Tropic Trooper Analysis

IOB - Indicator of Behavior (1000)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en988
zh10
ru2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us986
cn6
hk4
gw2
ca2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Cisco IOS XE4
Fortinet FortiOS4
SourceCodester E-Commerce System4
Ubiquiti EdgeRouter X2
IBM API Connect2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1TRENDNet TEW-811DRU httpd guestnetwork.asp buffer overflow7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000600.08CVE-2023-0617
2TRENDnet TEW-652BRP Web Service cfg_op.ccp memory corruption7.56.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.000970.10CVE-2023-0618
3TRENDnet TEW-652BRP Web Management Interface get_set.ccp command injection8.88.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.000760.07CVE-2023-0611
4TRENDnet TEW-811DRU Web Management Interface wan.asp memory corruption6.56.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001330.05CVE-2023-0637
5TRENDnet TEW-652BRP Web Interface ping.ccp command injection8.17.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.010490.07CVE-2023-0640
6TRENDnet TEW-811DRU httpd security.asp memory corruption7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001370.04CVE-2023-0613
7Netgear WNDR3700v2 Web Interface denial of service4.34.2$5k-$25k$0-$5kProof-of-ConceptNot Defined0.001350.04CVE-2023-0850
8TP-Link Archer C50 Web Management Interface denial of service6.56.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000740.05CVE-2023-0936
9SourceCodester E-Commerce System cross site scripting4.14.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000520.06CVE-2023-1569
10Ubiquiti EdgeRouter X OSPF command injection [Disputed]8.17.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.009340.04CVE-2023-1458
11SourceCodester Alphaware Simple E-Commerce System sql injection7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.04CVE-2023-1504
12SourceCodester E-Commerce System setDiscount.php sql injection6.66.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.06CVE-2023-1505
13SourceCodester Alphaware Simple E-Commerce System edit_customer.php sql injection7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.04CVE-2023-1502
14SourceCodester Alphaware Simple E-Commerce System admin_index.php sql injection7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.04CVE-2023-1503
15IBM API Connect HTTP Request input validation5.35.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000910.05CVE-2022-34350
16WangEditor index.js cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000560.03CVE-2023-24251
17VMware vCenter Server/Cloud Foundation DCERPC Protocol out-of-bounds6.46.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000680.04CVE-2023-20896
18PbootCMS cross site scripting3.63.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.000520.06CVE-2024-1018
19WordPress sql injection6.86.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.004670.03CVE-2022-21664
20Orchard CMS HTML Modal Dialog cross site scripting4.44.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000530.02CVE-2022-32173

Campaigns (2)

These are the campaigns that can be associated with the actor:

IOC - Indicator of Compromise (78)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
110.196.132.154Tropic Trooper12/21/2020verifiedHigh
223.27.112.216Tropic TrooperPoison Ivy12/21/2020verifiedHigh
323.234.27.100Tropic Trooper12/21/2020verifiedHigh
427.126.176.169Tropic Trooper12/21/2020verifiedHigh
527.126.186.74krakow.intellectint.netTropic Trooper12/21/2020verifiedHigh
627.126.186.222grupos.slidefresh.netTropic Trooper12/21/2020verifiedHigh
743.129.177.152Tropic Trooper07/29/2022verifiedHigh
843.134.194.237Tropic Trooper07/29/2022verifiedHigh
943.154.74.7Tropic Trooper07/29/2022verifiedHigh
1043.154.85.5Tropic Trooper07/29/2022verifiedHigh
1143.154.88.192Tropic Trooper07/29/2022verifiedHigh
1245.32.47.14845.32.47.148.vultr.comTropic Trooper12/23/2020verifiedMedium
1345.76.218.24745.76.218.247.vultrusercontent.comTropic Trooper07/29/2022verifiedHigh
1445.77.178.4745.77.178.47.vultrusercontent.comTropic Trooper07/29/2022verifiedHigh
1545.77.214.244Tropic Trooper02/22/2022verifiedHigh
1645.125.12.147spk.cloudie.hkTropic Trooper12/21/2020verifiedHigh
17XX.XXX.XX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
18XX.XX.XX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
19XX.XXX.XXX.XXxxxxx Xxxxxxx07/29/2022verifiedHigh
20XX.XXX.XXX.XXXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh
21XX.XXX.XX.XXXXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh
22XX.XXX.XXX.XXXxx-xxx-xxx-xxx.xxxxx-xx.xxxxx.xxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
23XX.XXX.XXX.XXxx-xxx-xxx-xx.xxxxx-xx.xxxxx.xxxXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh
24XX.XXX.XX.XXxx-xxx-xx-xx.xxxxx-xx.xxxxx.xxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
25XX.XXX.XXX.XXxxxx-xx-xxx-xxx-xx.xxx.xxxxxx.xxxxxxxxx.xxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
26XX.XXX.XXX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
27XX.XXX.XX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
28XX.XXX.XX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
29XXX.XX.XX.XXXxxxxx Xxxxxxx07/29/2022verifiedHigh
30XXX.XXX.XXX.XXXxxxxx Xxxxxxx12/21/2020verifiedHigh
31XXX.XX.XXX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
32XXX.XX.XX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
33XXX.XX.XX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
34XXX.XXX.XX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
35XXX.XXX.XX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
36XXX.XXX.XXX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
37XXX.XX.XXX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
38XXX.XXX.XXX.XXXxxx.xxxxxxx-xxx-xxx.xxxxxxx.xxxxxx.xxXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh
39XXX.XX.XXX.XXXxxxxx Xxxxxxx12/23/2020verifiedHigh
40XXX.XX.XXX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
41XXX.XX.XXX.XXXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh
42XXX.XXX.XX.XXXxxxxx Xxxxxxx08/04/2022verifiedHigh
43XXX.XXX.XX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
44XXX.XXX.XX.XXxxx-xxx-xx-xx.xxx.xxXxxxxx Xxxxxxx08/04/2022verifiedHigh
45XXX.XXX.XXX.XXXxxxxx Xxxxxxx12/21/2020verifiedHigh
46XXX.XX.XX.XXXXxxxxx Xxxxxxx08/04/2022verifiedHigh
47XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xxxxx-xx.xxxxx.xxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
48XXX.XXX.XXX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
49XXX.XX.XXX.XXXxxx-xx-xxx-xxx.xxxxxxxxx.xxxxxxx.xxXxxxxx XxxxxxxXxxxxxxx12/21/2020verifiedHigh
50XXX.XXX.XX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
51XXX.XXX.XXX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
52XXX.X.XX.XXxxx-x-xx-xx.xxxxxx.xxxxx.xxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
53XXX.XX.X.XXXxxxxx Xxxxxxx12/21/2020verifiedHigh
54XXX.XXX.XXX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
55XXX.XXX.XXX.XXXxxx.xxx.xxx.xxx.xxxxxxxxxxxxxxxx.xxxXxxxxx Xxxxxxx07/29/2022verifiedHigh
56XXX.X.XX.XXXxxxxx Xxxxxxx12/23/2020verifiedHigh
57XXX.XXX.XXX.XXXXxxxxx Xxxxxxx02/22/2022verifiedHigh
58XXX.XXX.XXX.XXXXxxxxx Xxxxxxx02/22/2022verifiedHigh
59XXX.XX.XX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
60XXX.XX.XX.XXXXxxxxx Xxxxxxx07/29/2022verifiedHigh
61XXX.XX.XXX.XXXxxxxx Xxxxxxx07/29/2022verifiedHigh
62XXX.XX.XXX.XXXxxxxx Xxxxxxx07/29/2022verifiedHigh
63XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxxxxxxxxxxxxx.xxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
64XXX.XXX.XX.Xxxx.xxx.xx.x.xxxxxx.xxxxx.xxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
65XXX.XXX.XX.XXxxxxx Xxxxxxx12/23/2020verifiedHigh
66XXX.XXX.XX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
67XXX.XX.XXX.XXxxx-xx-xxx-xx.xxxxxx.xxxxx.xxxXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh
68XXX.XXX.XXX.XXXxxxxx Xxxxxxx12/23/2020verifiedHigh
69XXX.XX.XX.XXXxxx-xx-xx-xxx.xxx-xx.xxxxxxxx.xxxXxxxxx Xxxxxxx02/22/2022verifiedHigh
70XXX.XXX.XXX.Xxxx-xxxxxx.xxxxxx-xx-xxxxx.xxxXxxxxx Xxxxxxx02/22/2022verifiedHigh
71XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xxxxxx.xxxxxxxxxxxxxx.xxxXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh
72XXX.XXX.X.XXxx-x-xxx-xxx-xxxxxxxxx.xxxxxxxx.xxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
73XXX.XXX.XXX.XXxxx-xxx-xxx-xx-xxxxxx.xxxxxxx.xxx.xxXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh
74XXX.XXX.XXX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
75XXX.XXX.XXX.XXXXxxxxx Xxxxxxx12/21/2020verifiedHigh
76XXX.XXX.XXX.XXXxxxxx Xxxxxxx07/29/2022verifiedHigh
77XXX.XXX.XX.XXXxxxxxxxx.xxxxx.xxxxxXxxxxx Xxxxxxx12/21/2020verifiedHigh
78XXX.XX.XX.XXXXxxxxx XxxxxxxXxxxxx Xxx12/21/2020verifiedHigh

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-126CWE-22Path TraversalpredictiveHigh
2T1059CAPEC-242CWE-94Argument InjectionpredictiveHigh
3TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveHigh
4TXXXX.XXXCAPEC-191CWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveHigh
5TXXXXCAPEC-136CWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveHigh
6TXXXXCAPEC-108CWE-XX, CWE-XXXxx XxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (29)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin.php?p=/Area/index#tab=t2predictiveHigh
2File/dist/index.jspredictiveHigh
3File/ecommerce/admin/settings/setDiscount.phppredictiveHigh
4File/wireless/guestnetwork.asppredictiveHigh
5File/xxxxxxxx/xxxxxxxx.xxxpredictiveHigh
6Filexxxxx/xxxxx_xxxxx.xxxpredictiveHigh
7Filexxxxx/xxxx/xxxxxxxxxx.xxx?xxxxxx=xxxxpredictiveHigh
8Filexxx_xx.xxxpredictiveMedium
9Filexxxxxxxx/xxxx_xxxxxxxx.xxxpredictiveHigh
10Filexxx_xxx.xxxpredictiveMedium
11Filexxxx.xxxpredictiveMedium
12Filexxx/xxxx_xx_xxx.xpredictiveHigh
13Filexxx.xxxpredictiveLow
14Libraryxxx/xxxxxxx.xxx.xxxpredictiveHigh
15ArgumentxxxxpredictiveLow
16Argumentxxxxxx_xxx_xxpredictiveHigh
17ArgumentxxxxxxxxpredictiveMedium
18Argumentxxxxx/xxxxxxxxpredictiveHigh
19Argumentxxxxxxxxx/xx/xxxxxxxxpredictiveHigh
20ArgumentxxpredictiveLow
21ArgumentxxxxpredictiveLow
22Argumentxxxxxx_xxxpredictiveMedium
23Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
24Argumentx_xxxxpredictiveLow
25Input Valuexxxxxx xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)predictiveHigh
26Input Value<xxxxxx>xxxxx('x')</xxxxxx>predictiveHigh
27Input Valuex' xxxxx xxxxx(x) xxx 'xxxx'='xxxxpredictiveHigh
28Input Valuexxxxx' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)-- xxxxpredictiveHigh
29Input Valuexxxxx%xxxxxx.xxx ' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx) xxx 'xxxx'='xxxxpredictiveHigh

References (12)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!