LgoogLoader Analysis

IOB - Indicator of Behavior (39)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en38
ru2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us40

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Solupress News2
Adobe ColdFusion2
Computer Software Manufaktur Alibaba2
JioFi 4G M2S2
Courseforum ProjectForum2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1DrayTek Vigor 2960 Web Management Interface mainfunction.cgi command injection7.47.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.002730.03CVE-2023-1162
2Telecommunication Software SAMwin Contact Center Suite Credential SAMwinLIBVB.dll getCurrentDBVersion hard-coded credentials6.56.0$0-$5k$0-$5kNot DefinedOfficial Fix0.001330.08CVE-2013-10002
3Metform Elementor Contact Form Builder Plugin mf Shortcode information disclosure5.05.0$0-$5k$0-$5kNot DefinedNot Defined0.000510.00CVE-2023-0694
4SurfControl Superscout Email Filter Administrative Web Interface msgError.asp cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.002690.00CVE-2002-1529
5AVTECH IP Camera/NVR/DVR PwdGrp.cgi command injection9.89.2$5k-$25k$0-$5kHighUnavailable0.000000.04
6SibSoft CommuniMail mailadmin.cgi cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptUnavailable0.009910.00CVE-2006-1944
7SourceCodester Online Class and Exam Scheduling System faculty_sched.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001700.03CVE-2022-2707
8Conceptronic CIPCAMPTIWL user.cgi cross-site request forgery6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000750.00CVE-2018-6408
9Parallel Tools Consortium pTools index.asp sql injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.003270.00CVE-2005-4509
10tcpdump CFM Parser print-cfm.c cfm_print memory corruption8.07.9$0-$5kCalculatingNot DefinedOfficial Fix0.008530.00CVE-2017-13052
11JioFi 4G M2S qcmap_web_cgi cross site scripting5.25.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.004540.00CVE-2019-7438
12PHP Fusebox index.php cross site scripting5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.004660.00CVE-2006-0242
13Rockettheme Com Rokmodule index.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.002720.00CVE-2010-1479
14Microsoft SharePoint wizardlist.aspx cross site scripting8.87.7$5k-$25k$0-$5kUnprovenOfficial Fix0.963830.00CVE-2012-0145
15SonicWALL Scrutinizer gadget listing fa_web.cgi sql injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000000.00
16Solupress News search.asp cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.004110.00CVE-2005-3998
17PHP cgi_main.c input validation7.37.0$25k-$100k$0-$5kHighOfficial Fix0.973630.00CVE-2012-1823
18SCO UnixWare SCOhelp HTTP Server search97.cgi format string7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.058390.00CVE-2000-1014
19Trivantis Coursemill Learning Management System admindocumentworker.jsp sql injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.001030.00CVE-2013-3602
20Courseforum ProjectForum versions.html denial of service7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.012160.00CVE-2005-4335

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
185.217.144.143LgoogLoader07/12/2023verifiedHigh

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (64)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/cgi-bin/supervisor/PwdGrp.cgipredictiveHigh
2File/pages/faculty_sched.phppredictiveHigh
3Fileaccount.asppredictiveMedium
4Fileadmin/versions.htmlpredictiveHigh
5Fileadmindocumentworker.jsppredictiveHigh
6Fileapply.cgipredictiveMedium
7Filecgi-bin/qcmap_web_cgipredictiveHigh
8Filecgi-bin/tools_ping.cgi?action=CommandpredictiveHigh
9Filexxxxxx.xxxpredictiveMedium
10Filexx_xxx.xxxpredictiveMedium
11Filexxxxx.xxxpredictiveMedium
12Filexxxxx.xxxpredictiveMedium
13Filexx-xxx/xxxx.xxxpredictiveHigh
14Filexxxxx.xxxpredictiveMedium
15Filexxxxx.xxxpredictiveMedium
16Filexxxxx.xx/xxxxxxxxxxx.xxx/xxxxx.xxxpredictiveHigh
17Filexxxxxxxxx.xxxpredictiveHigh
18Filexxxxxxxxxxxx.xxxpredictiveHigh
19Filexxx/xxxx_xxx.xxxpredictiveHigh
20Filexxxxxxxx.xxxpredictiveMedium
21Filexxxxx-xxx.xpredictiveMedium
22Filexxxxxxxxxxx-xxxxxxx.xxxpredictiveHigh
23Filexxxx/xxx/xxx_xxxx.xpredictiveHigh
24Filexxxxxx.xxxpredictiveMedium
25Filexxxxxxxx.xxxpredictiveMedium
26Filexxxxxxx.xxxpredictiveMedium
27Filexxxxx.xxxpredictiveMedium
28Filexxx.xxxpredictiveLow
29Filexxxx.xxxpredictiveMedium
30Filexxxxxxxxxxxxx.xxxpredictiveHigh
31Filexxxxxxx.xxxxpredictiveMedium
32Filexxxxxxxxxx.xxxxpredictiveHigh
33Libraryxxxxxxxxxxx.xxxpredictiveHigh
34Argument$_xxxxxx['xxxxx_xxxxxx']predictiveHigh
35Argumentxxxxxx_xx/xxxx/xxxxxxxpredictiveHigh
36ArgumentxxxxxxxxxxxpredictiveMedium
37ArgumentxxxxxpredictiveLow
38ArgumentxxxxxxxpredictiveLow
39Argumentxxxx_xxpredictiveLow
40Argumentxxxxx_xxpredictiveMedium
41ArgumentxxxxxxxxxxpredictiveMedium
42ArgumentxxxxxxxpredictiveLow
43Argumentxx=predictiveLow
44ArgumentxxxxxxpredictiveLow
45ArgumentxxxxxxxxpredictiveMedium
46ArgumentxxxxpredictiveLow
47ArgumentxxxxxxxxpredictiveMedium
48Argumentxxxx_xxxxpredictiveMedium
49Argumentxxxxxxx xxxxxxpredictiveHigh
50ArgumentxxxxxxpredictiveLow
51ArgumentxxxxxxxxpredictiveMedium
52ArgumentxxxxxxxxxpredictiveMedium
53ArgumentxxxxxxpredictiveLow
54ArgumentxxxxxxxxxpredictiveMedium
55ArgumentxxxxxxxxxxpredictiveMedium
56ArgumentxxxpredictiveLow
57ArgumentxxxxpredictiveLow
58ArgumentxxxxpredictiveLow
59ArgumentxxxxpredictiveLow
60ArgumentxxxpredictiveLow
61ArgumentxxxxpredictiveLow
62Input Value' xx (xxxxxx xxxx xxxx(xxxxxx xxxxx(*),xxxxxx(xxxxxxxxxxxx,(xxxxxx (xxx(xxxx=xxxx,x))),xxxxxxxxxxxx,xxxxx(xxxx(x)*x))x xxxx xxxxxxxxxxx_xxxxxx.xxxxxxx xxxxx xx x)x)-- xxxxpredictiveHigh
63Input Value-xpredictiveLow
64Network Portxxx/xx (xxx xxxxxxxx)predictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!