Outlaw Cryptominer Analysisinfo

IOB - Indicator of Behavior (270)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en246
ru22
zh2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Google TensorFlow16
Apple macOS10
Cisco Firepower Threat Defense4
Google Chrome4
4Site CMS4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1SolarWinds Network Configuration Manager path traversal8.38.1$0-$5k$0-$5kNot DefinedOfficial Fix0.003000.05CVE-2023-40054
2Dahua DHI-HCVR7216A-S3 SmartPSS Auto Login Hash access control6.76.7$0-$5k$0-$5kNot DefinedNot Defined0.003310.04CVE-2017-6342
3Cyr to Lat Plugin sql injection6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.001100.04CVE-2022-4290
4HPE Onboard Administrator Reflected cross site scripting4.44.4$5k-$25k$0-$5kNot DefinedNot Defined0.000500.05CVE-2020-7132
5vBulletin redirector.php6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.001210.00CVE-2018-6200
6Redis Pattern Matching util.c denial of service4.54.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.03CVE-2024-31228
7itsourcecode Online Discussion Forum sendreply.php unrestricted upload7.57.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.000500.00CVE-2024-37868
8Delta Electronics DIAEnergie Handler_CFG.ashx sql injection7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000500.04CVE-2024-42417
9Apple iOS/iPadOS Image denial of service6.05.9$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000590.04CVE-2024-44176
10Attire Plugin code injection7.57.4$0-$5k$0-$5kNot DefinedNot Defined0.000500.04CVE-2024-7435
11Zoho ManageEngine ServiceDesk Plus cross site scripting5.75.7$0-$5k$0-$5kNot DefinedOfficial Fix0.011590.00CVE-2024-38869
12HP Integrated Lights-Out IPMI Protocol credentials management8.28.0$5k-$25k$0-$5kHighWorkaround0.309820.00CVE-2013-4786
13Check Point Quantum Gateway/Spark Gateway/CloudGuard Network Remote Access VPN information disclosure6.46.4$0-$5k$0-$5kHighNot Defined0.931900.04CVE-2024-24919
14Logsign Unified SecOps Platform command injection9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.04CVE-2024-5717
15TotalSuite Total Poll Lite Plugin authorization4.34.2$0-$5k$0-$5kNot DefinedNot Defined0.000430.04CVE-2024-32821
16Linux Kernel dm_exception_table_exit infinite loop5.75.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.03CVE-2024-35805
17xwikisas macro-pdfviewer PDF Viewer Macro information disclosure6.05.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.08CVE-2024-30263
18Moises Heberle WooCommerce Bookings Calendar Plugin cross site scripting5.04.9$0-$5k$0-$5kNot DefinedNot Defined0.000430.00CVE-2024-31117
19Foxit PDF Reader AcroForm use after free7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000460.00CVE-2024-30354
20Tenda AC10 SetStaticRouteCfg fromSetRouteStatic stack-based overflow8.88.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.00CVE-2024-2581

IOC - Indicator of Compromise (16)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (21)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (93)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/ajax.php?action=read_msgpredictiveHigh
2File/debug/pprofpredictiveMedium
3File/desktop_app/file.ajax.php?action=uploadfilepredictiveHigh
4File/envpredictiveLow
5File/goform/SetNetControlListpredictiveHigh
6File/goform/SetStaticRouteCfgpredictiveHigh
7File/sns/classes/Users.php?f=savepredictiveHigh
8File/src/chatbotapp/chatWindow.javapredictiveHigh
9File/uncpath/predictiveMedium
10Fileadmin/categories_industry.phppredictiveHigh
11Filexxxxx/xxxxx-xxx-xxxxx-xxxxx.xxxpredictiveHigh
12Filexxxxx/xxxxxxx/xxxxxxxxxxxxpredictiveHigh
13Filexxxxxxxxxxxx/xxxxx/xxxx/predictiveHigh
14Filexxxxx.xxxpredictiveMedium
15Filexxx_xx_xxx_xxx.xxxpredictiveHigh
16Filexxx.xpredictiveLow
17FilexxxpredictiveLow
18Filexxx/xxxxxxxx/xxxx/xxxxxxxx.xxpredictiveHigh
19Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
20Filexxxxxxx/xxx/xxx-xx.xpredictiveHigh
21Filexxx_xxxx.xpredictiveMedium
22Filexxx/xxxxx.xxxxxpredictiveHigh
23Filexxxx/xxxxxxxx/xxx&xx=xxxxxxxpredictiveHigh
24Filexxxxxxxxxxxxxxxxxxxxxxxxx.xxpredictiveHigh
25Filexxxxxxx_xxx.xxxxpredictiveHigh
26Filexxxxxx.xxxpredictiveMedium
27Filexxxxxxx/xxxxx.xxx.xxxpredictiveHigh
28Filexx_xxxxx.xpredictiveMedium
29Filexxxxx_xxxxx.xpredictiveHigh
30Filexxxxxx/xxx/xxxxxxxx.xpredictiveHigh
31Filexxxx.xxxpredictiveMedium
32Filexxxxx.xxxpredictiveMedium
33Filexxxxxxxx.xxxpredictiveMedium
34Filexxxxxxx/xxxxxx/xxxxxx/xxxxxxxxx.xxx#xxxpredictiveHigh
35Filexxxxxxx/xxxxx.xpredictiveHigh
36Filexxxxxxxxxxx-xxxx.xxpredictiveHigh
37Filexxxxxxxxx/xxxxx.xxxxxpredictiveHigh
38Filexxxxx/xxxxx.xxxxxpredictiveHigh
39Filexxxxxxxxxx.xxxpredictiveHigh
40Filexxxxxxx.xpredictiveMedium
41Filexxxxxxxxxxxxx.xxxpredictiveHigh
42Filexxxxxx-xxxxxx.xxxpredictiveHigh
43Filexxxxxxxxx.xxxpredictiveHigh
44Filexxxxxxxx.xxx/xxxxxx.xxx/xxxxxxxx.xxxpredictiveHigh
45Filexxx/xxxx.xpredictiveMedium
46Filexxx.xpredictiveLow
47FilexxxxxxxxxxxxxxxxpredictiveHigh
48Filexxx-xxxxxxx-xxx.xxpredictiveHigh
49Filexxxxxxx.xpredictiveMedium
50Filexxx.xxxpredictiveLow
51Filexx-xxxxx-xxxxxx.xxxpredictiveHigh
52File~/xxxxxxxx/xxxxx-xxx-xxxxxx-xxxxxxxxxxxx.xxxpredictiveHigh
53Libraryxx.xxxxxxxxxx.xxxxxxxxxxxxxxx.xxxpredictiveHigh
54Libraryxxx/xxxxxxxxx/xxxxxxxx.xxxxx.xxxpredictiveHigh
55Libraryxxxxxxxx.xxxpredictiveMedium
56Libraryxxxxxxx.xxxpredictiveMedium
57Libraryxxxxx.xxxpredictiveMedium
58Libraryxxxxxxxxxxxxx.xxx)predictiveHigh
59ArgumentxxxxxxpredictiveLow
60ArgumentxxxpredictiveLow
61Argumentxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxx/xxxxxxxxxxxxx/xxxxxxxxxx/xxxxxxxxxxxxxxxxxxxpredictiveHigh
62ArgumentxxxxxxpredictiveLow
63Argumentx:\xxxxxxx\xpredictiveMedium
64Argumentxxxxx_xxxxpredictiveMedium
65Argumentxxxxx_xxpredictiveMedium
66ArgumentxxxxxxxxpredictiveMedium
67ArgumentxxxxxxxxxxxxxxxxxpredictiveHigh
68Argumentxxx_xxxpredictiveLow
69ArgumentxxxxpredictiveLow
70ArgumentxxxxpredictiveLow
71Argumentxxxx_xxxxxpredictiveMedium
72ArgumentxxxxxxxxxpredictiveMedium
73Argumentxxxxxx_xxxpredictiveMedium
74ArgumentxxxxpredictiveLow
75ArgumentxxxxpredictiveLow
76ArgumentxxpredictiveLow
77ArgumentxxxxxpredictiveLow
78ArgumentxxxxxxxpredictiveLow
79ArgumentxxxxpredictiveLow
80ArgumentxxxxpredictiveLow
81Argumentxxxx xxxxpredictiveMedium
82ArgumentxxxxxxxpredictiveLow
83Argumentxx_xxxxxpredictiveMedium
84Argumentx_xxxxpredictiveLow
85Argumentxxxxxx/xxxxxx_xxxxxxpredictiveHigh
86ArgumentxxxpredictiveLow
87ArgumentxxxxxpredictiveLow
88ArgumentxxxxxxxxxxxpredictiveMedium
89ArgumentxxpredictiveLow
90ArgumentxxxpredictiveLow
91ArgumentxxxxxxpredictiveLow
92Argumentx-xxxxxxxxx-xxxxpredictiveHigh
93Input Value//xxx//xxxxxxx.xxxpredictiveHigh

References (3)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!