SpyBanker Analysis

IOB - Indicator of Behavior (30)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en20
de6
ru4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

ru14
us14

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

CKFinder4
EMSigner2
AWStats2
OpenX2
Oracle Siebel CRM2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1AWStats Config awstats.pl cross site scripting4.34.1$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005870.06CVE-2006-3681
2Citrix NetScaler ADC/NetScaler Gateway OpenID openid-configuration ns_aaa_oauthrp_send_openid_config CitrixBleed memory corruption8.38.2$25k-$100k$0-$5kHighOfficial Fix0.966100.00CVE-2023-4966
3CKFinder Documentation Content Sniffing information disclosure6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000840.04CVE-2019-15891
4CKFinder File Name unrestricted upload7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.001550.05CVE-2019-15862
5yiisoft yii unserialize deserialization7.87.8$0-$5k$0-$5kNot DefinedOfficial Fix0.003780.04CVE-2023-47130
6Moment.js path traversal6.96.7$0-$5k$0-$5kNot DefinedOfficial Fix0.003300.09CVE-2022-24785
7DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.73CVE-2010-0966
8Oracle Siebel CRM UI Framework cross site scripting6.15.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.002220.00CVE-2022-31160
9CKeditor4 cross site scripting5.25.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000520.05CVE-2024-24816
10Yii Yii2 path traversal7.67.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000910.00CVE-2015-5467
11nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002411.79CVE-2020-12440
12Yii Yii2 Gii cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000560.03CVE-2022-34297
13BusyBox xfuncs_printf.c xasprintf use after free5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2023-42363
14OpenX adclick.php redirect5.34.7$0-$5k$0-$5kUnprovenUnavailable0.004400.23CVE-2014-2230
15EMSigner resource injection6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.000490.00CVE-2023-43900
16SmartWeb Infotech Job Board My Profile Page account unrestricted upload7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000910.12CVE-2023-3504
17FreeBSD Ping pr_pack stack-based overflow7.37.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.00CVE-2022-23093

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
179.137.205.212Zugzwangwork9.aeza.networkSpyBanker01/28/2024verifiedHigh
2XX.XX.XXX.XXXxxxxxxxx09/23/2023verifiedHigh
3XXX.XXX.XX.XXXxxxxxxxx01/22/2024verifiedHigh
4XXX.XXX.XX.XXXxxx.xxxxx.xxXxxxxxxxx01/25/2024verifiedHigh

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (13)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/oauth/idp/.well-known/openid-configurationpredictiveHigh
2File/settings/accountpredictiveHigh
3Filexxxxxxx.xxxpredictiveMedium
4Filexxxxxxx.xxpredictiveMedium
5Filexxx/xxxxxx.xxxpredictiveHigh
6Filexxxxxx_xxxxxx.xpredictiveHigh
7ArgumentxxxpredictiveLow
8ArgumentxxxxxxxxpredictiveMedium
9ArgumentxxxxxxpredictiveLow
10ArgumentxxxxpredictiveLow
11Argumentxxxxxxxxxx/xxxxxxxxxxxxxxxxxxxpredictiveHigh
12ArgumentxxxxxxxxpredictiveMedium
13ArgumentxxxxpredictiveLow

References (4)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!