SWEED Agent Tesla Analysis

IOB - Indicator of Behavior (24)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en20
pt2
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us10

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows2
Collabora Online2
Drag and Drop Multiple File Upload Contact Form 72
Canon imageCLASS MF743Cdw2
Apple iOS2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Microsoft ASP.NET Cryptographic Padding Oracle cryptographic issues4.84.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.969310.04CVE-2010-3332
2PHPUnit HTTP POST eval-stdin.php code injection8.58.4$0-$5k$0-$5kHighOfficial Fix0.974870.08CVE-2017-9841
3PhpIPAM edit-bgp-mapping-search.php sql injection4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.040640.00CVE-2022-23046
4Zscaler Client Connector integrity check4.24.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.04CVE-2024-23461
5Online Banking System delete_customer.php sql injection8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.002120.03CVE-2022-40117
6Drag and Drop Multiple File Upload Contact Form 7 admin-ajax.php path traversal6.46.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.002310.04CVE-2023-1112
7WP-CopyProtect Plugin CopyProtect_options_page cross-site request forgery4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.000580.04CVE-2023-25025
8Replace Word Plugin cross-site request forgery6.26.1$0-$5k$0-$5kNot DefinedNot Defined0.000580.00CVE-2023-37973
9GitLab GraphQL API improper authorization5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000690.04CVE-2022-0152
10Apple iOS/iPadOS out-of-bounds4.54.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000520.00CVE-2023-32410
11Digital.ai App Management Publisher Plugin cross-site request forgery5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.000790.05CVE-2023-35148
12Tables Plugin error_msg cross site scripting3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000460.00CVE-2023-25453
13Splunk Enterprise Web URL log file3.63.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000720.00CVE-2023-32712
14Collabora Online cross site scripting5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.04CVE-2023-34088
15Autolab TAR File path traversal6.26.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000890.00CVE-2023-32676
16Multiple Page Generator Plugin sql injection4.34.2$0-$5k$0-$5kNot DefinedNot Defined0.000950.00CVE-2023-2607
17Microsoft Windows NTLM Security Support Provider information disclosure5.24.8$25k-$100k$5k-$25kUnprovenOfficial Fix0.001660.00CVE-2023-24900
18Canon imageCLASS MF743Cdw IPP Sides stack-based overflow9.39.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001320.02CVE-2023-0856
19Modpagespeed Mod Pagespeed mod_pagespeed cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.002200.00CVE-2013-6111
20ThinkPHP Language Pack pearcmd.php file inclusion8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.041530.04CVE-2022-47945

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
184.38.134.121ip-134-121.dataclub.infoSWEED Agent Tesla07/16/2019verifiedHigh

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (9)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/net-banking/delete_customer.phppredictiveHigh
2Fileadmin-ajax.phppredictiveHigh
3Filexxx/xxxxx/xxxxxxx/xxxx-xxx-xxxxxxx-xxxxxx.xxxpredictiveHigh
4Filexxxxxxx.xxxpredictiveMedium
5Filexxxx/xxx/xxxx-xxxxx.xxxpredictiveHigh
6Argumentxxxx_xxpredictiveLow
7ArgumentxxxxpredictiveLow
8ArgumentxxxxxxpredictiveLow
9Argumentxxxxxx_xxxxpredictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!