Necurs Analysisinfo

IOB - Indicator of Behavior (42)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en28
es4
jp2
sv2
de2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Cutephp CuteNews4
WPFront Scroll Top Plugin2
GetSimpleCMS2
PHP Arena paBugs2
Check Point VPN-1 UTM Edge2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaroundpossible0.029560.00CVE-2007-1192
2DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.009700.00CVE-2010-0966
3Firewalla Box Software BLE weak credentials7.16.9$0-$5k$0-$5kNot definedOfficial fix 0.024190.09CVE-2024-40892
4Joomla CMS Login sql injection9.89.8$5k-$25k$5k-$25kNot definedNot defined 0.000480.00CVE-2006-1047
5WPFront Scroll Top Plugin Image cross site scripting3.53.4$0-$5k$0-$5kNot definedOfficial fix 0.001880.00CVE-2021-24564
6Francisco Burzi PHP-Nuke Addressbook addressbook.php path traversal7.37.1$5k-$25k$0-$5kFunctionalUnavailable 0.066040.00CVE-2007-1720
7Microsoft Windows Cloud Files Mini Filter Driver privilege escalation8.37.3$100k and more$5k-$25kUnprovenOfficial fix 0.011840.00CVE-2021-31969
8LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot definedUnavailable 0.000000.06
9Maran PHP Shop prod.php sql injection7.37.3$0-$5k$0-$5kHighUnavailablepossible0.001670.04CVE-2008-4879
10DUware DUpaypal detail.asp sql injection7.36.6$0-$5k$0-$5kProof-of-ConceptNot defined 0.017070.08CVE-2006-6365
11PHP Arena paBugs MySQL class.mysql.php file inclusion7.36.8$0-$5k$0-$5kFunctionalUnavailable 0.030880.03CVE-2006-5079
12ShopStoreNow E-commerce Shopping Cart orange.asp sql injection7.37.1$0-$5k$0-$5kHighUnavailablepossible0.010460.00CVE-2007-0142
13Motorola SBG6580 Web Access login denial of service7.56.9$0-$5k$0-$5kProof-of-ConceptWorkaround 0.000000.00
14Pixelpost cross-site request forgery7.06.4$0-$5k$0-$5kProof-of-ConceptNot defined 0.005020.00CVE-2010-3305
15Check Point VPN-1 UTM Edge Administrator Account WizU.html cross-site request forgery8.88.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.017080.00CVE-2007-3489
16Qualcomm Snapdragon Automobile Register access control5.45.2$5k-$25k$0-$5kNot definedOfficial fix 0.000510.00CVE-2017-11004
17WoltLab Burning Book addentry.php sql injection7.36.8$0-$5k$0-$5kFunctionalUnavailable 0.009570.02CVE-2006-5509
18OpenBB read.php sql injection7.37.0$0-$5k$0-$5kNot definedOfficial fix 0.003260.00CVE-2005-1612
19lshell access control8.18.1$0-$5k$0-$5kNot definedOfficial fix 0.023560.00CVE-2016-6902
20Wesley Destailleur forum todooforum.php cross site scripting4.33.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.035470.04CVE-2013-3538

IOC - Indicator of Compromise (25)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
140.121.206.97Necurs06/13/2021verifiedLow
262.212.154.98ns1.crossdns.comNecurs04/01/2022verifiedLow
364.47.209.23Necurs06/13/2021verifiedLow
464.63.188.85Necurs06/13/2021verifiedLow
564.231.250.149bas3-toronto12-64-231-250-149.dsl.bell.caNecurs06/13/2021verifiedVery Low
6XX.XX.XX.XXxxxxxxxx-xxxxxx.xx.xxxXxxxxx06/13/2021verifiedLow
7XX.XXX.XXX.XXXXxxxxx06/13/2021verifiedLow
8XX.X.XX.XXXXxxxxx06/13/2021verifiedLow
9XX.XX.XXX.XXXxxxxxxxx.xxxxxxxxxxxxx.xxxxXxxxxx04/01/2022verifiedLow
10XX.XXX.XXX.XXXxxxxx06/13/2021verifiedLow
11XX.XXX.XX.XXxxxxxxxxxxxxxxxxxxxxxx.xxxXxxxxx04/01/2022verifiedLow
12XX.XXX.XXX.XXxxx-xxxxxxxx.xxx.xxxxxxxxx.xxxXxxxxx06/13/2021verifiedLow
13XX.XX.XXX.XXXxxx-xx-xxx-xxx.xxx.xxxxxxxxxxxx.xxxXxxxxx06/13/2021verifiedLow
14XX.XX.XXX.XXXXxxxxx06/13/2021verifiedLow
15XX.XX.XXX.XXXxxxx-xx-xx-xxx-xxx.xxxxx.xxxx.xxxxxxx.xxxXxxxxx06/13/2021verifiedLow
16XX.XX.XX.XXXxxxx.xxxxxxxxxxxxxx-xxxxx.xx.xx.xxxXxxxxx06/13/2021verifiedLow
17XX.XXX.XX.XXXxx-xxx-xx-xxx.xxx.xxxxx.xxxXxxxxx04/01/2022verifiedLow
18XX.XXX.XX.XXXxxxxx.xxxxxxxxx.xxxXxxxxx04/01/2022verifiedLow
19XX.XXX.XX.XXXxxxxx.xx-xx-xxx-xx.xxXxxxxx04/06/2022verifiedLow
20XX.XXX.XXX.XXxxxxx-xxxxxxxxxxx.xxxXxxxxx04/01/2022verifiedLow
21XX.XXX.XXX.XXXxxxxx-xxxxxxxxxxx.xxxXxxxxx04/08/2022verifiedLow
22XXX.XXX.XX.XXXXxxxxx04/06/2022verifiedLow
23XXX.XXX.XXX.XXxxxxxxxxxx.xxx.xxx-xxxxxx.xxx.xxXxxxxx04/01/2022verifiedLow
24XXX.XXX.XXX.XXXxxxxx04/01/2022verifiedLow
25XXX.XXX.XXX.XXXxxxxx.xx-xxx-xxx-xxx.xxXxxxxx04/06/2022verifiedLow

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (32)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/forum/away.phppredictiveHigh
2File/goform/loginpredictiveHigh
3Fileaddentry.phppredictiveMedium
4Fileaddressbook.phppredictiveHigh
5Filexxxxx/xxxxx.xxxpredictiveHigh
6Filexxxxx.xxxxx.xxxpredictiveHigh
7Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
8Filexxxxxx.xxxpredictiveMedium
9Filexxxxxx.xxxpredictiveMedium
10Filexxx/xxxxxx.xxxpredictiveHigh
11Filexxx/xxxx/xxxx_xxxxxxxxxx_xxxx.xpredictiveHigh
12Filexxxxxx.xxxpredictiveMedium
13Filexxx/xxxx.xxxxpredictiveHigh
14Filexxxx.xxxpredictiveMedium
15Filexxxx.xxxpredictiveMedium
16Filexxxxx.xxxpredictiveMedium
17Filexxxxxxxx.xxx/xxxxxx.xxx/xxxxxxxx.xxxpredictiveHigh
18Filexxxx_xxxxxxxx.xxxpredictiveHigh
19Filexxxxxxxxxx.xxxpredictiveHigh
20ArgumentxxxxxxxxpredictiveMedium
21ArgumentxxxpredictiveLow
22ArgumentxxxxxpredictiveLow
23ArgumentxxxxxxxxpredictiveMedium
24ArgumentxxpredictiveLow
25ArgumentxxxxpredictiveLow
26Argumentxxxxxx_xxxxpredictiveMedium
27Argumentxxxx_xx_xx_xxxpredictiveHigh
28ArgumentxxpredictiveLow
29ArgumentxxxxxxxxpredictiveMedium
30ArgumentxxxxxxxxpredictiveMedium
31ArgumentxxxpredictiveLow
32Network Portxxx xxxxxx xxxxpredictiveHigh

References (5)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!