Invicta Stealer Analiza

IOB - Indicator of Behavior (283)

Oś czasu

Język

en248
ja10
zh8
pl6
fr2

Kraj

us284

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

SourceCodester Inventory Management System6
HP Integrated Lights-Out6
phpShop6
Jetbox One CMS4
Pearlinger Products4

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzEPSSCTICVE
1LogicBoard CMS away.php Redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.000001.90
2esoftpro Online Guestbook Pro ogp_show.php sql injection7.37.1$0-$5k$0-$5kHighUnavailable0.001350.00CVE-2010-4996
3Esoftpro Online Guestbook Pro ogp_show.php cross site scripting4.34.2$0-$5k$0-$5kHighUnavailable0.002090.02CVE-2009-2441
4Squitosoft Squito Gallery photolist.inc.php memory corruption7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.013710.04CVE-2005-2258
5Esoftpro Online Guestbook Pro ogp_show.php cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.001010.08CVE-2009-2448
6Esoftpro Online Guestbook Pro ogp_show.php cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.001290.07CVE-2009-2447
7HP Integrated Lights-Out information disclosure9.88.5$5k-$25k$0-$5kUnprovenOfficial Fix0.022860.02CVE-2012-3271
8htmltonuke htmltonuke.php privilege escalation7.36.7$0-$5k$0-$5kProof-of-ConceptUnavailable0.018490.04CVE-2006-0308
9Storytlr cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.001290.18CVE-2014-100037
10WordPress AdServe adclick.php sql injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000730.08CVE-2008-0507
11Appindex MWChat start_lobby.php privilege escalation7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.018950.00CVE-2005-1869
12Cisco BroadWorks Application Delivery Platform Single Sign-On Remote Code Execution9.99.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.001430.00CVE-2023-20238
13Zentrack index.php privilege escalation7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.03
14Jetbox One CMS memory corruption5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.019990.05CVE-2004-1448
15Mambo Artlinks component artlinks.dispnew.php privilege escalation8.17.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.017420.03CVE-2006-3949
16xoops Xoopsgallery Module mod_gallery sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.015200.00CVE-2008-0138
17MosXML mod_mainmenu.php privilege escalation7.36.4$0-$5k$0-$5kUnprovenUnavailable0.004410.01CVE-2008-5206
18SourceCodester Best Courier Management System Manage Account Page cross site scripting4.14.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000500.04CVE-2023-5302
19Comersus Open Technologies Comersus Cart comersus_optreviewreadexec.asp sql injection7.37.1$0-$5k$0-$5kHighUnavailable0.003080.05CVE-2007-3323
20UBB.threads login.php cross site scripting3.53.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.02

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDadres IPHostnameAktorKampanieIdentifiedRodzajPewność siebie
194.156.253.17Invicta Stealer2024-04-03verifiedWysoki

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (169)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1File/admin/list_addr_fwresource_ip.phppredictiveWysoki
2File/DXR.axdpredictiveMedium
3File/forum/away.phppredictiveWysoki
4File/importexport.phppredictiveWysoki
5File/log/decodmail.phppredictiveWysoki
6File/multi-vendor-shopping-script/product-list.phppredictiveWysoki
7File/see_more_details.phppredictiveWysoki
8File/servlet/webaccpredictiveWysoki
9File/SysManage/AddUpdateRole.aspxpredictiveWysoki
10File/textpattern/index.phppredictiveWysoki
11Fileadclick.phppredictiveMedium
12FileadDetail.asppredictiveMedium
13Fileadmin.a6mambocredits.phppredictiveWysoki
14Fileadmin.cropcanvas.phppredictiveWysoki
15Fileadmin/theme-edit.phppredictiveWysoki
16FileadminBanned.phppredictiveWysoki
17FileadminBoards.phppredictiveWysoki
18FileadminForums.phppredictiveWysoki
19Fileallopass-error.phppredictiveWysoki
20Fileallopass.phppredictiveMedium
21Fileannounce.phppredictiveMedium
22Fileapp/ajax/search_sell_paymen_report.phppredictiveWysoki
23Filexxxxxxxx.xxxxxxx.xxxpredictiveWysoki
24Filexxx.xxxpredictiveNiski
25Filexxxx_xxxxxxxx.xxxpredictiveWysoki
26Filexx_xxxx.xxxpredictiveMedium
27Filexxxx_xxxxxxxx/xx.xxxpredictiveWysoki
28Filexxxxxxxx_xxxxxxxxxxxxxxxxx.xxxpredictiveWysoki
29Filexxxxx.xxxpredictiveMedium
30Filexxxxxxxx.xxpredictiveMedium
31Filexxxxxxxx.xxx.xxxpredictiveWysoki
32Filexxxx_xxxxxxx.xxxpredictiveWysoki
33Filexxx/xxxx/xxx_xxxx.xpredictiveWysoki
34Filexxxxxxxxxxx.xxxxx.xxxpredictiveWysoki
35Filexxxxxxxxxxxxxxxxxxxx.xxxpredictiveWysoki
36Filexxxxxxxx.xxxx.xxxpredictiveWysoki
37Filexxxxxxxxxxxx_xxxx.xxxpredictiveWysoki
38Filexxxx_xxxxxxx.xxx.xxxpredictiveWysoki
39Filexxxxxxxxxx.xxxpredictiveWysoki
40Filexxxx.xxx.xxxpredictiveMedium
41Filexxxxxxxxxx.xxxpredictiveWysoki
42Filexxxxx_xxxxxx.xxxpredictiveWysoki
43Filexxxxxxxxx.xxxpredictiveWysoki
44Filexxx/xxxxxx.xxxpredictiveWysoki
45Filexxxxxxx.xxxpredictiveMedium
46Filexxxxxxx/xxxxx/xxxxxxx.xpredictiveWysoki
47Filexxxxxxxx/xxxx.xxxpredictiveWysoki
48Filexxxxxxxx/xxxxxxxxxxxx.xxx.xxxpredictiveWysoki
49Filexxxxx.xxxpredictiveMedium
50Filexxxxxx.xxxpredictiveMedium
51Filexxxxxxx.xxxpredictiveMedium
52Filexxxxxx/xxxx/xxxxxx_xxx.xxxpredictiveWysoki
53Filexxxxxxxx.xxx.xxxpredictiveWysoki
54Filexxxxx.xxxpredictiveMedium
55Filexxx_xxxxxxxx.xxxpredictiveWysoki
56Filexxxxx-x.xpredictiveMedium
57Filexxxxxxxx.xxxpredictiveMedium
58Filexxxxxxx/xxx_xxxxxxxx.xxxpredictiveWysoki
59Filexxx_xxxxxxx.xxxpredictiveWysoki
60Filexxx_xxxxxxx_xxxx.xxxpredictiveWysoki
61Filexxx_xxxxxxx_xxxxxxxxxxx.xxxpredictiveWysoki
62Filexxx_xxxxxxx_xxxxxxxxxx.xxxpredictiveWysoki
63Filexxxx.xxxpredictiveMedium
64Filexxx_xxxx.xxxpredictiveMedium
65Filexxxxxxxxx.xxx.xxxpredictiveWysoki
66Filexxxxxx.xxxxx.xxxpredictiveWysoki
67Filexxxx.xxxpredictiveMedium
68Filexxxxxxx.xxxxxxx.xxxxxx.xxxpredictiveWysoki
69Filexxx.xxxpredictiveNiski
70Filexxxxxxx_xxxxxx_xxxxxxxx.xxxpredictiveWysoki
71Filexxxxxx_xxx_xxxxxx.xxxpredictiveWysoki
72Filexxxx.xxxpredictiveMedium
73Filexxxxxxxxxxxxxxx.xxxpredictiveWysoki
74Filexxxxxxxx.xxx/xxxxxx.xxx/xxxxxxxx.xxxpredictiveWysoki
75Filexxxx_xxxxxxxx.xxx/xxxx_xxxx.xxxpredictiveWysoki
76Filexxxxx/xxxxxxxx/xxxxxxxxx.xxxpredictiveWysoki
77Filexx_xxxx.xxxpredictiveMedium
78Filexxxxx_xxxx.xxxpredictiveWysoki
79Filexxxxx_xxxxx.xxxpredictiveWysoki
80Filexxxxxxxxxxxxx.xxxpredictiveWysoki
81Filexxxxx/xxxx_xxxxxx_xxxxxx.xxxpredictiveWysoki
82Filexxxx/xxx/xxxx-xxxxx.xxxpredictiveWysoki
83Filexxxx.xxxpredictiveMedium
84Filexxxxxxxxx.xxxpredictiveWysoki
85Filexxxx_xxxxxxx_xxxx.xxxpredictiveWysoki
86Filexxxx/xxxx-x-xxxxxx.xpredictiveWysoki
87Filexx-xxxxx.xxxpredictiveMedium
88Filexx-xxxxxxxxx.xxxpredictiveWysoki
89Filexxxxxxxxxxxx.xxxpredictiveWysoki
90File_xxxxxxxxx.xxxpredictiveWysoki
91Libraryxxx.xxx/xxxxxxx.xxxxxxx/xxxx.xxx/xxxxxxx.xxxxxxx.xxxxxx.xxxpredictiveWysoki
92Libraryxxxxxx[xxxxxx_xxxxpredictiveWysoki
93Libraryxxxxxxx/xxx.xxx.xxx.xxxpredictiveWysoki
94Libraryxxxx.xxx.xxxpredictiveMedium
95ArgumentxxxxxpredictiveNiski
96Argumentxxxxxxxx_xxxxpredictiveWysoki
97ArgumentxxxxxxxxpredictiveMedium
98Argumentxxxx_xxxpredictiveMedium
99ArgumentxxxxxpredictiveNiski
100ArgumentxxxxpredictiveNiski
101ArgumentxxxpredictiveNiski
102Argumentxxx_xxpredictiveNiski
103Argumentxxxxxxx[x][xxxx]predictiveWysoki
104ArgumentxxxxxxpredictiveNiski
105ArgumentxxxxxxxxxxpredictiveMedium
106Argumentxxxxxx[xxxxxx_xxxx]predictiveWysoki
107ArgumentxxxxxxxxxxxxpredictiveMedium
108ArgumentxxxxxxxxpredictiveMedium
109ArgumentxxxxxxxxpredictiveMedium
110ArgumentxxxxxxxxpredictiveMedium
111ArgumentxxxxxxxpredictiveNiski
112Argumentxxxxxx_xxxxpredictiveMedium
113ArgumentxxxxxpredictiveNiski
114Argumentxxxxx_xxxx_xxxxpredictiveWysoki
115ArgumentxxxxxpredictiveNiski
116ArgumentxxxxxxxxxpredictiveMedium
117Argumentxx_xxxxxxxpredictiveMedium
118ArgumentxxxxpredictiveNiski
119ArgumentxxxxxxxpredictiveNiski
120Argumentxxxxx xxxxpredictiveMedium
121Argumentxxxxxxx_xxxxxxxpredictiveWysoki
122Argumentxxxxxxxxxxxxxx[xxxxxxxxxxxxxxxxxx]predictiveWysoki
123Argumentxxxx[xxxxxxx]predictiveWysoki
124ArgumentxxxxxxxxpredictiveMedium
125ArgumentxxxxpredictiveNiski
126ArgumentxxpredictiveNiski
127ArgumentxxxxxxxxxpredictiveMedium
128Argumentxxxxx_xxxpredictiveMedium
129ArgumentxxxxpredictiveNiski
130ArgumentxxxxxxxpredictiveNiski
131Argumentxxx_xxxx_xxxxpredictiveWysoki
132ArgumentxxxpredictiveNiski
133Argumentxxxxxxxxx_xxxxxxxx_xxxxpredictiveWysoki
134Argumentxxxxxxxxx_xxxx_xxxxpredictiveWysoki
135Argumentxxxxxxx_xxxxpredictiveMedium
136Argumentxxxxx_xxxpredictiveMedium
137Argumentxxxxxx_xxxxxx[xxxxxx_xxxx]predictiveWysoki
138ArgumentxxxxpredictiveNiski
139ArgumentxxxxxxpredictiveNiski
140Argumentxxxx_xxxxpredictiveMedium
141ArgumentxxxxxxxxxpredictiveMedium
142Argumentxxxxx_xxxx_xxxpredictiveWysoki
143Argumentxxxxx_xxxx_xxxxpredictiveWysoki
144Argumentxxxxxxx_xxxpredictiveMedium
145ArgumentxxpredictiveNiski
146Argumentxxxxxxxxxx[x]predictiveWysoki
147Argumentxx_xxxxpredictiveNiski
148ArgumentxxxxxxpredictiveNiski
149ArgumentxxxxxpredictiveNiski
150ArgumentxxxxxxxxxxpredictiveMedium
151ArgumentxxxxxxxpredictiveNiski
152Argumentxxxx_xxxxpredictiveMedium
153ArgumentxxxpredictiveNiski
154ArgumentxxxxxxpredictiveNiski
155Argumentxxxxxx_xxxxxxpredictiveWysoki
156Argumentxxx_xxxxxpredictiveMedium
157Argumentxxxx_xxxxpredictiveMedium
158ArgumentxxxpredictiveNiski
159Argumentxx_xxpredictiveNiski
160Argumentxxxxxxxx_xxxpredictiveMedium
161Argumentxxx_xxxxxxxxxxxxpredictiveWysoki
162ArgumentxxxxxxxxxxpredictiveMedium
163Argumentxx_xxpredictiveNiski
164ArgumentxxxxxxxxxxxpredictiveMedium
165Argument_xxxx[_xxx_xxxx_xxxxpredictiveWysoki
166Input ValuexxxxpredictiveNiski
167Input ValuexxxxxxpredictiveNiski
168Input Value\xxx../../../../xxx/xxxxxxpredictiveWysoki
169Network Portxxx xxxxxx xxxxpredictiveWysoki

Referencje (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!