FunkyBot Analysis

IOB - Indicator of Behavior (53)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

zh32
en22

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

cn38
us16

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Dropbear10
BusyBox8
Matt Johnston Dropbear SSH Server4
Dropbear SSH4
Vivotek FD81362

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaround0.020160.00CVE-2007-1192
2Dropbear information disclosure3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000840.04CVE-2019-12953
3Mofi Network MOFI4500-4GXeLTE Dropbear SSH Daemon rom access control7.67.6$0-$5k$0-$5kNot DefinedOfficial Fix0.002250.00CVE-2020-15833
4Dropbear Filename scp.c Privilege Escalation6.86.5$0-$5k$0-$5kNot DefinedOfficial Fix0.002220.04CVE-2020-36254
5Apache RocketMQ Update Configuration code injection8.08.0$5k-$25k$5k-$25kHighNot Defined0.972850.00CVE-2023-33246
6Apache Tomcat Form Authentication Example cross site scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001090.04CVE-2022-34305
7BusyBox awk Applet use after free5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.002360.00CVE-2021-42386
8Vivotek FD8136 Busybox/wget command injection8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.003270.03CVE-2018-14494
9BusyBox gzip Data decompress_gunzip.c huft_build exceptional condition5.35.3$0-$5k$0-$5kNot DefinedOfficial Fix0.007670.04CVE-2021-28831
10BusyBox man Applet null pointer dereference5.55.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2021-42373
11BusyBox unlzma Applet out-of-bounds7.37.2$0-$5k$0-$5kNot DefinedOfficial Fix0.001230.03CVE-2021-42374
12BusyBox ash Applet denial of service5.55.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2021-42375
13BusyBox netstat Privilege Escalation6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.011320.06CVE-2022-28391
14BusyBox awk Applet copyvar use after free5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000670.04CVE-2022-30065
15Hikvision Hybrid SAN Web Module os command injection8.28.1$0-$5k$0-$5kNot DefinedOfficial Fix0.267700.00CVE-2022-28171
16Matt Johnston Dropbear SSH Server resource management9.99.9$0-$5k$0-$5kNot DefinedNot Defined0.010320.02CVE-2012-0920
17Dropbear SSH Shell Command Restriction crlf injection6.36.0$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.028350.04CVE-2016-3116
18Dropbear SSH dropbearconvert input validation8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009560.04CVE-2016-7407
19Dropbear SSH dbclient access control7.16.8$0-$5k$0-$5kNot DefinedOfficial Fix0.009400.03CVE-2016-7408
20Dropbear SSH dbclient/server Memory information disclosure4.44.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.04CVE-2016-7409

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
16.43.51.17FunkyBot09/05/2019verifiedHigh
2XXX.XX.XXX.XXXxxx.xx.xxx.xxx.xxxxxxxxxxxxxxxx.xxxXxxxxxxx09/05/2019verifiedHigh
3XXX.XX.XX.XXXXxxxxxxx09/05/2019verifiedHigh

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (21)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/.ssh/authorized_keyspredictiveHigh
2File/rompredictiveLow
3Filedata/gbconfiguration.datpredictiveHigh
4Filexxxxxxxxxx_xxxxxx.xpredictiveHigh
5Filexxxxx.xxxpredictiveMedium
6Filexxxxxxx/xxxx.xxxxx.xxxpredictiveHigh
7Filexxx_xxxx.xxxpredictiveMedium
8Filexxx.xpredictiveLow
9Filexxxx_xxxxxxx.xpredictiveHigh
10Filexxx-xxxx.xpredictiveMedium
11Filexxxxxx.xxxpredictiveMedium
12Argument$xxxxxxxpredictiveMedium
13Argument-x/-xpredictiveLow
14Argument-xpredictiveLow
15ArgumentxxxxxxxpredictiveLow
16ArgumentxxxxpredictiveLow
17ArgumentxxxxxxpredictiveLow
18Argumentxxxxxxxx/xxxxpredictiveHigh
19Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
20Input Valuexxxx:xxxxxxpredictiveMedium
21Network Portxxx/xx (xxx)predictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!