OnionDog Analysis

IOB - Indicator of Behavior (54)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en52
ko2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

kr36
us18

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

D-Link DIR-850L6
Google Android6
Linux Kernel4
Microsoft Windows4
Mobile App Native Plugin2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Adobe Acrobat Reader Image Conversion out-of-bounds write7.57.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.019710.00CVE-2018-4916
2Huawei HG8245H URL information disclosure7.47.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.001670.04CVE-2017-15328
3Google Chrome v8 code injection7.57.1$25k-$100k$0-$5kProof-of-ConceptNot Defined0.235640.00CVE-2016-9651
4CPU Speculative Execution Meltdown information disclosure6.15.8$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.973840.04CVE-2017-5754
5Mozilla Firefox WebRTC privileges management5.34.6$25k-$100k$0-$5kUnprovenOfficial Fix0.004610.00CVE-2014-1586
6Nexacro rename access control7.77.6$0-$5k$0-$5kNot DefinedNot Defined0.000730.04CVE-2021-26613
7Tobesoft NEXACRO17 execDefaultBrowser input validation7.77.6$0-$5k$0-$5kNot DefinedNot Defined0.005280.00CVE-2021-26607
8JetBrains IntelliJ IDEA Privilege Escalation6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.002210.04CVE-2021-45977
9Oracle Communications Network Charging and Control Common denial of service7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.002540.00CVE-2022-35737
10TeamViewer TVS File Parser out-of-bounds7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.001840.00CVE-2021-34858
11logback Configuration File deserialization5.35.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.015550.00CVE-2021-42550
12Combodo iTop Configuration File input validation7.27.2$0-$5k$0-$5kNot DefinedNot Defined0.006440.09CVE-2019-11215
13Artifex MuPDF PDF File pdf-xref.c pdf_read_new_xref memory corruption5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.002690.00CVE-2018-6192
14VMware ESXi/Workstation/Fusion SVGA out-of-bounds7.57.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000770.05CVE-2018-6974
15PHP 404 Error Page phar_object.c Reflected cross site scripting5.25.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.037880.05CVE-2018-10547
16CPUID CPU-Z Kernel-Mode Driver out-of-bounds write6.56.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.02CVE-2017-15303
17Microsoft Access memory corruption7.06.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.292790.04CVE-2018-0903
18Wind River VxWorks TCP Initial Sequence Number input validation5.65.4$0-$5k$0-$5kNot DefinedOfficial Fix0.023700.05CVE-2015-3963
19Oracle VM VirtualBox access control8.68.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000820.00CVE-2018-2690
20Adobe Flash Player out-of-bounds6.96.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.005690.05CVE-2018-4871

IOC - Indicator of Compromise (10)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (15)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/proc/<pid>/statuspredictiveHigh
2File/var/passwdpredictiveMedium
3Fileext/phar/phar_object.cpredictiveHigh
4Filexxxxxx/xxx/xxxxxxx.xxxpredictiveHigh
5Filexxxxxx/xxxxxx/xxxx.xpredictiveHigh
6Filexxxx.xxxpredictiveMedium
7Filexxxxxxxxx/xxxxx.xxxpredictiveHigh
8Filexxx/xxx-xxxx.xpredictiveHigh
9Filexxxx.xxxpredictiveMedium
10ArgumentxxxxxxpredictiveLow
11Argumentxxxxxxx_xpredictiveMedium
12ArgumentxxpredictiveLow
13ArgumentxxxxxxxxpredictiveMedium
14Input Valuexxxxxxx_xxxxx.xxxxxxx_xxxxxxxpredictiveHigh
15Network Portxxx/xx (xxxxxx)predictiveHigh

References (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!