MoustachedBouncer Analysisinfo

IOB - Indicator of Behavior (51)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en28
ru14
fr4
it2
de2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

MODX Revolution4
Apache HTTP Server4
XiongMai uc-httpd2
DZCP deV!L`z Clanportal2
Devilz Clanportal2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1eSyndicat Directory Software suggest-listing.php cross site scripting3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000003.50
2DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.028201.46CVE-2010-0966
3Francisco Burzi PHP-Nuke Error Message ipban.php information disclosure5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.004790.07CVE-2005-1386
4PyJWT PEM Encoded Public Key asymmetric invalid_strings access control7.46.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000820.05CVE-2017-11424
5SourceCodester Employee and Visitor Gate Pass Logging System GET Parameter view_designation.php sql injection7.16.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.003290.04CVE-2023-2090
6PHP Jabbers Cleaning Business index.php cross site scripting4.94.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.031700.07CVE-2023-4115
7Devilz Clanportal sql injection7.37.0$0-$5k$0-$5kHighOfficial Fix0.007280.03CVE-2006-6339
8TikiWiki tiki-register.php input validation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.010759.26CVE-2006-6168
9Tongda OA 2017 index.php sql injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000630.00CVE-2024-10732
10Dahua Smart Park Management devicePoint_addImgIco unrestricted upload7.57.3$0-$5kCalculatingProof-of-ConceptNot Defined0.507490.05CVE-2023-3836
11Dahua IPC-HDW1X2X Online Upgrade Reverse Engineering information disclosure5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000840.00CVE-2019-9681
12Foscam Camera FI9805E Service Port 9530 backdoor6.36.2$0-$5k$0-$5kNot DefinedWorkaround0.003970.04CVE-2021-43517
13XiongMai uc-httpd memory corruption8.58.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.008430.07CVE-2018-10088
14XiongMai uc-httpd path traversal7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.014200.03CVE-2017-7577
15XiongMai IP Camera/DVR NetSurveillance Web Interface memory corruption8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.007950.06CVE-2017-16725
16EmbedThis GoAhead login injection7.97.9$0-$5k$0-$5kNot DefinedNot Defined0.009600.04CVE-2019-16645
17SourceCodester Web-Based Student Clearance System Edit User Profile Page edit-admin.php sql injection5.55.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.000740.04CVE-2024-1928
18AUO SunVeillance Monitoring System Access Control Picture_Manage_mvc.aspx unrestricted upload8.58.4$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.121380.00CVE-2019-12719
19HPE Integrated Lights-Out 5 Privilege Escalation7.17.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000650.00CVE-2022-28640
20MediaTek MT6873/MT6875/MT6883/MT6885/MT6889/MT6891/MT6893 mdlactl Driver memory corruption6.05.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.04CVE-2021-0655

Campaigns (1)

These are the campaigns that can be associated with the actor:

  • Diplomats

IOC - Indicator of Compromise (10)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (26)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/edit-admin.phppredictiveHigh
2File/admin/maintenance/view_designation.phppredictiveHigh
3File/emap/devicePoint_addImgIco?hasSubsystem=truepredictiveHigh
4File/index.phppredictiveMedium
5File/xxxxxx/xxxx_xxxxx/xxxx/xxxxx.xxxpredictiveHigh
6Filexxxxxx/xxxxxxxxxx/xxxx/xxx/xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
7Filexxxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxxpredictiveHigh
8Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
9Filexxxxxx/xxxxxpredictiveMedium
10Filexxx/xxxxxx.xxxpredictiveHigh
11Filexxxxx.xxxpredictiveMedium
12Filexxxxxxx_xxxxxx_xxx.xxxxpredictiveHigh
13Filexxxxxxx-xxxxxxx.xxxpredictiveHigh
14Filexxxxxxxxx/xxxxxxxxxxpredictiveHigh
15Filexxxx-xxxxxxxx.xxxpredictiveHigh
16ArgumentxxxxxxxxxpredictiveMedium
17ArgumentxxxxxxxxpredictiveMedium
18ArgumentxxxxxxxxxxpredictiveMedium
19ArgumentxxxxxxxxpredictiveMedium
20ArgumentxxxxxxxxpredictiveMedium
21ArgumentxxpredictiveLow
22ArgumentxxxxxpredictiveLow
23Argumentxxxxx_xxxpredictiveMedium
24ArgumentxxxxxpredictiveLow
25ArgumentxxxxxxpredictiveLow
26PatternxxxxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!