Octopus Analysisinfo

IOB - Indicator of Behavior (323)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en286
ru14
zh8
de6
pl4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows10
Cryptocat6
Traefik6
Hindu Matrimonial Script6
phpMyAdmin6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaround0.038280.00CVE-2007-1192
2Esoftpro Online Guestbook Pro ogp_show.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001080.06CVE-2009-4935
3DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.028200.15CVE-2010-0966
4MGB OpenSource Guestbook email.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.014340.04CVE-2007-0354
5Joomla CMS com_easyblog sql injection6.36.1$5k-$25k$5k-$25kNot DefinedNot Defined0.000000.15
6HP Router/Switch SNMP information disclosure3.73.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.011010.05CVE-2012-3268
7Microsoft Windows Kernel Privilege Escalation8.37.3$100k and more$5k-$25kUnprovenOfficial Fix0.000610.00CVE-2021-34514
8Esoftpro Online Guestbook Pro ogp_show.php cross site scripting4.34.2$0-$5k$0-$5kHighUnavailable0.002440.02CVE-2009-2441
9Apache Struts ExceptionDelegator input validation8.88.4$5k-$25k$0-$5kHighOfficial Fix0.140970.06CVE-2012-0391
10Schneider Electric Vijeo Designer path traversal5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.002760.02CVE-2021-22704
11Tiki Admin Password tiki-login.php improper authentication8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.919800.59CVE-2020-15906
12OpenX adclick.php redirect5.34.7$0-$5k$0-$5kUnprovenUnavailable0.005840.08CVE-2014-2230
13Hscripts PHP File Browser Script index.php path traversal5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.001670.00CVE-2018-16549
14WEKA INTEREST Security Scanner HTTP denial of service3.73.7$0-$5k$0-$5kProof-of-ConceptUnavailable0.000440.04CVE-2017-20011
15Microsoft IIS IP/Domain Restriction access control6.55.7$25k-$100k$0-$5kUnprovenOfficial Fix0.008170.08CVE-2014-4078
16Working Resources BadBlue Server Installation phptest.php information disclosure5.35.3$0-$5kCalculatingNot DefinedNot Defined0.049980.00CVE-2004-2374
17FLDS redir.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.002910.04CVE-2008-5928
18nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002410.39CVE-2020-12440
19Microsoft Windows Win32k use after free8.17.8$25k-$100k$0-$5kHighOfficial Fix0.007660.07CVE-2021-40449
20Sphinx missing authentication7.47.3$0-$5k$0-$5kNot DefinedWorkaround0.014550.00CVE-2019-14511

IOC - Indicator of Compromise (34)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
15.8.88.87Octopus10/15/2018verifiedLow
25.188.231.101free.dsOctopus10/15/2018verifiedLow
35.255.71.84Octopus10/15/2018verifiedLow
45.255.71.85Octopus10/15/2018verifiedLow
513.231.202.34ec2-13-231-202-34.ap-northeast-1.compute.amazonaws.comOctopus12/06/2024verifiedHigh
634.173.57.207207.57.173.34.bc.googleusercontent.comOctopus12/11/2023verifiedMedium
746.249.52.244echichens-cOctopus10/15/2018verifiedLow
8XX.XXX.XX.XXXxxxxxx.xxx.xx.xxx.xx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxx01/04/2024verifiedHigh
9XX.XXX.XXX.XXXXxxxxxx02/05/2025verifiedVery High
10XX.XX.XX.XXXXxxxxxx10/15/2018verifiedLow
11XX.XXX.XXX.XXXxxxxxx.xx-xxx-xxx-xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxx10/15/2018verifiedLow
12XX.XXX.XXX.XXXXxxxxxx12/17/2024verifiedVery High
13XX.XX.XX.XXXxxxx-xxx.xxxx.xxXxxxxxx10/15/2018verifiedLow
14XXX.XXX.XX.XXXXxxxxxx10/15/2018verifiedLow
15XXX.XXX.XX.XXXXxxxxxx10/15/2018verifiedLow
16XXX.XXX.XX.XXXxxx.xxx.xx.xxx.xxxxxx.xxxxxxxxxxxxx.xxxXxxxxxx10/15/2018verifiedVery Low
17XXX.XX.XX.XXXXxxxxxx02/11/2025verifiedVery High
18XXX.XX.XXX.XXXxxxxxx12/20/2023verifiedHigh
19XXX.XXX.XXX.XXXxxxxxx.xxx.xxx.xxx.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxx10/15/2018verifiedLow
20XXX.XX.XX.XXXxx.xx.xxxx.xxx.xxxxxx.xx-xxxxxxx.xxxXxxxxxx12/04/2023verifiedHigh
21XXX.XX.XX.XXXxx.xx.xxxx.xxx.xxxxxx.xx-xxxxxxx.xxxXxxxxxx12/04/2023verifiedHigh
22XXX.XX.XX.XXXxx.xx.xxxx.xxx.xxxxxx.xx-xxxxxxx.xxxXxxxxxx12/04/2023verifiedHigh
23XXX.XX.XX.XXXxx.xx.xxxx.xxx.xxxxxx.xx-xxxxxxx.xxxXxxxxxx12/04/2023verifiedHigh
24XXX.XX.XX.XXxx.xx.xxxx.xxx.xxxxxx.xx-xxxxxxx.xxxXxxxxxx12/04/2023verifiedHigh
25XXX.XXX.XXX.XXXx.xxxxxxxxxx.xxxXxxxxxx12/04/2023verifiedHigh
26XXX.XX.XXX.XXXxxxxxx01/10/2024verifiedHigh
27XXX.XX.XXX.XXXXxxxxxx12/04/2023verifiedHigh
28XXX.XXX.XX.XXXXxxxxxx02/06/2024verifiedHigh
29XXX.XXX.XXX.XXxxxxx.xxxxxxxxx.xxxXxxxxxx10/15/2018verifiedLow
30XXX.XXX.XXX.XXxxxxx.xxxXxxxxxx10/15/2018verifiedLow
31XXX.XXX.XXX.XXxxxxx.xxxxxxx.xxxxXxxxxxx10/15/2018verifiedLow
32XXX.XXX.XXX.XXXXxxxxxx10/15/2018verifiedLow
33XXX.XXX.XX.XXXxxxxxx10/15/2018verifiedLow
34XXX.XXX.XX.XXXxxxxxxxxxxxxxxx.xxxxx.xxxx.xxxxxxxxxxxxx.xxxXxxxxxx10/15/2018verifiedLow

TTP - Tactics, Techniques, Procedures (20)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (155)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/adminpredictiveLow
2File/admin/conferences/get-all-status/predictiveHigh
3File/admin/conferences/list/predictiveHigh
4File/admin/countrymanagement.phppredictiveHigh
5File/admin/general/change-langpredictiveHigh
6File/admin/group/list/predictiveHigh
7File/admin/renewaldue.phppredictiveHigh
8File/admin/usermanagement.phppredictiveHigh
9File/api/sys/loginpredictiveHigh
10File/artist-display.phppredictiveHigh
11File/catcompany.phppredictiveHigh
12File/cgi-bin/editBookmarkpredictiveHigh
13File/film-rating.phppredictiveHigh
14File/forgetpassword.phppredictiveHigh
15File/front/roomtype-details.phppredictiveHigh
16File/inc/lists/edit-list.phppredictiveHigh
17File/index.phppredictiveMedium
18File/mcategory.phppredictiveHigh
19File/xxxxxxx/xxxx_xxxxxx.xxxpredictiveHigh
20File/xxxx/xxxxxx/xxxx_xxxxxxx.xxxpredictiveHigh
21File/xxxxx.xxxpredictiveMedium
22File/xxx/xxxx/xxxxx.xxxxpredictiveHigh
23File/xxxx-xxxxxx-xxxxxx/xxxxxx_xxxxxxxx.xxxpredictiveHigh
24File/xxxx/xxx/xxxxxx/xxxxxxxxxxxxxxx/xxxpredictiveHigh
25File/xxxxxx-xxxxxx.xxxpredictiveHigh
26File/xxxxxxxxxxxxxxx/xxxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
27File/xxxxxxx/xxxxxxxxx/%xxxxx%/xxxxxpredictiveHigh
28File/xxxxxxxxxxx/xxxxxxxxxxxxxx/xxxxxxxxxxxxpredictiveHigh
29File/xxxxxxx/predictiveMedium
30File/xxxx/xxxxxx/xxxxxxpredictiveHigh
31Filexxxxxxx.xxxpredictiveMedium
32Filexxxxx.xxxxxxxxx.xxxpredictiveHigh
33Filexxxxx/xxxxx.xxxpredictiveHigh
34Filexxx/xxx.xxxpredictiveMedium
35Filexxxxxxxx.xxxpredictiveMedium
36Filexxxxxxxx.xxxpredictiveMedium
37Filexxx-xxx/xxx/xxxxxxxx_xxx.xxxpredictiveHigh
38Filexxxx/xxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxx/xxxxxxxx/xxx/xxxxxx.xxxxxxxxx.xxxpredictiveHigh
39Filexxxxxxxxx.xxpredictiveMedium
40Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
41Filexxxxxxx.xxxpredictiveMedium
42Filexxxxx.xxxpredictiveMedium
43Filexxxxxxxxxxxxx.xxxpredictiveHigh
44Filexxx/xxxx/xxxx.xpredictiveHigh
45Filexxxxxxxxxxx/xxxxxxxx/xxxxxxxxxx.xxxpredictiveHigh
46Filexxxxxxxx.xxxpredictiveMedium
47Filexxxxx.xxxxpredictiveMedium
48Filexxx/xxxxxx.xxxpredictiveHigh
49Filexxxxx.xxxpredictiveMedium
50Filexxxxxxxx/xx/xxxx.xxpredictiveHigh
51Filexxxxxxx/xxxxx/xx/xxxxxx/xxxxx.xxxxx.xxxpredictiveHigh
52Filexxxxxxxxxxxxx.xxxpredictiveHigh
53Filexx/xxxx.xxxpredictiveMedium
54Filexxx/xxxxxpredictiveMedium
55Filexxx_xxxx.xxxpredictiveMedium
56Filexxx/xxxxx.xxxxpredictiveHigh
57Filexxxxx:xxxxxxxxxxx.xxpredictiveHigh
58Filexxxxxxx.xxxpredictiveMedium
59Filexxxxx.xxxpredictiveMedium
60Filexxxxxxxxxxxxxx.xxxpredictiveHigh
61Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]predictiveHigh
62Filexxxx.xxxpredictiveMedium
63Filexxxxx.xxxpredictiveMedium
64Filexxxxxxxxxx.xxxpredictiveHigh
65Filexxxxxx.xxxpredictiveMedium
66Filexxx/xxxx/xxxx/xxx/xxxxxx/xxx/xxxxxxx/xxxxx/xxxxxxxxxx/xxxxxx/xxxxxxxxxxxxxxxx.xxxxpredictiveHigh
67Filexxxxxxxxx_xxxxxxxx.xxxpredictiveHigh
68Filexxxxxxx.xxpredictiveMedium
69Filexxxxxxxxx.xxxpredictiveHigh
70Filexxxx-xxxxxxxx.xxxpredictiveHigh
71Filexxxx-xxxxx.xxxpredictiveHigh
72Filexxxx-xxxxxxxx.xxxpredictiveHigh
73Filexxx.xpredictiveLow
74Filexxxxxxxxxx-xxx.xxxpredictiveHigh
75Filexxxxxx.xxxpredictiveMedium
76Filexxxx/xxx-xxx.xxxpredictiveHigh
77Filexxx.xxxpredictiveLow
78Filexxxx_xxxxxxx.xxxpredictiveHigh
79Filexxxxxx.xxxpredictiveMedium
80Filexx-xxxxx/xxxxx.xxxpredictiveHigh
81Filexx-xxxxxxxx/xxxxxxxx/xxxxxxx/xxxxxxxxxxxxxxxx.xxxpredictiveHigh
82Library/_xxx_xxx/xxxxx.xxxpredictiveHigh
83Libraryxxx/xxxxxx.xpredictiveMedium
84Libraryxxxxx.xxxpredictiveMedium
85Libraryxxxxxxxxxxx.xxxpredictiveHigh
86Argument--xx xxxpredictiveMedium
87Argument.xxx.x.x.x.x.x.xx.x.x.x.x.x.x.x.x.x.x.xpredictiveHigh
88ArgumentxxxxxxxxxpredictiveMedium
89ArgumentxxxpredictiveLow
90ArgumentxxpredictiveLow
91ArgumentxxxxxxxxpredictiveMedium
92ArgumentxxxxxxxxpredictiveMedium
93ArgumentxxxxxxxxxxpredictiveMedium
94ArgumentxxxpredictiveLow
95ArgumentxxxxxxxxpredictiveMedium
96Argumentxxx_xxpredictiveLow
97Argumentxxxxxxx_xxxxx_xxpredictiveHigh
98ArgumentxxxpredictiveLow
99ArgumentxxxxxxxxxpredictiveMedium
100ArgumentxxxxxxxxxxxxxxxxpredictiveHigh
101ArgumentxxxxpredictiveLow
102ArgumentxxxxxxxpredictiveLow
103ArgumentxxxxxxpredictiveLow
104ArgumentxxxxxpredictiveLow
105ArgumentxxxxxpredictiveLow
106ArgumentxxxxpredictiveLow
107Argumentxx_xxpredictiveLow
108ArgumentxxxxpredictiveLow
109ArgumentxxpredictiveLow
110ArgumentxxxxpredictiveLow
111ArgumentxxxpredictiveLow
112Argumentxxxx[]predictiveLow
113Argumentxx/xx/xx/xx/xpredictiveHigh
114ArgumentxxxxxpredictiveLow
115ArgumentxxxxxpredictiveLow
116ArgumentxxxxpredictiveLow
117ArgumentxxxxxxxpredictiveLow
118ArgumentxxxxpredictiveLow
119ArgumentxxxxxxxpredictiveLow
120Argumentxxxxx_xx/xxxxxpredictiveHigh
121ArgumentxxxxxxxxpredictiveMedium
122ArgumentxxxxpredictiveLow
123ArgumentxxxxxxxpredictiveLow
124ArgumentxxxxxxpredictiveLow
125ArgumentxxxxxxxxxpredictiveMedium
126Argumentxxxxxxxx_xxxpredictiveMedium
127Argumentx/xxxx_xxxxpredictiveMedium
128Argumentxxxxxxxx_xxxpredictiveMedium
129ArgumentxxxxxxpredictiveLow
130ArgumentxxxxxxxxxxxpredictiveMedium
131ArgumentxxxpredictiveLow
132ArgumentxxxxxxpredictiveLow
133ArgumentxxxpredictiveLow
134ArgumentxxxxxxpredictiveLow
135ArgumentxxxpredictiveLow
136ArgumentxxxpredictiveLow
137ArgumentxxxxxpredictiveLow
138Argumentxxxxxx_xxxpredictiveMedium
139ArgumentxxxpredictiveLow
140ArgumentxxxpredictiveLow
141ArgumentxxxxxxxxpredictiveMedium
142ArgumentxxxxxxxxpredictiveMedium
143ArgumentxxxxxpredictiveLow
144Argumentx-xxxxxxxxx-xxxxxxpredictiveHigh
145Input Value../predictiveLow
146Input Valuex' xxx xxxx=xxxx xxx 'xxxx'='xxxxpredictiveHigh
147Input Valuexxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx' xxx xxxx=xxxx xxx 'xxxx'='xxxxpredictiveHigh
148Input Value</xxxxx><xxx xxx=xx xxxxxxx=xxxxx(x)>predictiveHigh
149Input Valuexxxxx' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx) xxx 'xxxx'='xxxx&xxxxxxxx=xxxxxxxxxxpredictiveHigh
150Input Valuexxx%xx(xxxxxx*xxxx(xxxxxx(xxxxx(x)))x)predictiveHigh
151Input Valuexxxxxx/**/xxxx.predictiveHigh
152Input ValuexxxxxxxxpredictiveMedium
153Network Portxxx/xx (xxxxxx)predictiveHigh
154Network Portxxx/xxx (xxxx)predictiveHigh
155Network Portxxx xxxxxx xxxxpredictiveHigh

References (18)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!