Smominru Analysis

IOB - Indicator of Behavior (168)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en156
de8
pl2
fr2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us106
tk20
ru14
cn6
cz6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows6
WordPress6
Apache HTTP Server4
Microsoft IIS4
D-Link IP Cameras4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.040.04187CVE-2007-1192
2DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.850.04187CVE-2010-0966
3Netgear SRX5308 sql injection7.47.4$5k-$25k$5k-$25kHighNot Defined0.060.00885CVE-2019-17049
4D-Link IP Cameras lums.cgi information disclosure4.84.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.050.01018CVE-2013-1601
5Foxit Reader AcroForms removeField use after free4.94.7$0-$5k$0-$5kNot DefinedOfficial Fix0.010.01321CVE-2019-6766
6Komodia Redirector SDK Web Companion cryptographic issues5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.010.01108CVE-2015-2078
7Gallarific PHP Photo Gallery script gallery.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.020.00986CVE-2011-0519
8D-Link DCS Authentication improper authentication6.45.8$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.040.01213CVE-2013-1603
9nginx Log File link following7.87.4$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.020.05028CVE-2016-1247
10MGB OpenSource Guestbook email.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.630.02800CVE-2007-0354
11WordPress Metadata deserialization8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.17166CVE-2018-20148
12WordPress WP_Query class-wp-query.php sql injection8.58.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.020.01974CVE-2017-5611
13Laravel save.php Error sql injection7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.020.00885CVE-2018-6330
14Exim Alias List host.c host_name_lookup heap-based overflow8.07.9$0-$5k$0-$5kNot DefinedOfficial Fix0.020.01108CVE-2022-37452
15Grafana race condition7.87.8$0-$5k$0-$5kNot DefinedOfficial Fix0.070.00885CVE-2022-39328
16Synology DSM server-side request forgery4.94.8$0-$5k$0-$5kNot DefinedOfficial Fix0.020.01055CVE-2022-27622
17Apple Xcode Node.js integer overflow7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.07559CVE-2016-0797
18dmitrylitvinov Uploading SVG, WEBP and ICO Files Plugin cross site scripting4.64.5$0-$5k$0-$5kNot DefinedNot Defined0.060.00885CVE-2022-34648
19util-linux FUSE Filesystem file access5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.020.01282CVE-2021-3996
20Linux Kernel Virtual Function mbochs.c mbochs_ioctl information disclosure4.94.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.01412CVE-2021-3736

IOC - Indicator of Compromise (26)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (14)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (84)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/download_frame.phppredictiveHigh
2File/common/info.cgipredictiveHigh
3File/dev/urandompredictiveMedium
4File/forum/away.phppredictiveHigh
5File/rating.phppredictiveMedium
6File/uncpath/predictiveMedium
7File/var/log/nginxpredictiveHigh
8Fileactions.hsppredictiveMedium
9Fileaddentry.phppredictiveMedium
10Fileaddtocart.asppredictiveHigh
11Filexxxx.xpredictiveLow
12Filexxxxxxxx_xxxxxxxxxxxxxxxxx.xxxpredictiveHigh
13Filexxxx/xxxxxxx/xxxxx_xxx.xxpredictiveHigh
14Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
15FilexxxxxxxxxxxxxxxxxxxxxxpredictiveHigh
16Filexxxxxxx.xxxpredictiveMedium
17Filexxxxx.xxxpredictiveMedium
18Filexxx/xxxx/xxx/xxxxx_xxxx.xpredictiveHigh
19Filexxx/xxxx/xxxx_xxxxxx.xpredictiveHigh
20Filexxxxxxx.xxxpredictiveMedium
21Filexxxx.xxxpredictiveMedium
22Filexxxx.xpredictiveLow
23Filexxx/xxxxxx.xxxpredictiveHigh
24Filexxxxxxxx/xxxxxxxxxx/xxxxx-xx-xxxxxxxxx-xxxxxxxx.xxxpredictiveHigh
25Filexxxxx.xxxpredictiveMedium
26Filexxxxxxxxxx/xxx/xxxxxx_xxxx.xxxpredictiveHigh
27Filexxxx/xx_xxxxxxxxx.xxxpredictiveHigh
28Filexxxxxxxxx/xxxxxxxx.xxxpredictiveHigh
29Filexx.xxxpredictiveLow
30Filexx/xxxx.xxxpredictiveMedium
31Filexxxxxxx/xxxx/xxxx_xxxx.xxpredictiveHigh
32Filexxxxxxx/xxx.xxxpredictiveHigh
33Filexxxxxxx/xxxxx/xxxxxxx/xxxx.xxxpredictiveHigh
34Filexxxx.xxpredictiveLow
35Filexxxxxxxxxx.xxxpredictiveHigh
36Filexxxx/xxxxxxxxx.xxxpredictiveHigh
37Filexxxxxxx/xxx.xxxpredictiveHigh
38Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]predictiveHigh
39Filexxxxx.xxxpredictiveMedium
40Filexxxxxxxxxx.xxxpredictiveHigh
41Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveHigh
42Filexxxxxxx/xxxx-xxxx/xxxxxx.xpredictiveHigh
43Filexxxx.xxxpredictiveMedium
44Filexxxxxxxxxxxxxx.xxxpredictiveHigh
45Filexxxxxx_xxxxxxx.xxxpredictiveHigh
46Filexxxx.xxxpredictiveMedium
47Filexxxxxxxxxxxxxx.xxxpredictiveHigh
48Filexxx/xxxx.xxxpredictiveMedium
49Filexxxx/xxx-xxx.xxxpredictiveHigh
50Filexxxxxxxx/xxxxxxxxpredictiveHigh
51FilexxxxxxxpredictiveLow
52Filexx-xxxxx/xxxx-xxx-xxxx.xxxpredictiveHigh
53Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxpredictiveHigh
54Filexx-xxxxxxxx/xxxxxxx-xxxxxxxx.xxxpredictiveHigh
55Filexx-xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
56Libraryxxxxxx.xxxpredictiveMedium
57Libraryxxx/xxxxxxxx.xpredictiveHigh
58Libraryxxxxxx/xxxxxxxxx/xxxxx.xxxpredictiveHigh
59Argument$_xxxxxpredictiveLow
60ArgumentxxxxxxxxpredictiveMedium
61ArgumentxxxxxxxxxpredictiveMedium
62ArgumentxxxpredictiveLow
63ArgumentxxxxxxxpredictiveLow
64Argumentxxxx/xxxxpredictiveMedium
65Argumentxxx_xxxx/xxx_xxxxxxxpredictiveHigh
66Argumentxxxxx->xxxxpredictiveMedium
67ArgumentxxxxpredictiveLow
68ArgumentxxxxxxpredictiveLow
69ArgumentxxxxxxxxxxpredictiveMedium
70ArgumentxxpredictiveLow
71ArgumentxxxxxxxxxxxxxxxxpredictiveHigh
72ArgumentxxxxxxxxxpredictiveMedium
73ArgumentxxxxxxxxxpredictiveMedium
74ArgumentxxxxpredictiveLow
75ArgumentxxxxpredictiveLow
76ArgumentxxxxxpredictiveLow
77ArgumentxxxxxxxxxxxxxxxpredictiveHigh
78ArgumentxxxxxxxxpredictiveMedium
79Argumentxxxxxx_xxxx_xxxxpredictiveHigh
80ArgumentxxxpredictiveLow
81ArgumentxxxpredictiveLow
82Argument_xxxxxxxpredictiveMedium
83Input Value::$xxxxx_xxxxxxxxxxpredictiveHigh
84Network Portxxx xxxxxx xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!