Skip to main content

ThreatFox IOCs for 2022-05-10

Medium
Published: Tue May 10 2022 (05/10/2022, 00:00:00 UTC)
Source: MISP

Description

ThreatFox IOCs for 2022-05-10

AI-Powered Analysis

AILast updated: 06/17/2025, 10:34:41 UTC

Technical Analysis

The provided information pertains to a ThreatFox Indicator of Compromise (IOC) report dated May 10, 2022. ThreatFox is a platform that aggregates and shares threat intelligence, particularly IOCs, to assist cybersecurity professionals in identifying and mitigating threats. However, this specific entry lacks detailed technical information such as affected software versions, vulnerability descriptions, attack vectors, or exploit mechanisms. The threat type is marked as 'unknown,' and no Common Weakness Enumerations (CWEs) or patch links are provided. The severity is classified as 'medium' by the source, with a threat level of 2 (on an unspecified scale), analysis level of 1, and distribution level of 3, indicating moderate confidence and moderate dissemination of the threat intelligence. No known exploits are reported in the wild, and no specific indicators (such as IP addresses, hashes, or domains) are included. The tags indicate that the data is derived from open-source intelligence (OSINT) and is shared under a TLP:WHITE classification, meaning it is intended for unrestricted sharing. Overall, this entry appears to be a general IOC update without actionable technical details or direct evidence of active exploitation, limiting the ability to perform a deep technical analysis or identify specific attack methodologies.

Potential Impact

Given the absence of detailed technical data, affected systems, or exploit mechanisms, the potential impact on European organizations is difficult to quantify precisely. However, the medium severity rating suggests a moderate risk level, possibly indicating the presence of IOCs related to emerging or low-confidence threats. Without known exploits in the wild or specific targeted vulnerabilities, the immediate risk to confidentiality, integrity, or availability is likely limited. Nevertheless, European organizations should remain vigilant, as the dissemination of IOCs can precede active exploitation or be indicative of reconnaissance activities. The lack of detailed indicators reduces the ability to perform targeted detection or response, potentially increasing the window of exposure if the threat evolves. The impact may be more pronounced in sectors that rely heavily on threat intelligence sharing and rapid IOC integration, such as finance, critical infrastructure, and government agencies.

Mitigation Recommendations

1. Enhance Threat Intelligence Integration: European organizations should ensure their security operations centers (SOCs) and security information and event management (SIEM) systems are configured to ingest and correlate ThreatFox IOC feeds promptly, even when details are sparse, to maintain situational awareness. 2. Proactive Hunting: Conduct proactive threat hunting exercises focusing on anomalous behaviors or artifacts that may align with emerging IOCs, despite the lack of explicit indicators. 3. Strengthen Baseline Security Controls: Maintain robust endpoint detection and response (EDR) solutions, network segmentation, and strict access controls to limit potential lateral movement should an unknown threat materialize. 4. Collaboration and Information Sharing: Engage with European cybersecurity information sharing organizations (e.g., ENISA, national CERTs) to receive updated intelligence and contextual analysis that may supplement the limited data. 5. Continuous Monitoring and Patch Management: Although no patches are linked, organizations should continue rigorous patch management and vulnerability scanning to reduce the attack surface for potential future exploitation related to these or other threats. 6. User Awareness: Reinforce user training to recognize phishing or social engineering attempts that often accompany the deployment of new threats, even if not explicitly mentioned here.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
1
Distribution
3

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://194.87.216.73/defaultdledownloadstemporary.php
DCRat botnet C2 (confidence level: 100%)
urlhttp://185.81.157.210:3681/vre
Vjw0rm botnet C2 (confidence level: 100%)
urlhttp://sempersim.su/gf11/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 100%)
urlhttp://sempersim.su/gf19/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 100%)
urlhttp://85.202.169.159/romas/inc/02d1f9874469a3.php
Agent Tesla botnet C2 (confidence level: 100%)
urlhttps://www.ausvanlines.com.au/cloudflare/index.php
Azorult botnet C2 (confidence level: 75%)
urlhttp://198.187.30.47/p.php?id=21890394437660420
Loki Password Stealer (PWS) botnet C2 (confidence level: 75%)
urlhttp://45.133.1.41/wsp/inc/6cba382c58c057.php
Agent Tesla botnet C2 (confidence level: 100%)
urlhttp://sempersim.su/gf20/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 100%)
urlhttp://103.167.92.57/365space/vbc.exe
Formbook payload delivery URL (confidence level: 100%)
urlhttps://cdn.discordapp.com/attachments/972107891119128650/973468812643016714/jjetdn_ocxqkrdc.bmp
Formbook payload delivery URL (confidence level: 100%)
urlhttp://hyatqfuh9olahvxf.ml/subject/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 75%)
urlhttp://sempersim.su/gf21/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 75%)
urlhttp://194.147.140.230:10101/vre
Vjw0rm botnet C2 (confidence level: 100%)
urlhttp://players32.top
Hydra botnet C2 (confidence level: 80%)
urlhttp://sempersim.su/gf17/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 100%)
urlhttp://aboyox.xyz/aboy/five/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 75%)
urlhttp://27.215.209.191:44408/mozi.m
Mozi payload delivery URL (confidence level: 50%)
urlhttp://62.197.136.176/healthtwo/five/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 75%)
urlhttps://www.yuuh88t.com/jquery-3.3.1.min.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://45.64.184.207/jquery-3.3.1.min.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://129.226.100.175/ie9compatviewlist.xml
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://104.225.155.181:8081/cx
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://172.245.119.75/365space/winlog.exe
Loki Password Stealer (PWS) payload delivery URL (confidence level: 100%)
urlhttp://46.4.198.55/10p/book.ps1
Formbook payload delivery URL (confidence level: 100%)
urlhttp://46.4.198.55/10p/sursdepa.vbs
Formbook payload delivery URL (confidence level: 100%)
urlhttps://1.14.74.61/cm
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://travcharles.duia.ro
Vjw0rm botnet C2 (confidence level: 100%)
urlhttp://joshkelly.club/file/kc/five/fre.php
Loki Password Stealer (PWS) botnet C2 (confidence level: 100%)
urlhttp://92.63.103.35/localvm8/geotraffic/_cpurequest/api8vmpublic/7mariadbpoll4/localupdate/5/pipeauth/externalflowerjs/8/pythonmulti/wordpresssql3datalife/apiimageprivate/datalifeauthpython/wppipe0/flower/voiddbuniversal/httplinuxvoiddbcdn/defaultuploads.php
DCRat botnet C2 (confidence level: 100%)
urlhttps://textbin.net/raw/6bdsyjbhwt
AsyncRAT payload delivery URL (confidence level: 50%)
urlhttps://sahlonline.com/0f6eazywlul/lkmn.png
QakBot payload delivery URL (confidence level: 100%)
urlhttps://faproadvisors.com/vtfldjvyf5g/lkmn.png
QakBot payload delivery URL (confidence level: 100%)
urlhttps://truckmate.org/pd6tap7cso/lkmn.png
QakBot payload delivery URL (confidence level: 100%)
urlhttp://80.87.201.178/universalpipe9temporary/pollprivatehttp/7secure2wp/multidblow/processmultitestwplocal.php
DCRat botnet C2 (confidence level: 100%)
urlhttp://164.92.146.31:8080/en_us/all.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://45.9.20.141/dot.gif
Cobalt Strike botnet C2 (confidence level: 100%)

Ip dst|port

ValueDescriptionCopy
ip-dst|port194.9.71.111|81
RedLine Stealer botnet C2 server (confidence level: 100%)
ip-dst|port198.44.237.131|8081
NetWire RC botnet C2 server (confidence level: 100%)
ip-dst|port51.210.80.98|6969
Mirai botnet C2 server (confidence level: 75%)
ip-dst|port23.227.196.162|7456
STRRAT botnet C2 server (confidence level: 100%)
ip-dst|port37.0.11.6|1515
Nanocore RAT botnet C2 server (confidence level: 75%)
ip-dst|port178.23.190.51|9987
Mirai botnet C2 server (confidence level: 75%)
ip-dst|port5.182.210.145|158
Bashlite botnet C2 server (confidence level: 75%)
ip-dst|port202.103.212.140|20000
Ghost RAT botnet C2 server (confidence level: 75%)
ip-dst|port154.23.191.157|5896
Ghost RAT payload delivery server (confidence level: 75%)
ip-dst|port193.178.210.87|9987
Mirai botnet C2 server (confidence level: 100%)
ip-dst|port77.91.101.249|9987
Mirai botnet C2 server (confidence level: 100%)
ip-dst|port146.19.75.41|9987
Mirai botnet C2 server (confidence level: 100%)
ip-dst|port77.91.72.39|9987
Mirai botnet C2 server (confidence level: 100%)
ip-dst|port194.156.98.67|9987
Mirai botnet C2 server (confidence level: 100%)
ip-dst|port178.23.190.52|9987
Mirai botnet C2 server (confidence level: 100%)
ip-dst|port194.156.98.43|9987
Mirai botnet C2 server (confidence level: 100%)
ip-dst|port185.140.53.3|31789
Nanocore RAT botnet C2 server (confidence level: 100%)
ip-dst|port192.30.89.27|29843
AsyncRAT botnet C2 server (confidence level: 100%)
ip-dst|port45.147.230.150|80
IcedID Downloader botnet C2 server (confidence level: 75%)
ip-dst|port144.217.60.57|80
IcedID Downloader botnet C2 server (confidence level: 75%)
ip-dst|port164.92.90.52|80
IcedID Downloader botnet C2 server (confidence level: 75%)
ip-dst|port167.114.48.59|80
IcedID Downloader botnet C2 server (confidence level: 75%)
ip-dst|port51.158.187.34|9375
Mirai botnet C2 server (confidence level: 75%)
ip-dst|port156.223.215.205|1234
BitRAT botnet C2 server (confidence level: 100%)
ip-dst|port45.64.184.207|443
Cobalt Strike botnet C2 server (confidence level: 100%)
ip-dst|port129.226.100.175|80
Cobalt Strike botnet C2 server (confidence level: 100%)
ip-dst|port212.192.246.110|5555
Mirai botnet C2 server (confidence level: 75%)
ip-dst|port184.75.223.235|3811
Nanocore RAT botnet C2 server (confidence level: 100%)
ip-dst|port156.212.252.55|9999
NjRAT botnet C2 server (confidence level: 100%)
ip-dst|port193.233.48.58|43014
RedLine Stealer botnet C2 server (confidence level: 100%)
ip-dst|port1.14.74.61|443
Cobalt Strike botnet C2 server (confidence level: 100%)
ip-dst|port103.136.41.110|6525
Bashlite botnet C2 server (confidence level: 75%)
ip-dst|port66.154.111.120|1998
Ave Maria botnet C2 server (confidence level: 100%)
ip-dst|port91.109.188.10|6606
AsyncRAT botnet C2 server (confidence level: 100%)
ip-dst|port146.70.106.92|443
BumbleBee botnet C2 server (confidence level: 75%)
ip-dst|port51.83.253.244|443
BumbleBee botnet C2 server (confidence level: 75%)
ip-dst|port154.56.0.218|443
BumbleBee botnet C2 server (confidence level: 75%)
ip-dst|port137.184.237.83|1312
Mirai botnet C2 server (confidence level: 75%)
ip-dst|port141.255.144.172|5553
NjRAT botnet C2 server (confidence level: 100%)
ip-dst|port162.243.161.74|1312
Mirai botnet C2 server (confidence level: 75%)
ip-dst|port172.67.139.94|443
Cobalt Strike botnet C2 server (confidence level: 100%)
ip-dst|port164.92.146.31|8080
Cobalt Strike botnet C2 server (confidence level: 100%)
ip-dst|port5.252.23.20|443
NjRAT botnet C2 server (confidence level: 100%)
ip-dst|port164.92.90.52|443
IcedID botnet C2 server (confidence level: 75%)
ip-dst|port144.217.60.57|443
IcedID botnet C2 server (confidence level: 75%)
ip-dst|port51.89.190.220|443
IcedID botnet C2 server (confidence level: 75%)
ip-dst|port5.199.162.123|443
IcedID botnet C2 server (confidence level: 75%)
ip-dst|port141.95.111.39|1312
Mirai botnet C2 server (confidence level: 75%)
ip-dst|port51.210.80.99|6969
Mirai botnet C2 server (confidence level: 75%)

Hash

ValueDescriptionCopy
hash5aa98174bd302b5cd08f4932b9a41a9586726bb40571b90bd82325039a7a8b51
Emotet payload (confidence level: 100%)
hash20c703846da825710e52f27da7af48cb172e032022b18bb77609547b94ca740f
AsyncRAT payload (confidence level: 50%)
hash3f7fde411098899ab3e60d50455c7e7f633dac039124926052ab559beaf0de7e
Magniber payload (confidence level: 50%)
hash05dec77dbc765b43d3b969146da92bb6
Coinminer payload (confidence level: 50%)

Domain

ValueDescriptionCopy
domainnishabii.live
Ghost RAT botnet C2 domain (confidence level: 100%)
domaindota.zzzsleepisnicezzz.art
Mirai botnet C2 domain (confidence level: 100%)
domaindota.iwishiwashappy.eu
Mirai botnet C2 domain (confidence level: 100%)
domaindota.uiasuibasdbui.art
Mirai botnet C2 domain (confidence level: 100%)
domainzzzsleepisnicezzz.art
Mirai botnet C2 domain (confidence level: 100%)
domainiwishiwashappy.eu
Mirai botnet C2 domain (confidence level: 100%)
domainuiasuibasdbui.art
Mirai botnet C2 domain (confidence level: 100%)
domainmanagmentoria.com
Cutwail botnet C2 domain (confidence level: 75%)

Threat ID: 6828eab9e1a0c275ea6e2d2c

Added to database: 5/17/2025, 7:59:53 PM

Last enriched: 6/17/2025, 10:34:41 AM

Last updated: 8/17/2025, 5:29:59 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats