Monarchy Analysis

IOB - Indicator of Behavior (43)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

ru26
en12
fr6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

ru42
us2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Google Chrome10
Twitter Recommendation Algorithm2
Google Android2
Adobe Animate2
Huawei EMUI2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Fluent Fluentd/Fluent-ui hard-coded password5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000810.04CVE-2020-21514
2SourceCodester E-Commerce System setDiscount.php sql injection6.66.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.06CVE-2023-1505
3Zoom Client for IT toctou7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.03CVE-2023-22883
4Google Chrome Browser History heap-based overflow5.55.3$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002680.00CVE-2023-1820
5Google Chrome WebShare Remote Code Execution6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001600.04CVE-2023-1821
6D-Link Go-RT-AC750 soapcgi.main command injection7.67.5$5k-$25k$5k-$25kNot DefinedNot Defined0.006450.04CVE-2023-26822
7Convert To Pipeline Plugin Freestyle Project Configuration code injection7.67.6$0-$5k$0-$5kNot DefinedNot Defined0.001770.00CVE-2023-28677
8Keycloak data authenticity5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000650.04CVE-2023-0264
9WellinTech KingHistorian Network Packet SORBAx64.dll signed to unsigned conversion error8.78.6$0-$5k$0-$5kNot DefinedNot Defined0.001900.00CVE-2022-43663
10Adobe Animate stack-based overflow7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.066770.02CVE-2023-22243
11unpoly-rails Gem Header resource consumption5.75.7$0-$5k$0-$5kNot DefinedOfficial Fix0.002820.02CVE-2023-28846
12Twitter Recommendation Algorithm denial of service5.35.2$0-$5k$0-$5kNot DefinedNot Defined0.001110.02CVE-2023-29218
13OTCMS apiRun.php AutoRun cross site scripting4.44.3$0-$5k$0-$5kNot DefinedNot Defined0.000700.03CVE-2023-1635
14OTCMS unrestricted upload7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001190.23CVE-2023-1797
15Huawei EMUI/HarmonyOS WLAN Module permission5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.002210.00CVE-2022-39009
16TP-Link AX1800 Firmware Parser stack-based overflow6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.02CVE-2023-27346
17NoMachine permission6.86.7$0-$5k$0-$5kNot DefinedNot Defined0.000480.03CVE-2022-34043
18sjqzhang go-fastdfs File Upload uploa upload path traversal8.17.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001760.23CVE-2023-1800
19Google Chrome FedCM Privilege Escalation5.55.3$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002060.05CVE-2023-1823
20Google Chrome Intents Remote Code Execution6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002060.00CVE-2023-1817

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
145.76.47.21845.76.47.218.vultr.comMonarchy07/22/2021verifiedMedium
2XXX.XXX.XX.XXXXxxxxxxx07/22/2021verifiedHigh
3XXX.XXX.XXX.XXXxxxxxxxxxxxxxxxxx-xxxxxxx.xxxxxx.xxXxxxxxxx07/22/2021verifiedHigh
4XXX.XXX.XXX.XXXXxxxxxxx07/22/2021verifiedHigh

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (14)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/ecommerce/admin/settings/setDiscount.phppredictiveHigh
2File/group1/uploapredictiveHigh
3FileapiRun.phppredictiveMedium
4Filexxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
5Filexxxxxxx.xxxxpredictiveMedium
6Filexxxxxxxxxxxx.xxx?xxxx=xxxpredictiveHigh
7Libraryxxxxxxxx.xxxpredictiveMedium
8ArgumentxxpredictiveLow
9ArgumentxxxxpredictiveLow
10ArgumentxxpredictiveLow
11ArgumentxxxxxxxpredictiveLow
12ArgumentxxxpredictiveLow
13Argumentx-xx-xxxxxxxxpredictiveHigh
14Input Valuexxxxxx xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)predictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!