South Asia Unknown Analysis

IOB - Indicator of Behavior (94)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en82
de8
ru2
ja2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

WordPress6
Joomla CMS2
Gallery My Photo Gallery2
JetBrains Ktor2
TP-LINK TL-WR840N v42

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.040.04187CVE-2007-1192
2Alt-N MDaemon Worldclient injection4.94.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.10855CVE-2021-27182
3TP-LINK TL-WR940N PingIframeRpm.htm ipAddrDispose memory corruption7.57.4$0-$5k$0-$5kNot DefinedWorkaround0.020.04891CVE-2019-6989
4Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.180.25090CVE-2017-0055
5SourceCodester Web-Based Student Clearance System edit-admin.php sql injection6.36.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.10855CVE-2022-3733
6SquirrelMail Deliver.class.php path traversal7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.030.01282CVE-2018-8741
7Itech Real Estate Script search_property.php sql injection7.57.2$0-$5k$0-$5kProof-of-ConceptUnavailable0.040.01564CVE-2017-20130
8php-fusion downloads.php cross site scripting5.75.7$0-$5k$0-$5kNot DefinedNot Defined0.010.01055CVE-2020-12708
9Gallarific PHP Photo Gallery script gallery.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.030.00986CVE-2011-0519
10Gallery My Photo Gallery image.php sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.030.00000
11Host Web Server phpinfo.php phpinfo information disclosure5.35.2$5k-$25k$0-$5kNot DefinedWorkaround0.000.00000
12ESMI PayPal Storefront products1h.php cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.020.06790CVE-2005-0936
13Ecommerce Online Store Kit shop.php sql injection9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.020.04386CVE-2004-0300
14Simple Real Estate Portal System sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.060.00885CVE-2022-28410
15ThinkSAAS topic.php sql injection8.07.2$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.010.01055CVE-2020-35337
16Chaussette Event_for_month.php privileges management5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.02172CVE-2006-4159
17Google Chrome errorEventSender ImageLoader.cpp memory corruption10.09.0$100k and more$0-$5kProof-of-ConceptOfficial Fix0.070.00000
18Alan Ward A-CART deliver.asp cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.010.01213CVE-2004-1874
19Alan Ward A-CART category.asp sql injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.010.04386CVE-2004-1873
20Hikvision DVR DS-7204HGHI-F1 capabilities User excessive authentication4.54.5$0-$5k$0-$5kNot DefinedNot Defined0.020.00885CVE-2020-7057

IOC - Indicator of Compromise (17)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (67)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/EXCU_SHELLpredictiveMedium
2File/my_photo_gallery/image.phppredictiveHigh
3File/phppath/phppredictiveMedium
4File/real-estate-script/search_property.phppredictiveHigh
5File/reps/classes/Users.php?f=delete_agentpredictiveHigh
6File/uncpath/predictiveMedium
7FileAdmin/edit-admin.phppredictiveHigh
8Fileapp/topic/action/admin/topic.phppredictiveHigh
9Filexxxxxxxx.xxxpredictiveMedium
10Filexxxxxxxx.xxxpredictiveMedium
11Filexxxxxxxxxx_xxxxx.xxxpredictiveHigh
12Filexxxxxxx/xxxx@/xxxxx/xxxxxxxxxx/xxxxxxxx.xxxxpredictiveHigh
13Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
14Filexxxxxxx.xxxpredictiveMedium
15Filexxxxxxx.xxxxx.xxxpredictiveHigh
16Filexxxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
17Filexxxxx_xxx_xxxxx.xxxpredictiveHigh
18Filexxxxxxxxx.xxxpredictiveHigh
19Filexxxxxxx.xxxpredictiveMedium
20Filexxxx/xxxx/xxxxxxx/xxx/xxxxxxxxxxxxxx.xxxx.xxxpredictiveHigh
21Filexxxx/xxxxxxx.xxxpredictiveHigh
22Filexxxxx.xxxpredictiveMedium
23Filexxxxx/xxxxxxxx/xxxxxxxxxxxx/xxxxxxxxxxxxpredictiveHigh
24Filexxxx_xxxx.xxxpredictiveHigh
25Filexxxxxxx/xxx_xxxxxxxxx/xxx_xxxxxxxxx.xpredictiveHigh
26Filexxx_xxxx_xxxxx.xpredictiveHigh
27Filexxxxxxx.xxxpredictiveMedium
28Filexxxxxxxxxxxxx.xxxpredictiveHigh
29Filexxxxxxxxxxxxxx.xxxpredictiveHigh
30Filexxxxxxxxxx.xxxpredictiveHigh
31Filexxxx.xxxpredictiveMedium
32Filexxxxxxxxx.xxxpredictiveHigh
33Filexxxx_xxxxxx.xxxpredictiveHigh
34Filexxxxx.xpredictiveLow
35Filexxxxx/xxxxx.xxpredictiveHigh
36Filexxxxxxx/xxxxxx/xxxxxxxxxxx.xxxpredictiveHigh
37Filexx-xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
38ArgumentxxxxxxxpredictiveLow
39Argumentxxx_xxxxx_xxxxpredictiveHigh
40ArgumentxxxxxxxpredictiveLow
41Argumentxxx_xxpredictiveLow
42Argumentxxxx_xxpredictiveLow
43ArgumentxxxxxpredictiveLow
44ArgumentxxpredictiveLow
45ArgumentxxxpredictiveLow
46ArgumentxxxxxpredictiveLow
47ArgumentxxxxxxxxxpredictiveMedium
48Argumentxxxxxxxx_xxxpredictiveMedium
49ArgumentxxxxxxxxpredictiveMedium
50ArgumentxxxpredictiveLow
51Argumentxxxxxxxx_xxxpredictiveMedium
52Argumentxxx_xxxxpredictiveMedium
53ArgumentxxxxpredictiveLow
54ArgumentxxxxxxxpredictiveLow
55ArgumentxxxxxxpredictiveLow
56Argumentxxxxx_xxxpredictiveMedium
57Argumentxxxxx_xxxxpredictiveMedium
58ArgumentxxxxxpredictiveLow
59ArgumentxxxxxxxxpredictiveMedium
60Argumentxxxx->xxxxxxxpredictiveHigh
61Argument_xxxxpredictiveLow
62Input Value%xxpredictiveLow
63Input Value.%xx.../.%xx.../predictiveHigh
64Input Value../predictiveLow
65Input Valuexxx xxxxxxxxpredictiveMedium
66Input Valuex xxxxx xxx xxxxxx xxxx,xxxx,xxxx,xxxx,xxxxxx(xxxxxxxxxxxx,xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,xxxxxxxxxxxx)--predictiveHigh
67Network Portxxx/xx (xxxxxx)predictiveHigh

References (4)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!