TG-3390 Analysis

Activities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Lang

en955
de15
es9
it7
zh6

Country

us488
cn31
es24
ru10
ir5

Actors

APT27441
TG-339046
Bronze Union11

Activities

Interest

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need you unlock this view to get access to more details of real data.

Product

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need you unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.05CVE-2007-1192
2DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.41CVE-2010-0966
3Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.61CVE-2017-0055
4HP Storage Data Protector memory corruption10.010.0$25k-$100k$0-$5kHighNot Defined0.03CVE-2014-2623
5jforum User input validation5.35.3$0-$5k$0-$5kNot DefinedNot Defined1.57CVE-2019-7550
6Microsoft IIS IP/Domain Restriction access control6.55.7$25k-$100k$0-$5kUnprovenOfficial Fix0.70CVE-2014-4078
7Basti2web Book Panel books.php sql injection7.37.0$0-$5k$0-$5kHighNot Defined0.17CVE-2009-4889
8Avast Antivirus Login Password Manager insufficiently protected credentials4.04.0$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2020-15024
9Zoho ManageEngine Firewall Analyzer DNS Name Stored cross site scripting5.24.9$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2019-11676
10Microsoft Windows cmd.exe privileges management7.36.6$25k-$100k$0-$5kProof-of-ConceptNot Defined0.00
11Tor Guard Relay De-anonymization information disclosure5.65.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.04CVE-2017-0377
12Apple iCloud ImageIO memory corruption6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.03CVE-2020-9879
13Siemens DCA Vantage Analyzer Onboard Database hard-coded password5.45.2$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2020-7590
14Cisco IOS XR SNMP Module memory corruption4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.04CVE-2013-1234
15FFmpeg log.c format_line numeric error9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.08CVE-2013-3671
16Microsoft IIS FTP Server memory corruption7.57.2$25k-$100k$0-$5kHighOfficial Fix0.04CVE-2010-3972
17FFmpeg indeo3.c decode_cell Local Privilege Escalation5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.00
18Lars Ellingsen Guestserver guestbook.cgi cross site scriting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.09CVE-2005-4222
19FreeRDP ntlm_read_ntlm_v2_client_challenge out-of-bounds read3.73.5$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2020-11086
20OpenSSH Readonly Mode sftp-server.c process_open permission5.34.7$25k-$100k$0-$5kNot DefinedOfficial Fix0.26CVE-2017-15906

Campaigns (3)

These are the campaigns that can be associated with the actor:

  • Bronze Union
  • Emissary Panda
  • Gh0st RAT

IOC - Indicator of Compromise (44)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameCampaignsConfidence
143.242.35.13Gh0st RATHigh
243.242.35.16Gh0st RATHigh
345.114.9.174Bronze UnionHigh
449.143.192.221High
549.143.205.30High
666.63.178.142unassigned.quadranet.comHigh
767.215.232.179ed-cricalf.latention.comHigh
867.215.232.181ninths.latention.comHigh
9XX.XXX.XXX.XXXxx.xxx.xxx.xxx.xxxxxx.xxxxxxxxx.xxxHigh
10XX.XX.XXX.XXXxx.xx.xxx.xxx.xxxxxx.xxxxxxxxx.xxxHigh
11XX.XX.XXX.XXXxxxxxxxxxx.xxxxxxxxx.xxxHigh
12XX.XX.XXX.XXXxxx-xxx-xx-xx.xxxxxx.xxxxxxx.xxxx.xxxHigh
13XX.XX.XXX.XXXxxx-xxx-xx-xx.xxxxxx.xxxxxxx.xxxx.xxxHigh
14XX.XX.XXX.XXXxxx-xxx-xx-xx.xxxxxx.xxxxxxx.xxxx.xxxHigh
15XX.XX.XXX.XXXxxxxxxxxxx.xxxxxxxxx.xxxHigh
16XX.XX.XXX.XXXxxxxxxxxxx.xxxxxxxxx.xxxHigh
17XX.XX.XXX.XXXxxxxxxxxxx.xxxxxxxxx.xxxHigh
18XX.XX.XXX.XXXxxxxxxxxxx.xxxxxxxxx.xxxHigh
19XX.XX.XX.XXxxxx.xxxXxxxxx XxxxxHigh
20XXX.XX.X.XXXxxxxxxx.xxxxxx.xx.xxxxxxxx.xxxHigh
21XXX.XX.X.XXxxxxxxx.xxxxxx.xx.xxxxxxxx.xxxHigh
22XXX.XX.XXX.XXXXxxxxxxx XxxxxHigh
23XXX.XX.XX.XXXxxxx XxxHigh
24XXX.XXX.XXX.XXXXxxxxx XxxxxHigh
25XXX.XXX.XX.XXXHigh
26XXX.XXX.XX.XXXXxxxxx XxxxxHigh
27XXX.XX.XX.XXXXxxxxxxx XxxxxHigh
28XXX.XX.XX.XXXxxxxxxx.xxxxx.xxxxXxxxxxxx XxxxxHigh
29XXX.XXX.XXX.XXXHigh
30XXX.XXX.XX.XXx.x.xxxxx.xxHigh
31XXX.XXX.XX.XXx.x.xxxxx.xxHigh
32XXX.XXX.XX.XXx.x.xxxxx.xxHigh
33XXX.XX.XXX.XXXXxxxxx XxxxxHigh
34XXX.XXX.XXX.XXxx-xxx-xxx-xxx.xxxxxx.xxxxxxx.xxxx.xxxHigh
35XXX.XXX.XXX.XXxx-xxx-xxx-xxx.xxxxxx.xxxxxxx.xxxx.xxxHigh
36XXX.XXX.XXX.XXxx-xxx-xxx-xxx.xxxxxx.xxxxxxx.xxxx.xxxHigh
37XXX.XXX.XXX.XXXXxxxxx XxxxxHigh
38XXX.XXX.XXX.XXXXxxxxx XxxxxHigh
39XXX.XXX.XXX.XXXXxxxxx XxxxxHigh
40XXX.XXX.XXX.XXXXxxxxx XxxxxHigh
41XXX.XXX.XXX.XXXXxxxxx XxxxxHigh
42XXX.XXX.XXX.XXXXxxxxx XxxxxHigh
43XXX.XXX.XXX.XXXXxxxxx XxxxxHigh
44XXX.XXX.XXX.XXXXxxxxx XxxxxHigh

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (301)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorConfidence
1File/+CSCOE+/logon.htmlHigh
2File/cgi-bin/live_api.cgiHigh
3File/cgi-bin/wapopenHigh
4File/etc/ajenti/config.ymlHigh
5File/etc/shadowMedium
6File/getcfg.phpMedium
7File/goform/telnetHigh
8File/infusions/shoutbox_panel/shoutbox_admin.phpHigh
9File/modules/profile/index.phpHigh
10File/oscommerce/admin/currencies.phpHigh
11File/proc/pid/syscallHigh
12File/rom-0Low
13File/session/list/allActiveSessionHigh
14File/syslog_rulesHigh
15File/tmp/phpglibccheckHigh
16File/uncpath/Medium
17File/uploadLow
18File/users/{id}Medium
19File/usr/bin/pkexecHigh
20File/var/tmp/sess_*High
21File/var/WEB-GUI/cgi-bin/telnet.cgiHigh
22File/videoLow
23Fileaction.phpMedium
24Fileactionphp/download.File.phpHigh
25FileActivityManagerService.javaHigh
26Fileadaptmap_reg.cHigh
27Fileadd_comment.phpHigh
28Fileadmin.cgiMedium
29Fileadmin.php?action=filesHigh
30Fileadmin/admin.phpHigh
31Fileadmin/content.phpHigh
32Fileadmin/index.php?id=users/action=edit/user_id=1High
33Fileaffich.phpMedium
34Fileagent/Core/Controller/SendRequest.cppHigh
35Filexxxxx_xxxxxx.xxxHigh
36Filexxxxxx-xxxx.xxxxHigh
37Filexxx/xxxxxxxxx/xxxxxxxx_xxxxxx_xxxx.xxxHigh
38Filexxx/xxxx_xxxx/xxxx_xxxxxxxxxxx.xxxHigh
39Filexxx/xxxxxx/xxxxxxx/xxxxx/xxxxxxx_xxxxx.xxxxx.xxxHigh
40Filexxx/xxxxxxxxx_xxxxxxxxx/xxxxxxxxx_xxxxxxxx_xxxx.xxxHigh
41Filexxxxxxxxxxxxxxxxx.xxxxHigh
42Filexxxxxx/xxxxxxxxx.xxHigh
43Filexxxxxx/xxxxxx.xxHigh
44Filexxxxxxxxx-xxxxxxx-xxxxxxx.xxxHigh
45Filexxxxxxxxxxxx.xxxHigh
46Filexxx/xxxx_xxxxxx.xxxHigh
47Filexxxxxxxxxx/xxxxxxxx/xxxx/xHigh
48Filexxxxx.xxxMedium
49Filexxxxxx.xxxMedium
50Filexxxx_xxx.xxxMedium
51Filexxx.xxxLow
52Filexxx-xxxx.xxxMedium
53Filexx_xxx.xxMedium
54Filexxx-xxx/xxxxxxxxxHigh
55Filexxx-xxx/xx_xxxxxx_xxxxxx.xxxHigh
56Filexxxxxxxxxxxxxxxxxxx.xxxHigh
57Filexxxxx.xxxxxxxxxxxx.xxxHigh
58Filexxxxxxx/xxxx_xxxxx.xxxHigh
59Filexxx.xxxLow
60Filexxxxxxx_xxx.xxxHigh
61Filexxxxxxx.xMedium
62Filexxxx/xxxxxxxxxxxxxxxxxxxx.xxxHigh
63Filexxxx/xxxxxxx/xxxxxxxxx_xxxx_xxx.xxHigh
64Filexx_xxxx.xMedium
65Filexxxx/xxxxxxxxxxxxxxx.xxxHigh
66Filexxxxxx.xxxMedium
67Filexxxxxxxxxxxxxxxx.xHigh
68Filexxxxxxxx-xxxx.xxxHigh
69Filexxxxxxxx?xxxx=xxxxxHigh
70Filexxxxxxx/xxxx/xxxxxxx.xHigh
71Filexxxxx_xxx.xMedium
72Filex/xxxxxx/xxxxxxxx.xxxHigh
73Filexxxx-xxxxxxxx-xxxxxx.xxxHigh
74Filexxxxxx/xxxxxx/xxxxxx.xxxHigh
75Filexxxxxxx-xxxxxxx/xxxx/xxxxxx/xxxxxxxx/xxx/xxxxxxxxx/xxxxxx.xxHigh
76Filexxxxx.xxxMedium
77Filexx_xxxxx.xxxMedium
78Filexxxxx.xxxMedium
79Filexxx/xxxx/xxxx_xxxxxx.xHigh
80Filexxx/xxxxxxxx/xxx.xHigh
81Filexxxx.xxxMedium
82Filexxxxxxxxxx/xxx.xxHigh
83Filexxxxxxxxx/xx/xxxxxxxxxxxx.xxxHigh
84Filexx/xxxx/xxx.xHigh
85Filexxx/xxx-xxxxx.xHigh
86Filexxxxxxxxxxxxxx.xxxHigh
87Filexxx.xxxLow
88Filexxxxxxxxx.xxxHigh
89Filexxxxxxxxx.xxMedium
90Filexxxx-xxxxxxx.xHigh
91Filexxxxxx/xxxxxxHigh
92Filexxxxxx_xx.xMedium
93Filexxxx_xxxx.xMedium
94Filexx/xxx/xxxxx.xHigh
95Filexxxxx_xxxxx_xxxx_xxxxxx_xxxx_x_xx_x.xHigh
96Filexxxxx-xxxxxxxxxx.xHigh
97Filexxx/xxxxxx.xxxHigh
98Filexxxxxxxx/xxxxx-xxxx-xxxxxxx.xxxHigh
99Filexxxxx.xxxMedium
100Filexxxxx.xxx?xxx=xxxx&xxx=xxxxxxxxHigh
101Filexxxxxxxx.xxxMedium
102Filexxxx_xxxx.xxxHigh
103Filexxxx_xxx.xMedium
104Filexxxx.xLow
105Filexxxxxxxxxx/xxx/xxxxxx_xxxx.xxxHigh
106Filexxx/xxxxxxxxxx/xxxxxxxxx.xxHigh
107Filexxxxxxxxxx/xxxxxx.xHigh
108Filexxxxxxxxx/xxx.xHigh
109Filexxxxxxxxx/xxxxxx.xxx.xxxHigh
110Filexxxxxxxxx/xxxxxxxx.xxxHigh
111Filexxxxx/xxxxxxxxxxxxx.xxxHigh
112Filexxxxx.xxxxMedium
113Filexxxxx.xxxMedium
114Filexxx.xLow
115Filexxxxx_xxxxxxxxxx_xxxx.xHigh
116Filexxxxxxxx.xxxMedium
117Filexxxxxxx/xxxxxx_xxxxxxx/{xx}High
118Filexx-xxxxx/xxxx-xxxx.xxxHigh
119Filexxxxxxxx/xx/xxxxxxx/xxxxxxxxxxxx.xHigh
120Filexxxxx/__xxxx_xxxx.xxxHigh
121Filexxxxxx.xxxxxxx_xx_xx.xxHigh
122Filexxx/xxxx/xxxx_xxxxxx.xHigh
123Filexxxxxxxxxxxxxxxxxxxx.xxxxHigh
124Filexxx_xxxx.xMedium
125Filexxxxxxxxxxx.xxxHigh
126Filexxx_xxxx.xxxMedium
127Filexxx/xxxxxx/xxxxxxxx/xxxxx/xxxxxxxxx.xxxxHigh
128Filexxxxxx.xxxMedium
129Filexxxxxx/xxxxxxx-xxx-xxxHigh
130Filexxx/xxx-xxxxx.xHigh
131Filexxx.xxxLow
132Filexxxxx.xxxMedium
133Filexxxxxxxxxxxxx.xxxHigh
134Filexxxxxxxxxxx_xxxxxxxxxxxx.xxHigh
135Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]High
136Filexxxxxxxxxxx.xxxHigh
137Filexxxxx.xxxMedium
138Filexxxxx.xxxMedium
139Filexxxxxxxx.xxxMedium
140Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxHigh
141Filexxxxxxxxxxxx.xxxHigh
142Filexxxxxxxx_xxxx.xxxHigh
143Filexxxxx.xxxMedium
144Filexx_xxxx.xMedium
145Filexxxx/xxxxxxxxxxxxxx/xxxx_xxxxxxx.xHigh
146Filexxxxxxxxxx.xxxHigh
147Filexxxx_xxxxxxxxx.xxxHigh
148Filexxxxxx/xxxxxxxxxxxxx.xxxxHigh
149Filexxxx-xxxxxx.xHigh
150Filexxxx.xLow
151Filexxxx_xxxxxxx_xxxxxxxx.xxxHigh
152Filexxxxx_xxxxx.xxxHigh
153Filexxxxx.xxxMedium
154Filexxxxxxxxx.xxxHigh
155Filexxxxx.xLow
156Filexxxxxxxxxxxxxxxx.xxxHigh
157Filexxxxxxxxxxxxxxxx.xxxHigh
158Filexxx_xxx.xMedium
159Filexxxx-xxxxxxx.xxxHigh
160Filexxxxx/xxxxxxxx.xxxHigh
161Filexxxxx_xxxxx.xxxxHigh
162Filexxxx/xxxxxxxx/xxxxxxxx.xxxxHigh
163Filexxx/xxxxxx/xxxx/xx/xx_xxxx.xHigh
164Filexxxxxxx/xxxxxx/xxxxx/xxxxxxx/xxx/xxx.xxxHigh
165Filexx-xxxxx/xxxxx-xxxx.xxxHigh
166Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxHigh
167Filexx-xxxxx.xxxMedium
168Filexxx/xx_xxx.xxxHigh
169Libraryxxxxxxxx/xxxxxxx/xxxxxxxx/xxx/xxxx/xxxx/xxxxxx/xxx/xxxxxx/xxxxxxx/xxxxxxxx/xxxxxxxx/xxxxxx/xxxxxxxx_xxxxxxxxxxxxxxxx.xxxxHigh
170Libraryxxxxxx[xxxxxx_xxxxHigh
171Libraryxxxxxx.xxxMedium
172Libraryxxxxxx.xxxMedium
173Libraryxxxxxxx-xxxxxxx/xxx/xxxx/xxxx/xxx/xxxxxxxxxx/xxxxxxx/xxxxxxx/xxxxxxx.xxxxHigh
174Libraryxxx/xxxxxxxx.xHigh
175Libraryxxx/xxxxxx/xxxxxxxx.xxHigh
176Libraryxxx/xxxxxx/xxxxxxx/xxxxxxxxx.xxHigh
177Libraryxxx/xxxxxx/xxxxxxx/xxxxx.xxHigh
178Libraryxxx/xxxxxx/xxx/xxxxxxxxxxx_xxxxxxxxx.xxHigh
179Libraryxxx/x.xLow
180Libraryxxx/xxxxxxx/xxxxx.xxHigh
181Libraryxxxxxx.xxxMedium
182Libraryxxxxxxxxxx.xxxHigh
183Libraryxxxxxx.xxxMedium
184Libraryxxxxxxxx.xxxMedium
185Libraryxxx/xx_xxx.xMedium
186Libraryxxxxxx.xxxMedium
187Libraryxx-xxxxxxx/xxxxxxx/xx-xxxx-xxxxxxx/xxx/xxxxx/High
188Argument$xxxxxxxMedium
189ArgumentxxxxxxxxxxxxMedium
190ArgumentxxxxLow
191ArgumentxxxLow
192Argumentxxxxxx_xxxxMedium
193ArgumentxxxxxxxxxxxxxxHigh
194ArgumentxxxxLow
195ArgumentxxxxxxxxMedium
196ArgumentxxxxxLow
197ArgumentxxxxxxLow
198Argumentxxxxxxxx xxxx/xxx xxxx/xxxxx xxxx/xxxxxxx/xxxx/xxxxx/xxxxxx/xxxxx xx xxxxx/xxx xxxx/xxx xxxxxx/xxxx xxxx/xxx/xxxxx/xxxxxHigh
199ArgumentxxxLow
200ArgumentxxxxxxxxxxMedium
201ArgumentxxxxxLow
202Argumentxxx_xxLow
203ArgumentxxxxxxxxMedium
204Argumentxxxx_xxLow
205ArgumentxxxxxxxLow
206Argumentxxxxxx[xxxxxx_xxxx]High
207ArgumentxxxxxxxLow
208Argumentxxxxxx_xxMedium
209ArgumentxxxxxxxxxxMedium
210ArgumentxxxxxxxxxxMedium
211Argumentxxxx_xxxMedium
212Argumentxxxxxxx_xxxxMedium
213ArgumentxxxxxLow
214Argumentxxx_xxxxMedium
215Argumentxxxxxxxx_xxxxHigh
216ArgumentxxxLow
217Argumentxxx_xxxxMedium
218ArgumentxxxxxxxLow
219ArgumentxxxxxxLow
220ArgumentxxxxxxxLow
221ArgumentxxxxxxxxMedium
222ArgumentxxxxxLow
223Argumentxxxxx_xxMedium
224ArgumentxxxxxxxxMedium
225ArgumentxxxxLow
226ArgumentxxxxxxxxxxMedium
227ArgumentxxxxxxxxMedium
228Argumentxxxxx_xxxMedium
229Argumentxxxx/xxLow
230Argumentxxx=xxxLow
231Argumentxxxx xxxxMedium
232ArgumentxxxxxxLow
233Argumentx_xxxxxxxxMedium
234ArgumentxxxxLow
235Argumentxxx_xxxxxxxxxHigh
236Argumentxxx_xxxxxxMedium
237ArgumentxxxxLow
238ArgumentxxLow
239Argumentxx/xxxxxxxxx_xxHigh
240Argumentxxxxx_xxxx/xxxxxx/xxxxxHigh
241ArgumentxxxxxLow
242Argumentxxxx_xxLow
243ArgumentxxxxxLow
244ArgumentxxxxLow
245ArgumentxxxLow
246ArgumentxxxxxxLow
247ArgumentxxxxxxxxxxMedium
248Argumentxxxxxxxxxxxx_xxxxxxHigh
249Argumentxxxx_xxxxMedium
250ArgumentxxxxxxxxxMedium
251Argumentxxxx/xxxxxxxxxx xxxxx/xxxxxHigh
252Argumentxxxx_xxxxxxMedium
253ArgumentxxxxxLow
254ArgumentxxLow
255ArgumentxxxxLow
256ArgumentxxxxLow
257ArgumentxxxxxxxxMedium
258ArgumentxxxxxxxxMedium
259ArgumentxxxxxxxxxMedium
260Argumentxxxxx_xxxx_xxxxHigh
261ArgumentxxxxxxxxMedium
262ArgumentxxxxxLow
263ArgumentxxxxxxxxMedium
264Argumentxxxxxx/xxxxxMedium
265ArgumentxxxxxxLow
266ArgumentxxxxxxxxMedium
267ArgumentxxxxxxxxxxMedium
268ArgumentxxxLow
269ArgumentxxxxLow
270Argumentxxx_xxxxx_xxxxxHigh
271ArgumentxxxxxxxxxMedium
272ArgumentxxxxxxxxxxxxxxxxxHigh
273ArgumentxxxxxxxLow
274ArgumentxxxxxxxxxMedium
275Argumentxxxxx_xxxxxMedium
276ArgumentxxxxLow
277Argumentxxxxxxxx_xxMedium
278Argumentxxxxx_xxxMedium
279ArgumentxxxxxxxxxMedium
280ArgumentxxxxxxxxxxxMedium
281ArgumentxxxxLow
282ArgumentxxxxxxxxMedium
283Argumentxxxxxxxx/xxxxHigh
284Argumentxxxx_xxxxx/xxxx_xxxx/xxHigh
285Argumentxxx_xxxxMedium
286ArgumentxxxLow
287ArgumentxxxxxLow
288Input Value%xx%xx%xxxxxxxx%xxxxxxx%xxxxxxxxxx.xxxxxx%xx%xx/xxxxxx%xx%xxxxx%xxxxxxx=%xxxHigh
289Input Value../Low
290Input Value../..Low
291Input Value./xxx/Low
292Input Value/xx *Low
293Input Value<xxxxxx>xxxxx(xxxxxxxx.xxxxxx);</xxxxxx>High
294Input Valuexxxx -x xxxxxxxx=xxxxxx.xxxxxxx xxxx://xxx.xxx.x.x/xxxxxx.xxxHigh
295Input Valuexxxxxxxx.+xxxHigh
296Input Value…/.Low
297Network Portxxx/xxxLow
298Network Portxxx/xxxLow
299Network Portxxx/xxxxMedium
300Network Portxxx/xxxxxMedium
301Network Portxxx xxxxxx xxxxHigh

References (6)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!