Hexmen Analysis

IOB - Indicator of Behavior (1000)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en996
zh4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us998
cn2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

SourceCodester Alphaware Simple E-Commerce System4
TP-Link Archer C502
Apple tvOS2
Apache HTTP Server2
TRENDnet TEW-811DRU2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1TRENDnet TEW-652BRP Web Interface ping.ccp command injection8.17.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.010490.04CVE-2023-0640
2TRENDNet TEW-811DRU httpd guestnetwork.asp buffer overflow7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000600.08CVE-2023-0617
3Netgear WNDR3700v2 Web Interface denial of service4.34.2$5k-$25k$0-$5kProof-of-ConceptNot Defined0.001350.17CVE-2023-0850
4TRENDnet TEW-811DRU httpd security.asp memory corruption7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001370.04CVE-2023-0613
5TRENDnet TEW-652BRP Web Service cfg_op.ccp memory corruption7.56.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.000970.04CVE-2023-0618
6TRENDnet TEW-652BRP Web Management Interface get_set.ccp command injection8.88.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.000760.13CVE-2023-0611
7TP-Link Archer C50 Web Management Interface denial of service6.56.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000740.05CVE-2023-0936
8TRENDnet TEW-811DRU Web Management Interface wan.asp memory corruption6.56.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001330.07CVE-2023-0637
9SourceCodester Alphaware Simple E-Commerce System sql injection7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.04CVE-2023-1504
10Ubiquiti EdgeRouter X OSPF command injection [Disputed]8.17.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.010490.00CVE-2023-1458
11SourceCodester Alphaware Simple E-Commerce System admin_index.php sql injection7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.04CVE-2023-1503
12SourceCodester E-Commerce System setDiscount.php sql injection6.66.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.08CVE-2023-1505
13SourceCodester Alphaware Simple E-Commerce System edit_customer.php sql injection7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.08CVE-2023-1502
14SourceCodester E-Commerce System cross site scripting4.14.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000520.04CVE-2023-1569
15Apache HTTP Server mod_reqtimeout resource management5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.016960.00CVE-2007-6750
16Apple tvOS WebKit memory corruption7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.014160.00CVE-2019-8673
17Apple tvOS WebKit memory corruption7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.960680.02CVE-2019-8672
18Oracle Database Server Core RDBMS Privilege Escalation7.57.5$5k-$25k$0-$5kNot DefinedNot Defined0.001130.04CVE-2011-2253

IOC - Indicator of Compromise (32)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
158.218.200.2Hexmen02/13/2022verifiedHigh
2103.42.180.113Hexmen02/13/2022verifiedHigh
3103.230.108.85Hexmen02/13/2022verifiedHigh
4114.115.209.191ecs-114-115-209-191.compute.hwclouds-dns.comHexmen02/13/2022verifiedHigh
5119.28.133.78Hexmen02/13/2022verifiedHigh
6119.249.54.119Hexmen02/13/2022verifiedHigh
7121.18.238.80hebei.18.121.in-addr.arpaHexmen02/13/2022verifiedHigh
8XXX.XXX.XX.XXXxxx-xxx-xxx-xx-xxx.xxxxxxx.xxxxxxxx-xxx.xxxXxxxxx02/13/2022verifiedHigh
9XXX.XXX.XX.XXXxxx-xxx-xxx-xx-xxx.xxxxxxx.xxxxxxxx-xxx.xxxXxxxxx02/13/2022verifiedHigh
10XXX.XXX.XX.XXXxxx-xxx-xxx-xx-xxx.xxxxxxx.xxxxxxxx-xxx.xxxXxxxxx02/13/2022verifiedHigh
11XXX.XXX.XX.XXXxxx-xxx-xxx-xx-xxx.xxxxxxx.xxxxxxxx-xxx.xxxXxxxxx02/13/2022verifiedHigh
12XXX.XXX.XX.XXxxx-xxx-xxx-xx-xx.xxxxxxx.xxxxxxxx-xxx.xxxXxxxxx02/13/2022verifiedHigh
13XXX.XXX.XX.XXxxx-xxx-xxx-xx-xx.xxxxxxx.xxxxxxxx-xxx.xxxXxxxxx02/13/2022verifiedHigh
14XXX.XX.XX.XXXXxxxxx02/13/2022verifiedHigh
15XXX.XXX.XXX.XXXxxxxx02/13/2022verifiedHigh
16XXX.XX.XXX.XXXXxxxxx02/13/2022verifiedHigh
17XXX.XX.XXX.XXXxxxxx02/13/2022verifiedHigh
18XXX.XX.XX.XXXXxxxxx02/13/2022verifiedHigh
19XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
20XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
21XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
22XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
23XXX.XXX.X.XXXxxxxx02/13/2022verifiedHigh
24XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
25XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
26XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
27XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
28XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
29XXX.XXX.XX.XXXXxxxxx02/13/2022verifiedHigh
30XXX.XXX.XXX.XXXxxxxx02/13/2022verifiedHigh
31XXX.XXX.XXX.XXXxxxxx02/13/2022verifiedHigh
32XXX.XXX.XXX.XXXXxxxxx02/13/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (3)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1059.007CAPEC-209CWE-79Cross Site ScriptingpredictiveHigh
2TXXXXCAPEC-136CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveHigh
3TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (22)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/ecommerce/admin/settings/setDiscount.phppredictiveHigh
2File/wireless/guestnetwork.asppredictiveHigh
3File/wireless/security.asppredictiveHigh
4Filexxxxx/xxxxx_xxxxx.xxxpredictiveHigh
5Filexxxxx/xxxx/xxxxxxxxxx.xxx?xxxxxx=xxxxpredictiveHigh
6Filexxx_xx.xxxpredictiveMedium
7Filexxxxxxxx/xxxx_xxxxxxxx.xxxpredictiveHigh
8Filexxx_xxx.xxxpredictiveMedium
9Filexxxx.xxxpredictiveMedium
10Filexxx.xxxpredictiveLow
11ArgumentxxxxpredictiveLow
12Argumentxxxxxx_xxx_xxpredictiveHigh
13Argumentxxxxx/xxxxxxxxpredictiveHigh
14Argumentxxxxxxxxx/xx/xxxxxxxxpredictiveHigh
15ArgumentxxpredictiveLow
16Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
17Argumentx_xxxxpredictiveLow
18Input Valuexxxxxx xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)predictiveHigh
19Input Value<xxxxxx>xxxxx('x')</xxxxxx>predictiveHigh
20Input Valuex' xxxxx xxxxx(x) xxx 'xxxx'='xxxxpredictiveHigh
21Input Valuexxxxx' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)-- xxxxpredictiveHigh
22Input Valuexxxxx%xxxxxx.xxx ' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx) xxx 'xxxx'='xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!