PennyWise Stealer Analysis

IOB - Indicator of Behavior (90)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en60
de14
ru8
it4
fr2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us70
ru16
gb2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Tiki Wiki CMS Groupware6
SeedDMS4
Ajax Load More Plugin2
Tiki2
HPE OneView Global Dashboard2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Joomla CMS com_easyblog sql injection6.36.1$5k-$25k$5k-$25kNot DefinedNot Defined0.000000.39
2Tiki Admin Password tiki-login.php improper authentication8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009363.50CVE-2020-15906
3LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.000006.55
4Openads adclick.php Remote Code Execution7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.018710.33CVE-2007-2046
5Discuz UCenter Home shop.php sql injection7.37.1$0-$5k$0-$5kHighUnavailable0.000640.00CVE-2010-4912
6SourceCodester Employee and Visitor Gate Pass Logging System GET Parameter view_designation.php sql injection7.16.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.002200.06CVE-2023-2090
7jforum User input validation5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.002890.03CVE-2019-7550
8Tiki Wiki CMS Groupware cross site scripting5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.000790.04CVE-2016-7394
9Tiki Wiki CMS Groupware tiki-jsplugin.php input validation8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.026750.05CVE-2010-4239
10Tiki Wiki CMS Groupware tiki-adminusers.php cross-site request forgery6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.002110.04CVE-2010-4241
11TikiWiki tiki-register.php input validation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.0107510.00CVE-2006-6168
12real3d-flipbook-lite Plugin flipbooks.php cross site scripting5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.000760.02CVE-2016-10967
13Advanced Poll booth.php path traversal7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.008640.00CVE-2003-1180
14WordPress File meta.php is_protected_meta path traversal6.86.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.003260.00CVE-2020-28039
15Redisson deserialization8.28.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000730.04CVE-2023-42809
16PHPOffice PhpSpreadsheet Encoding securityScan xml injection7.57.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.018530.08CVE-2018-19277
17Fortinet FortiOS fgfmd format string9.89.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000910.07CVE-2024-23113
18cURL tool_cb_wrt.c tool_cb_wrt array index5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.00CVE-2023-52071
19Ubiquiti UniFi OS access control7.27.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.03CVE-2023-31997
20Microsoft Exchange Server Outlook Web Access logon.aspx server-side request forgery7.97.9$5k-$25k$5k-$25kNot DefinedNot Defined0.005160.11CVE-2018-16793

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (62)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/maintenance/view_designation.phppredictiveHigh
2File/forum/away.phppredictiveHigh
3File/owa/auth/logon.aspxpredictiveHigh
4File/spip.phppredictiveMedium
5File/wp-admin/admin-ajax.phppredictiveHigh
6Fileaction.phppredictiveMedium
7Fileadclick.phppredictiveMedium
8Fileadmin/partials/ajax/add_field_to_form.phppredictiveHigh
9Filexxxxx.xxxpredictiveMedium
10Filexxx:.xxxpredictiveMedium
11Filexxx/xxx.xxxpredictiveMedium
12Filexxx/xxxxx.xxxpredictiveHigh
13Filexxxxx.xxxpredictiveMedium
14Filexxx.xxxpredictiveLow
15Filexxx.xxxpredictiveLow
16Filexxxxxx.xxxpredictiveMedium
17Filexxxxxxxxxx.xxxpredictiveHigh
18Filexxxxx.xxxpredictiveMedium
19Filexxxxxx.xxxpredictiveMedium
20Filexxx/xxxxxxxxx/xx_xxxxxx_xxx.xpredictiveHigh
21Filexxx.xxxxxx.xxxpredictiveHigh
22Filexxxx.xxxpredictiveMedium
23Filexxxxxx/xx_xxxxxx_xxxxxx/xxxxx/xxxxx.xxxpredictiveHigh
24Filexxxxxxx.xxxpredictiveMedium
25Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveHigh
26Filexxxxx\xxxx.xxxpredictiveHigh
27Filexxxx.xxxpredictiveMedium
28Filexxx/xxxx_xx_xxx.xpredictiveHigh
29Filexxxxxxx_xxxxxx.xxxpredictiveHigh
30Filexxxx-xxxxxxxxxx.xxxpredictiveHigh
31Filexxxx-xxxxxxxx.xxxpredictiveHigh
32Filexxxx-xxxxx.xxxpredictiveHigh
33Filexxxx-xxxxxxxx.xxxpredictiveHigh
34Filexxxxxxxxxx.xxxpredictiveHigh
35Filexx-xxxxx/xxxxxxx-xxxxxxx.xxxpredictiveHigh
36Filexx-xxxxx/xxxxxxx-xxxxxxx.xxx?xxxx=xxxxx-xxxxx-xxxxxxxxpredictiveHigh
37Filexx-xxxxxxx/xxxxxxx/xxxxxx-xxxxxxxx/xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
38Filexx-xxxxxxxx/xxxx.xxxpredictiveHigh
39ArgumentxxxxpredictiveLow
40ArgumentxxxxxxpredictiveLow
41ArgumentxxxxxpredictiveLow
42ArgumentxxxpredictiveLow
43ArgumentxxxxxxpredictiveLow
44ArgumentxxxxpredictiveLow
45ArgumentxxxxpredictiveLow
46Argumentxxxxx_xxxx/xxxxx_xxx/xxxxx_xxxx/xxxx_xxpredictiveHigh
47ArgumentxxxxpredictiveLow
48Argumentxx_xxpredictiveLow
49ArgumentxxxxxxxxxxpredictiveMedium
50ArgumentxxpredictiveLow
51Argumentxxxxxxx_xxxxpredictiveMedium
52ArgumentxxxxxxxxpredictiveMedium
53ArgumentxxxxpredictiveLow
54ArgumentxxxxxxxxpredictiveMedium
55ArgumentxxxxxxxxpredictiveMedium
56ArgumentxxxxxxpredictiveLow
57ArgumentxxxxpredictiveLow
58ArgumentxxxpredictiveLow
59ArgumentxxxxxxxxxxxpredictiveMedium
60ArgumentxxxpredictiveLow
61Argumentxxxxxx/xxxxpredictiveMedium
62ArgumentxxxxxxxxpredictiveMedium

References (6)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!