guestbook2
Next.js2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaround0.020160.00CVE-2007-1192
2DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.50CVE-2010-0966
3Gempar Script Toko Online shop_display_products.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001000.02CVE-2009-0296
4Ecommerce Online Store Kit shop.php sql injection9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.037630.08CVE-2004-0300
5WoltLab Burning Book addentry.php sql injection7.36.8$0-$5k$0-$5kFunctionalUnavailable0.008040.00CVE-2006-5509
6FiberHome HG2201T telnet.cgi input validation8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.006090.00CVE-2019-17186
7Google Chrome Utility Process race condition9.89.4$25k-$100k$0-$5kNot DefinedOfficial Fix0.008010.07CVE-2011-3961
8DataLynx suGuard privileges management5.95.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.000420.00CVE-1999-0388
9Dcscripts Dcshop HTTP GET Request auth_user_file.txt Password information disclosure5.35.2$0-$5k$0-$5kNot DefinedWorkaround0.007550.04CVE-2001-0821
10MidiCart PHP Shopping Cart item_show.php sql injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.05
11Linksys WVC11B main.cgi cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.015690.04CVE-2004-2508
12Asternic Flash Operator Panel User Control Panel command injection7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.002140.04CVE-2018-5694
13Contenido Contendio allow_url_fopen file inclusion7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.005750.00CVE-2005-4132
14Microsoft Windows Remote Desktop/Terminal Services Web Connection improper authentication6.36.2$25k-$100k$0-$5kNot DefinedWorkaround0.000000.02
15Ilohamail cross site scripting4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.04
16Microsoft IIS Error Message cross site scripting6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.001690.00CVE-2000-1104
17Microsoft IIS Error Message cross site scripting4.24.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.039110.03CVE-2003-0223
18Adobe ColdFusion cross site scripting4.33.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.014790.00CVE-2007-0817
19SourceCodester Garage Management System createUser.php access control6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.003070.07CVE-2022-2578
20D-Link IP Cameras rtpd.cgi insecure inherited permissions9.88.8$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.901140.00CVE-2013-1599

IOC - Indicator of Compromise (11)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (96)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/catalog/admin/categories.php?cPath=&action=new_productpredictiveHigh
2File/etc/passwdpredictiveMedium
3File/inc/HTTPClient.phppredictiveHigh
4File/php_action/createUser.phppredictiveHigh
5File/var/WEB-GUI/cgi-bin/telnet.cgipredictiveHigh
6Fileaddentry.phppredictiveMedium
7Fileadmin.phppredictiveMedium
8Fileadmin/admin.shtmlpredictiveHigh
9FileAdmin/ADM_Pagina.phppredictiveHigh
10Fileadmin/editcatalogue.phppredictiveHigh
11Fileadmin/menus/edit.phppredictiveHigh
12Filexxxxx.xxxpredictiveMedium
13Filexx_xxxxxxx/xxxxx.xxx?x=xxx&x=xxxxxxxpredictiveHigh
14Filexxxxxxxxxx.xxxpredictiveHigh
15Filexxxxxxxx.xxxpredictiveMedium
16Filexxxxxxxx_xxxx.xxxpredictiveHigh
17Filexxx_xxxx.xpredictiveMedium
18Filexxxxxxxxx.xxxpredictiveHigh
19Filexxxxxx-xxxxxpredictiveMedium
20Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
21Filexxxxxx.xxxpredictiveMedium
22Filexxxxxx.xxxpredictiveMedium
23Filexxxxx_xxx_xxxxx.xxxpredictiveHigh
24Filexxxxxxxxxx-xx-xxxxxx/xxxx/xxxx.xxxpredictiveHigh
25Filexxxxxxxxxx/xxxxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
26Filexxx/xxxxxx.xxxpredictiveHigh
27Filexxxxxxx/xxxx_xxxxxxxx.xxxxx.xxxpredictiveHigh
28Filexxxxx.xxxpredictiveMedium
29Filexxxxxxx.xxxpredictiveMedium
30Filexxxxxxxxxx.xxxpredictiveHigh
31Filexxxx_xxxx.xxxpredictiveHigh
32Filexxxxx_xx.xxxxpredictiveHigh
33Filexxxxxxxxxx/xxxxxxx.xpredictiveHigh
34Filexxxx.xxxpredictiveMedium
35Filexxxxxxxx.xxxpredictiveMedium
36Filexxxxxxxx.xxxpredictiveMedium
37Filexxx_xxxx.xxxpredictiveMedium
38Filexxx_xxxx.xxx.xxxpredictiveHigh
39Filexxxxxx.xxx/xxxx_xxxx_xxxx.xxxpredictiveHigh
40Filexxxxxxxxxx.xxxpredictiveHigh
41Filexxxxxxxx-x.xxpredictiveHigh
42Filexxxx/xxxxxxx/xxxxxxxxxxxxx_xxx.xxxpredictiveHigh
43Filexxxxxxxx.xxxpredictiveMedium
44Filexxxx.xxxpredictiveMedium
45Filexxxxxxxxxxxxx.xxxpredictiveHigh
46Filexxxxxxxxx.xxxpredictiveHigh
47Filexxxxxxxxxxxxxxxx.xxxpredictiveHigh
48Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
49Filexxxxx_xxxxx.xxxpredictiveHigh
50Filexxxxxx/xxxxx/xxxx_xxxxxxx.xxxpredictiveHigh
51Filexxxxxx.xxxpredictiveMedium
52Filexxxx_xxxxx.xxxpredictiveHigh
53Filexxx/xxx/xxx-xxx/xxxx.xxxpredictiveHigh
54Filexxxx.xxxpredictiveMedium
55Filexxxxxxxx.xxxpredictiveMedium
56Filexxxxxxx.xxxpredictiveMedium
57Libraryxxxxxx[xxxxxx_xxxxpredictiveHigh
58Libraryxxxxxx.xxxpredictiveMedium
59Libraryxxxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
60Libraryxxx/xx_xxx.xpredictiveMedium
61Argument(xxxxxx)predictiveMedium
62Argumentxxx_xxpredictiveLow
63ArgumentxxxxxxxxpredictiveMedium
64Argumentxx_xxxx_xxxxpredictiveMedium
65ArgumentxxxpredictiveLow
66ArgumentxxxxxpredictiveLow
67Argumentxxx_xxpredictiveLow
68ArgumentxxxpredictiveLow
69Argumentxxxx_xxpredictiveLow
70ArgumentxxxxxxxpredictiveLow
71Argumentxxxxxx[xxxxxx_xxxx]predictiveHigh
72Argumentxxxxxxxx_xxxxxx/xxxxxxxx_xxxx/xxxxxxxx_xxxxxxxx/xxxxxxxx_xxxxpredictiveHigh
73Argumentxxxxxx_xxxxpredictiveMedium
74ArgumentxxxxxxxpredictiveLow
75ArgumentxxxxxxxxpredictiveMedium
76ArgumentxxxxxpredictiveLow
77ArgumentxxpredictiveLow
78ArgumentxxpredictiveLow
79Argumentxxxx_xxpredictiveLow
80Argumentxxxxx_xxxxpredictiveMedium
81ArgumentxxxxxxpredictiveLow
82Argumentxxxx_xxxxpredictiveMedium
83Argumentxxx[xxxx][xx_xxxx_xxxx]predictiveHigh
84Argumentxxxx_xxpredictiveLow
85ArgumentxxxxpredictiveLow
86Argumentxxxxxx_xxxxpredictiveMedium
87ArgumentxxxxxxxxpredictiveMedium
88Argumentxxxxxx_xxxx[]predictiveHigh
89ArgumentxxxxxxpredictiveLow
90ArgumentxxxxxpredictiveLow
91ArgumentxxxxpredictiveLow
92ArgumentxxxxxxxxpredictiveMedium
93Argumentx-xxxx-xxxxxpredictiveMedium
94Input Value%xxxxxx+-x+x+xx.x.xx.xxx%xx%xxpredictiveHigh
95Input Value//xxx.xxxxxxx.xxxpredictiveHigh
96Pattern|xx xx xx|predictiveMedium

References (4)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!