ThreatFox IOCs for 2022-09-22
ThreatFox IOCs for 2022-09-22
AI Analysis
Technical Summary
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on September 22, 2022, categorized under malware and OSINT (Open Source Intelligence). The data appears to be a collection of threat intelligence indicators rather than a specific malware sample or exploit targeting a particular software product or version. The threat is tagged as 'type:osint' and 'tlp:white', indicating that the information is openly shareable and intended for broad dissemination. The technical details show a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, suggesting moderate distribution but limited analysis depth. There are no affected versions or specific vulnerabilities listed, no known exploits in the wild, and no patch links provided. The absence of concrete technical indicators such as CVEs, attack vectors, or malware behavior limits the ability to perform a detailed technical dissection. Essentially, this entry serves as a repository or snapshot of threat intelligence indicators collected or observed on the given date, useful for situational awareness and correlation in threat hunting activities rather than representing an active or novel threat vector.
Potential Impact
Given the nature of this entry as a collection of OSINT-based IOCs without direct association to a specific exploit or malware campaign, the immediate impact on European organizations is limited. However, the presence of these IOCs in threat intelligence feeds can aid defenders in identifying potential malicious activity if these indicators are observed within their networks. The medium severity rating suggests that while the threat itself may not be critical, it could be part of broader reconnaissance or preparatory phases of cyberattacks. European organizations that rely heavily on threat intelligence for proactive defense may find value in integrating these IOCs into their detection systems. The lack of known exploits in the wild and absence of targeted affected products reduces the likelihood of immediate compromise. Nonetheless, failure to monitor and correlate such intelligence could result in missed early warnings of emerging threats.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities. 2. Regularly update threat intelligence feeds and ensure that analysts review OSINT-derived indicators for relevance and false positives. 3. Conduct network and endpoint scans to identify any matches with the IOCs, enabling early containment. 4. Maintain robust incident response procedures to investigate alerts triggered by these indicators promptly. 5. Enhance staff training on recognizing signs of reconnaissance and early-stage intrusion activities that may correlate with these IOCs. 6. Collaborate with information sharing communities to contextualize these indicators within broader threat trends. 7. Since no patches or specific vulnerabilities are associated, focus on general cybersecurity hygiene, including timely updates, least privilege access, and network segmentation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
Indicators of Compromise
- url: http://117.195.93.210:59072/mozi.m
- url: http://45.8.145.203/
- url: https://84.32.188.232:444/ie9compatviewlist.xml
- url: https://45.32.100.98/dot.gif
- file: 45.32.100.98
- hash: 443
- url: https://dcuj1gece5t28.cloudfront.net/safebrowsing/utzocpdlc/lmmt3yw6kq86l2-ydwl8cd9bif-c3spqx3
- url: https://d2u9rmrrifg8yn.cloudfront.net/safebrowsing/utzocpdlc/lmmt3yw6kq86l2-ydwl8cd9bif-c3spqx3
- file: 137.184.224.141
- hash: 443
- url: http://3.238.186.201/owa/klu1whaevo2ntykjx8ymezya0w5x0nh
- file: 3.238.186.201
- hash: 80
- url: https://61c29c85405f0792.azureedge.net/safebrowsing/bejow-uc/ppjkqkru254uyhitedgse5
- url: https://didgwf4758vpk.cloudfront.net/safebrowsing/bejow-uc/ppjkqkru254uyhitedgse5
- url: https://1bb1393a0054ca93.azureedge.net/safebrowsing/bejow-uc/ppjkqkru254uyhitedgse5
- file: 137.184.12.101
- hash: 443
- hash: 9a9f97730428c5ebf9993dcbf5facd3710859edc5636fc9a84cac75072cf7e5e
- hash: 7f1ba4a87aaa62acbd2282165a1d8a8f3788dd6917c5edce645fca58a447bfc4
- hash: 670d9506447810496c9bbea0bcbb8b66aec996c52535f3cc343452d4318dce80
- hash: b35a514d0b7a7c836bcd45f6da69bb4b139849db7ddae8110500db97c3251b18
- hash: 20aaa74f3edd79336be135134482da2d1ab627fe90a4606869870b0c9bd7bde0
- hash: 77b7758c451f9937848e83eb12fdfae2b7e555fba1e2c3816170fefe87439e23
- hash: 1bb6c683b522c24df205a6a172c7c22a8980d8053f033ccd436456c7c852a69d
- hash: bd4fea117a02c696dfe0569ae5493b91f6708da188cb314e671bf39ee6361c37
- hash: 2ee080450a727d2484e2fd49ca94328c63befbe83113838f293379f4709cfc11
- hash: f3d6eb3da9b43c86b6610370d64e086c2af8d8511a4f05862e4ea312fb0211ca
- hash: 3b15c4b70c129e787422670b475613b15b70c73565445c7f7de89debaa7340f0
- hash: 7fa94a5ecff6dd8cadd53c76853da529da322fef102f23b1b09f335238c31dfd
- hash: 53a95222b2d47e3b44240183d0eafbc7f64bcbd88bbe61af3580ab00c5f0ff85
- hash: 720d90ad498171d943399e010d4aa16cc65f69bbff6f042d6b364813cfd168bb
- hash: f83628e8db4f7c65ed636e17a1ab69a2b0f14a7e1cf9afca77b682b6d51f8677
- hash: 5e87d1641a172f6d48cff1811254bd74640838bd75aab140c9b6a4c35c35aeec
- hash: 929ce92a6849a9052fd6eb1c92d1bbba866f4a1762839a1714ab23aa90fe2297
- hash: f4c3fea5e9c60cf76e1e16204fbc9f7cb7f63d1d16339fa665f6fc2aab845e39
- hash: 48b8a0489b885816b349cfbd4987202cccb6df63957e024923273215a739a810
- hash: 1d959cf6e366a2217cfef71d9df9e9835c2b1bd7e21b73f345ca621fb05e289e
- hash: 0f86a303ae4c0a7966e66f1f908183f6f1876e56f49de5c1f8ba5d1c2fab195a
- hash: 426e74bf11d78c21fe952b46371f014b7adef3d0c170ca62b69eb7862f67313d
- hash: 93b763cc79cbb7754a028003e6914491da5898c5861ac0de550e2237b53f12c1
- hash: 1b395afd0cdb4552ec57d408686c24f62b4d15d0ef13146468a71cfbda9e55a1
- hash: dde99d2ebadfd99b7ecfa144967b5c9d30aa78679b2bb9425be478bb8f5fea3e
- hash: 28c9311cf58a72d4f23a3abd698c33275a34ff3cbf104680c113dfb4e9d1c5ec
- hash: c6a9aa7e0a62bdbd7ed39273a2e117e8b6efa5c1c535a0a521fa75cb82d0ca95
- hash: cad4f8e97cce74c98356096f153231cf9622da0a534d5a24a3e4ed770d668ac8
- hash: fbb5b909d03d5cb5bb3e8b50280b83f49c7a507277f779e6884fcce7f14de042
- hash: 23037e71ab8a3fdb3cd81c52a11f50e0d72e22703fdff8e05c45eb0ac0fb829b
- hash: bf35e7ee59cf81f74be092d43acbb711377f115426db8e9f6f45fa1bbb3086b7
- hash: 1d20310fec07f4cfd387fca7c5bc9e33f2230aa4e7d73c807c0b5d40394f66c4
- hash: 3f39ee57fa6bebbbade5c9e263939ea1f46e9eea2af49ce3dc6fbd2366f75902
- hash: b886242723bd9c498d27270a8b539c074b47682307b74d2c8cc91007c07bfa28
- hash: 6f65bc7ad58ce2f17dec79d9dda14c31d73587552b72e7d90b5b827c1a80c9c6
- hash: be0aa617cee2a480451d246ea0c2d42fc6aad4f5f473c4b03b920db808a06ebe
- hash: e2b1d28dd8b9d265af6678f588fa67d00e9ff4a96c6978a0aa8742a090436bb5
- hash: 4d231cf9db3176c6d82357c2feec657b8d8cd59cc6d0fb403a5ba243ea023773
- hash: 510c64f55f86258af15ae33481f17ec9868bf4e41a5d21ce630400f0e6fcf7a1
- hash: 9b132f152d0f26835a0e5534c7448838ea908b54acc2b8283f8e1d70c9468580
- hash: b42bb1a0228b29babb878c661662c4aaf8741fb3c8078bc421b700d90800390c
- hash: 197a187ab432614e6baee849387db760d1519980899e1ed6df36b4c062772c65
- hash: 48eda12c59b8c6b6b19dfe8dcc1158f934bb7acbe52c0a5b744b493688e7460a
- url: http://80.92.205.130/
- file: 54.36.15.96
- hash: 6003
- domain: felipeemarlimarketingl.link
- domain: clus.ga
- domain: sophiaemarlibuffetme.link
- domain: yiuahd.sophiaemarlibuffetme.link
- domain: f4iidk.felipeemarlimarketingl.link
- domain: vjur2fho2j3.clus.ga
- domain: assessirianricoadvocacia.cloud
- domain: wraa5f.assessirianricoadvocacia.cloud
- file: 185.214.10.174
- hash: 80
- file: 146.19.233.108
- hash: 80
- file: 45.89.55.118
- hash: 80
- url: https://t.me/loveindiagood
- url: http://107.189.31.171/1340
- url: http://116.203.7.175/924
- url: http://45.89.55.118/
- url: http://146.19.233.108/
- domain: mandingo.dvrlists.com
- url: http://209.127.20.13/boo.jpg
- url: http://209.127.20.13/boop.txt
- hash: 8938f080347aa0b5a42882e6c0262d32323fc6aa75810b2bbbd68467754c1a37
- hash: 110190c8c696f2e357a9445c1ca65a574fff65388d384b859de1a717b651ed7c
- hash: a4406d83070bdc0fbf29e5a81897d969bd1fda8e67e61f2033de4d57e784657d
- hash: 2c4f201b5d5c1a61b803b1ee26ff0d782131e6aea39ab975c0f078c834c26677
- domain: dkbillly.run
- file: 51.103.25.183
- hash: 5552
- file: 45.137.20.4
- hash: 4984
- file: 20.126.95.155
- hash: 7800
- file: 213.252.244.62
- hash: 80
- file: 217.25.91.15
- hash: 80
- file: 5.161.155.121
- hash: 80
- url: http://dixevd32.top/gate.php
- url: http://213.252.244.62/lib/freebl3.dll
- url: http://217.25.91.15/lib/freebl3.dll
- url: http://5.161.155.121/lib/freebl3.dll
- url: http://213.252.244.62/lib/mozglue.dll
- url: http://217.25.91.15/lib/mozglue.dll
- url: http://5.161.155.121/lib/mozglue.dll
- url: http://213.252.244.62/lib/nss3.dll
- url: http://217.25.91.15/lib/nss3.dll
- url: http://5.161.155.121/lib/nss3.dll
- url: http://213.252.244.62/lib/softokn3.dll
- url: http://217.25.91.15/lib/softokn3.dll
- url: http://5.161.155.121/lib/softokn3.dll
- url: http://213.252.244.62/lib/sqlite3.dll
- url: http://217.25.91.15/lib/sqlite3.dll
- url: http://5.161.155.121/lib/sqlite3.dll
- url: http://213.252.244.62/winsock
- url: http://217.25.91.15/winsock
- url: http://5.161.155.121/winsock
- url: http://116.203.7.175/1680
- url: http://huizechina.co/pl341/index.php
- file: 95.182.120.55
- hash: 81
- url: http://47.97.172.5:9988/pixel.gif
- url: https://a.daidu.co/jquery-3.3.1.min.js
- file: 34.92.131.12
- hash: 443
- file: 104.168.9.195
- hash: 8082
- url: https://45.116.166.143/dpixel
- url: http://138.2.87.40:808/j.ad
- url: http://194.163.184.177
- url: http://hayannsidfmosa.shop
- url: https://poomerianskaanwoerld.tk
- file: 185.252.178.48
- hash: 56999
- url: http://167.172.152.136/
- file: 49.51.90.156
- hash: 32323
- file: 85.31.46.207
- hash: 8808
- file: 85.31.46.207
- hash: 6606
- file: 85.31.46.207
- hash: 7707
- file: 159.223.57.212
- hash: 4110
- file: 159.223.57.212
- hash: 8471
- file: 204.76.203.7
- hash: 1337
- hash: 308e04792e9d67d7f35a9437b2ced36a8bcae21d1871ca3e367f7be38eec767d
- hash: 548d26386eec5d6a45acbfc0f518767e977a7378630929f82e659957da525e26
- url: https://fileson.cloud/sync/bu-hkfn9jxpmed8b2dhzg2bwvc
- file: 93.157.86.27
- hash: 443
- url: https://47.242.197.134/dpixel
- file: 47.242.197.134
- hash: 443
- url: http://180.76.128.244/updates.rss
- file: 180.76.128.244
- hash: 80
- url: http://1.14.93.219:1234/activity
- url: https://alexflima.com.br/oscp/
- file: 164.90.141.136
- hash: 443
- url: http://109.107.170.4/cm
- file: 109.107.170.4
- hash: 80
- url: http://114.115.237.107/activity
- file: 114.115.237.107
- hash: 80
- url: http://gwinaz.pro/pl341/index.php
- url: http://bl3ds2.shop/pl341/index.php
- url: http://ichgh.com/mk/index.php
- url: http://winnlinne.com/lancer/get.php
- file: 213.252.246.218
- hash: 80
- url: http://213.252.246.218/
- file: 35.157.111.131
- hash: 12392
- file: 134.35.8.88
- hash: 443
- file: 41.97.152.42
- hash: 443
- file: 41.111.74.35
- hash: 995
- file: 105.156.139.150
- hash: 443
- file: 217.165.68.59
- hash: 993
- file: 111.125.157.230
- hash: 443
- file: 125.25.129.70
- hash: 443
- file: 103.161.174.5
- hash: 3778
- url: http://kelioni.xyz/iremotepanel
- file: 192.64.119.233
- hash: 80
- hash: 6a4ee0ab3240bb566273aa968cea51d4
- hash: d91cfe1a42899f7ba97b820746184cb1
- hash: 6f2ad08514a304c31b1a7ad3cd6b8892
- hash: 3584af4c7ff3061dc605bfc0de9d478d
- hash: 4c241b465dca3cdb136375d91df76180
- hash: a3699c28f0868421d041f295534a8b87
- hash: 9a864a23da20a972ac73fd9bb7fa02a3
- hash: 70cfa5167777582bdeeadb50e056a9a6
- hash: ed2d2389bedce5b1292b4bc0d38a099c
- file: 185.183.35.100
- hash: 44687
- url: http://goods.camdvr.org:2888/moz-sdk
- url: http://goods.camdvr.org:2888/ie
- url: http://goods.camdvr.org:2888/give-me-chpv
- url: http://goods.camdvr.org:2888/give-me-ffpv
- url: http://u1638884.plsk.regruhosting.ru/pipeauthasync.php
- file: 141.255.147.80
- hash: 19444
- url: http://83.220.175.103/line/wordpress/packetautheternaldatalife/vmtestexternaldatalife/geo8/6php/cpu7linux/3protonvoiddb/6multiapi/traffic3python/datalife/0/mariadbsecurelinetraffic/tempasyncupdatecentral/12generator/longpollauth/datalifesql/privatepoll0poll/serverdefaulttrackdle.php
- file: 45.66.248.79
- hash: 443
- file: 176.31.143.96
- hash: 443
- file: 172.93.201.139
- hash: 443
- file: 5.252.177.103
- hash: 443
- file: 5.255.104.143
- hash: 443
- file: 185.16.40.111
- hash: 443
- file: 66.63.188.70
- hash: 443
- file: 103.208.85.95
- hash: 443
- file: 79.110.52.169
- hash: 443
- file: 103.45.66.85
- hash: 8080
- url: https://3.238.186.201/owa/klu1whaevo2ntykjx8ymezya0w5x0nh
- file: 3.238.186.201
- hash: 443
- file: 183.236.2.18
- hash: 1980
- url: http://84.32.188.232/visit.js
- file: 84.32.188.232
- hash: 443
- url: http://91.223.82.29/~septt165/francob/fred.php
- domain: trallfasterinf.com
- domain: antiflamez.bar
- domain: erinindiaka.quest
- domain: considerf.info
- domain: choifejuce.lol
- file: 192.169.69.26
- hash: 1994
- file: 27.72.56.186
- hash: 9782
- file: 185.117.75.208
- hash: 80
- url: http://121.199.25.133:8081/cm
- url: http://121.199.25.133:8081/submit.php
ThreatFox IOCs for 2022-09-22
Description
ThreatFox IOCs for 2022-09-22
AI-Powered Analysis
Technical Analysis
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on September 22, 2022, categorized under malware and OSINT (Open Source Intelligence). The data appears to be a collection of threat intelligence indicators rather than a specific malware sample or exploit targeting a particular software product or version. The threat is tagged as 'type:osint' and 'tlp:white', indicating that the information is openly shareable and intended for broad dissemination. The technical details show a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, suggesting moderate distribution but limited analysis depth. There are no affected versions or specific vulnerabilities listed, no known exploits in the wild, and no patch links provided. The absence of concrete technical indicators such as CVEs, attack vectors, or malware behavior limits the ability to perform a detailed technical dissection. Essentially, this entry serves as a repository or snapshot of threat intelligence indicators collected or observed on the given date, useful for situational awareness and correlation in threat hunting activities rather than representing an active or novel threat vector.
Potential Impact
Given the nature of this entry as a collection of OSINT-based IOCs without direct association to a specific exploit or malware campaign, the immediate impact on European organizations is limited. However, the presence of these IOCs in threat intelligence feeds can aid defenders in identifying potential malicious activity if these indicators are observed within their networks. The medium severity rating suggests that while the threat itself may not be critical, it could be part of broader reconnaissance or preparatory phases of cyberattacks. European organizations that rely heavily on threat intelligence for proactive defense may find value in integrating these IOCs into their detection systems. The lack of known exploits in the wild and absence of targeted affected products reduces the likelihood of immediate compromise. Nonetheless, failure to monitor and correlate such intelligence could result in missed early warnings of emerging threats.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities. 2. Regularly update threat intelligence feeds and ensure that analysts review OSINT-derived indicators for relevance and false positives. 3. Conduct network and endpoint scans to identify any matches with the IOCs, enabling early containment. 4. Maintain robust incident response procedures to investigate alerts triggered by these indicators promptly. 5. Enhance staff training on recognizing signs of reconnaissance and early-stage intrusion activities that may correlate with these IOCs. 6. Collaborate with information sharing communities to contextualize these indicators within broader threat trends. 7. Since no patches or specific vulnerabilities are associated, focus on general cybersecurity hygiene, including timely updates, least privilege access, and network segmentation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 0ac62ccd-8465-4a3f-8df1-c0d89162dd26
- Original Timestamp
- 1663891384
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttp://117.195.93.210:59072/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://45.8.145.203/ | RecordBreaker botnet C2 (confidence level: 100%) | |
urlhttps://84.32.188.232:444/ie9compatviewlist.xml | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://45.32.100.98/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://dcuj1gece5t28.cloudfront.net/safebrowsing/utzocpdlc/lmmt3yw6kq86l2-ydwl8cd9bif-c3spqx3 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://d2u9rmrrifg8yn.cloudfront.net/safebrowsing/utzocpdlc/lmmt3yw6kq86l2-ydwl8cd9bif-c3spqx3 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://3.238.186.201/owa/klu1whaevo2ntykjx8ymezya0w5x0nh | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://61c29c85405f0792.azureedge.net/safebrowsing/bejow-uc/ppjkqkru254uyhitedgse5 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://didgwf4758vpk.cloudfront.net/safebrowsing/bejow-uc/ppjkqkru254uyhitedgse5 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://1bb1393a0054ca93.azureedge.net/safebrowsing/bejow-uc/ppjkqkru254uyhitedgse5 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://80.92.205.130/ | RecordBreaker botnet C2 (confidence level: 100%) | |
urlhttps://t.me/loveindiagood | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://107.189.31.171/1340 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://116.203.7.175/924 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://45.89.55.118/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://146.19.233.108/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://209.127.20.13/boo.jpg | Remcos payload delivery URL (confidence level: 100%) | |
urlhttp://209.127.20.13/boop.txt | Remcos payload delivery URL (confidence level: 100%) | |
urlhttp://dixevd32.top/gate.php | CryptBot botnet C2 (confidence level: 100%) | |
urlhttp://213.252.244.62/lib/freebl3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://217.25.91.15/lib/freebl3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://5.161.155.121/lib/freebl3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://213.252.244.62/lib/mozglue.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://217.25.91.15/lib/mozglue.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://5.161.155.121/lib/mozglue.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://213.252.244.62/lib/nss3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://217.25.91.15/lib/nss3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://5.161.155.121/lib/nss3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://213.252.244.62/lib/softokn3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://217.25.91.15/lib/softokn3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://5.161.155.121/lib/softokn3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://213.252.244.62/lib/sqlite3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://217.25.91.15/lib/sqlite3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://5.161.155.121/lib/sqlite3.dll | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://213.252.244.62/winsock | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://217.25.91.15/winsock | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://5.161.155.121/winsock | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://116.203.7.175/1680 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://huizechina.co/pl341/index.php | Azorult botnet C2 (confidence level: 75%) | |
urlhttp://47.97.172.5:9988/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://a.daidu.co/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://45.116.166.143/dpixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://138.2.87.40:808/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://194.163.184.177 | Alien botnet C2 (confidence level: 80%) | |
urlhttp://hayannsidfmosa.shop | Alien botnet C2 (confidence level: 80%) | |
urlhttps://poomerianskaanwoerld.tk | Alien botnet C2 (confidence level: 80%) | |
urlhttp://167.172.152.136/ | RecordBreaker botnet C2 (confidence level: 100%) | |
urlhttps://fileson.cloud/sync/bu-hkfn9jxpmed8b2dhzg2bwvc | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://47.242.197.134/dpixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://180.76.128.244/updates.rss | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://1.14.93.219:1234/activity | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://alexflima.com.br/oscp/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://109.107.170.4/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://114.115.237.107/activity | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://gwinaz.pro/pl341/index.php | Azorult botnet C2 (confidence level: 75%) | |
urlhttp://bl3ds2.shop/pl341/index.php | Azorult botnet C2 (confidence level: 75%) | |
urlhttp://ichgh.com/mk/index.php | Azorult botnet C2 (confidence level: 75%) | |
urlhttp://winnlinne.com/lancer/get.php | TeamBot botnet C2 (confidence level: 100%) | |
urlhttp://213.252.246.218/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://kelioni.xyz/iremotepanel | RedLine Stealer botnet C2 (confidence level: 100%) | |
urlhttp://goods.camdvr.org:2888/moz-sdk | Houdini botnet C2 (confidence level: 100%) | |
urlhttp://goods.camdvr.org:2888/ie | Houdini botnet C2 (confidence level: 100%) | |
urlhttp://goods.camdvr.org:2888/give-me-chpv | Houdini botnet C2 (confidence level: 100%) | |
urlhttp://goods.camdvr.org:2888/give-me-ffpv | Houdini botnet C2 (confidence level: 100%) | |
urlhttp://u1638884.plsk.regruhosting.ru/pipeauthasync.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://83.220.175.103/line/wordpress/packetautheternaldatalife/vmtestexternaldatalife/geo8/6php/cpu7linux/3protonvoiddb/6multiapi/traffic3python/datalife/0/mariadbsecurelinetraffic/tempasyncupdatecentral/12generator/longpollauth/datalifesql/privatepoll0poll/serverdefaulttrackdle.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://3.238.186.201/owa/klu1whaevo2ntykjx8ymezya0w5x0nh | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://84.32.188.232/visit.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://91.223.82.29/~septt165/francob/fred.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 100%) | |
urlhttp://121.199.25.133:8081/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://121.199.25.133:8081/submit.php | Cobalt Strike botnet C2 (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file45.32.100.98 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file137.184.224.141 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file3.238.186.201 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file137.184.12.101 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file54.36.15.96 | XOR DDoS botnet C2 server (confidence level: 75%) | |
file185.214.10.174 | Vidar botnet C2 server (confidence level: 100%) | |
file146.19.233.108 | Vidar botnet C2 server (confidence level: 100%) | |
file45.89.55.118 | Vidar botnet C2 server (confidence level: 100%) | |
file51.103.25.183 | NjRAT botnet C2 server (confidence level: 100%) | |
file45.137.20.4 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file20.126.95.155 | Ave Maria botnet C2 server (confidence level: 100%) | |
file213.252.244.62 | Lumma Stealer botnet C2 server (confidence level: 100%) | |
file217.25.91.15 | Lumma Stealer botnet C2 server (confidence level: 100%) | |
file5.161.155.121 | Lumma Stealer botnet C2 server (confidence level: 100%) | |
file95.182.120.55 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file34.92.131.12 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file104.168.9.195 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.252.178.48 | Mirai botnet C2 server (confidence level: 75%) | |
file49.51.90.156 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file85.31.46.207 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file85.31.46.207 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file85.31.46.207 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file159.223.57.212 | Ave Maria botnet C2 server (confidence level: 100%) | |
file159.223.57.212 | BitRAT botnet C2 server (confidence level: 100%) | |
file204.76.203.7 | Mirai botnet C2 server (confidence level: 75%) | |
file93.157.86.27 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.242.197.134 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file180.76.128.244 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file164.90.141.136 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file109.107.170.4 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file114.115.237.107 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file213.252.246.218 | Vidar botnet C2 server (confidence level: 100%) | |
file35.157.111.131 | NjRAT botnet C2 server (confidence level: 100%) | |
file134.35.8.88 | QakBot botnet C2 server (confidence level: 100%) | |
file41.97.152.42 | QakBot botnet C2 server (confidence level: 100%) | |
file41.111.74.35 | QakBot botnet C2 server (confidence level: 100%) | |
file105.156.139.150 | QakBot botnet C2 server (confidence level: 100%) | |
file217.165.68.59 | QakBot botnet C2 server (confidence level: 100%) | |
file111.125.157.230 | QakBot botnet C2 server (confidence level: 100%) | |
file125.25.129.70 | QakBot botnet C2 server (confidence level: 100%) | |
file103.161.174.5 | Mirai botnet C2 server (confidence level: 75%) | |
file192.64.119.233 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file185.183.35.100 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file141.255.147.80 | NjRAT botnet C2 server (confidence level: 100%) | |
file45.66.248.79 | IcedID botnet C2 server (confidence level: 75%) | |
file176.31.143.96 | IcedID botnet C2 server (confidence level: 75%) | |
file172.93.201.139 | IcedID botnet C2 server (confidence level: 75%) | |
file5.252.177.103 | IcedID botnet C2 server (confidence level: 75%) | |
file5.255.104.143 | IcedID botnet C2 server (confidence level: 75%) | |
file185.16.40.111 | IcedID botnet C2 server (confidence level: 75%) | |
file66.63.188.70 | IcedID botnet C2 server (confidence level: 75%) | |
file103.208.85.95 | IcedID botnet C2 server (confidence level: 75%) | |
file79.110.52.169 | IcedID botnet C2 server (confidence level: 75%) | |
file103.45.66.85 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file3.238.186.201 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file183.236.2.18 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file84.32.188.232 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file192.169.69.26 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file27.72.56.186 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file185.117.75.208 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9a9f97730428c5ebf9993dcbf5facd3710859edc5636fc9a84cac75072cf7e5e | Agent Tesla payload (confidence level: 100%) | |
hash7f1ba4a87aaa62acbd2282165a1d8a8f3788dd6917c5edce645fca58a447bfc4 | Agent Tesla payload (confidence level: 100%) | |
hash670d9506447810496c9bbea0bcbb8b66aec996c52535f3cc343452d4318dce80 | Agent Tesla payload (confidence level: 100%) | |
hashb35a514d0b7a7c836bcd45f6da69bb4b139849db7ddae8110500db97c3251b18 | Agent Tesla payload (confidence level: 100%) | |
hash20aaa74f3edd79336be135134482da2d1ab627fe90a4606869870b0c9bd7bde0 | Agent Tesla payload (confidence level: 100%) | |
hash77b7758c451f9937848e83eb12fdfae2b7e555fba1e2c3816170fefe87439e23 | Agent Tesla payload (confidence level: 100%) | |
hash1bb6c683b522c24df205a6a172c7c22a8980d8053f033ccd436456c7c852a69d | Agent Tesla payload (confidence level: 100%) | |
hashbd4fea117a02c696dfe0569ae5493b91f6708da188cb314e671bf39ee6361c37 | Agent Tesla payload (confidence level: 100%) | |
hash2ee080450a727d2484e2fd49ca94328c63befbe83113838f293379f4709cfc11 | Agent Tesla payload (confidence level: 100%) | |
hashf3d6eb3da9b43c86b6610370d64e086c2af8d8511a4f05862e4ea312fb0211ca | Agent Tesla payload (confidence level: 100%) | |
hash3b15c4b70c129e787422670b475613b15b70c73565445c7f7de89debaa7340f0 | Agent Tesla payload (confidence level: 100%) | |
hash7fa94a5ecff6dd8cadd53c76853da529da322fef102f23b1b09f335238c31dfd | Agent Tesla payload (confidence level: 75%) | |
hash53a95222b2d47e3b44240183d0eafbc7f64bcbd88bbe61af3580ab00c5f0ff85 | Agent Tesla payload (confidence level: 75%) | |
hash720d90ad498171d943399e010d4aa16cc65f69bbff6f042d6b364813cfd168bb | Agent Tesla payload (confidence level: 75%) | |
hashf83628e8db4f7c65ed636e17a1ab69a2b0f14a7e1cf9afca77b682b6d51f8677 | Agent Tesla payload (confidence level: 75%) | |
hash5e87d1641a172f6d48cff1811254bd74640838bd75aab140c9b6a4c35c35aeec | Agent Tesla payload (confidence level: 75%) | |
hash929ce92a6849a9052fd6eb1c92d1bbba866f4a1762839a1714ab23aa90fe2297 | Agent Tesla payload (confidence level: 75%) | |
hashf4c3fea5e9c60cf76e1e16204fbc9f7cb7f63d1d16339fa665f6fc2aab845e39 | Agent Tesla payload (confidence level: 75%) | |
hash48b8a0489b885816b349cfbd4987202cccb6df63957e024923273215a739a810 | Agent Tesla payload (confidence level: 75%) | |
hash1d959cf6e366a2217cfef71d9df9e9835c2b1bd7e21b73f345ca621fb05e289e | Agent Tesla payload (confidence level: 75%) | |
hash0f86a303ae4c0a7966e66f1f908183f6f1876e56f49de5c1f8ba5d1c2fab195a | Agent Tesla payload (confidence level: 75%) | |
hash426e74bf11d78c21fe952b46371f014b7adef3d0c170ca62b69eb7862f67313d | Agent Tesla payload (confidence level: 75%) | |
hash93b763cc79cbb7754a028003e6914491da5898c5861ac0de550e2237b53f12c1 | Agent Tesla payload (confidence level: 75%) | |
hash1b395afd0cdb4552ec57d408686c24f62b4d15d0ef13146468a71cfbda9e55a1 | Agent Tesla payload (confidence level: 75%) | |
hashdde99d2ebadfd99b7ecfa144967b5c9d30aa78679b2bb9425be478bb8f5fea3e | Agent Tesla payload (confidence level: 75%) | |
hash28c9311cf58a72d4f23a3abd698c33275a34ff3cbf104680c113dfb4e9d1c5ec | Agent Tesla payload (confidence level: 75%) | |
hashc6a9aa7e0a62bdbd7ed39273a2e117e8b6efa5c1c535a0a521fa75cb82d0ca95 | Agent Tesla payload (confidence level: 75%) | |
hashcad4f8e97cce74c98356096f153231cf9622da0a534d5a24a3e4ed770d668ac8 | Agent Tesla payload (confidence level: 75%) | |
hashfbb5b909d03d5cb5bb3e8b50280b83f49c7a507277f779e6884fcce7f14de042 | Agent Tesla payload (confidence level: 75%) | |
hash23037e71ab8a3fdb3cd81c52a11f50e0d72e22703fdff8e05c45eb0ac0fb829b | Agent Tesla payload (confidence level: 75%) | |
hashbf35e7ee59cf81f74be092d43acbb711377f115426db8e9f6f45fa1bbb3086b7 | Agent Tesla payload (confidence level: 75%) | |
hash1d20310fec07f4cfd387fca7c5bc9e33f2230aa4e7d73c807c0b5d40394f66c4 | Agent Tesla payload (confidence level: 75%) | |
hash3f39ee57fa6bebbbade5c9e263939ea1f46e9eea2af49ce3dc6fbd2366f75902 | Agent Tesla payload (confidence level: 75%) | |
hashb886242723bd9c498d27270a8b539c074b47682307b74d2c8cc91007c07bfa28 | Agent Tesla payload (confidence level: 75%) | |
hash6f65bc7ad58ce2f17dec79d9dda14c31d73587552b72e7d90b5b827c1a80c9c6 | Agent Tesla payload (confidence level: 75%) | |
hashbe0aa617cee2a480451d246ea0c2d42fc6aad4f5f473c4b03b920db808a06ebe | Agent Tesla payload (confidence level: 75%) | |
hashe2b1d28dd8b9d265af6678f588fa67d00e9ff4a96c6978a0aa8742a090436bb5 | Agent Tesla payload (confidence level: 75%) | |
hash4d231cf9db3176c6d82357c2feec657b8d8cd59cc6d0fb403a5ba243ea023773 | Agent Tesla payload (confidence level: 75%) | |
hash510c64f55f86258af15ae33481f17ec9868bf4e41a5d21ce630400f0e6fcf7a1 | Agent Tesla payload (confidence level: 75%) | |
hash9b132f152d0f26835a0e5534c7448838ea908b54acc2b8283f8e1d70c9468580 | Agent Tesla payload (confidence level: 75%) | |
hashb42bb1a0228b29babb878c661662c4aaf8741fb3c8078bc421b700d90800390c | Agent Tesla payload (confidence level: 75%) | |
hash197a187ab432614e6baee849387db760d1519980899e1ed6df36b4c062772c65 | Agent Tesla payload (confidence level: 75%) | |
hash48eda12c59b8c6b6b19dfe8dcc1158f934bb7acbe52c0a5b744b493688e7460a | Agent Tesla payload (confidence level: 75%) | |
hash6003 | XOR DDoS botnet C2 server (confidence level: 75%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash8938f080347aa0b5a42882e6c0262d32323fc6aa75810b2bbbd68467754c1a37 | Remcos payload (confidence level: 100%) | |
hash110190c8c696f2e357a9445c1ca65a574fff65388d384b859de1a717b651ed7c | Remcos payload (confidence level: 100%) | |
hasha4406d83070bdc0fbf29e5a81897d969bd1fda8e67e61f2033de4d57e784657d | Remcos payload (confidence level: 100%) | |
hash2c4f201b5d5c1a61b803b1ee26ff0d782131e6aea39ab975c0f078c834c26677 | Remcos payload (confidence level: 100%) | |
hash5552 | NjRAT botnet C2 server (confidence level: 100%) | |
hash4984 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash7800 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash80 | Lumma Stealer botnet C2 server (confidence level: 100%) | |
hash80 | Lumma Stealer botnet C2 server (confidence level: 100%) | |
hash80 | Lumma Stealer botnet C2 server (confidence level: 100%) | |
hash81 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8082 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash56999 | Mirai botnet C2 server (confidence level: 75%) | |
hash32323 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash4110 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash8471 | BitRAT botnet C2 server (confidence level: 100%) | |
hash1337 | Mirai botnet C2 server (confidence level: 75%) | |
hash308e04792e9d67d7f35a9437b2ced36a8bcae21d1871ca3e367f7be38eec767d | QakBot payload (confidence level: 100%) | |
hash548d26386eec5d6a45acbfc0f518767e977a7378630929f82e659957da525e26 | QakBot payload (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash12392 | NjRAT botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash993 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash3778 | Mirai botnet C2 server (confidence level: 75%) | |
hash80 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash6a4ee0ab3240bb566273aa968cea51d4 | Kutaki payload (confidence level: 50%) | |
hashd91cfe1a42899f7ba97b820746184cb1 | LokiBot payload (confidence level: 50%) | |
hash6f2ad08514a304c31b1a7ad3cd6b8892 | LokiBot payload (confidence level: 50%) | |
hash3584af4c7ff3061dc605bfc0de9d478d | Xloader payload (confidence level: 50%) | |
hash4c241b465dca3cdb136375d91df76180 | Xloader payload (confidence level: 50%) | |
hasha3699c28f0868421d041f295534a8b87 | Xloader payload (confidence level: 50%) | |
hash9a864a23da20a972ac73fd9bb7fa02a3 | Xloader payload (confidence level: 50%) | |
hash70cfa5167777582bdeeadb50e056a9a6 | Xloader payload (confidence level: 50%) | |
hashed2d2389bedce5b1292b4bc0d38a099c | Xloader payload (confidence level: 50%) | |
hash44687 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash19444 | NjRAT botnet C2 server (confidence level: 100%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1980 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1994 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash9782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash80 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainfelipeemarlimarketingl.link | Astaroth botnet C2 domain (confidence level: 100%) | |
domainclus.ga | Astaroth botnet C2 domain (confidence level: 100%) | |
domainsophiaemarlibuffetme.link | Astaroth botnet C2 domain (confidence level: 100%) | |
domainyiuahd.sophiaemarlibuffetme.link | Astaroth botnet C2 domain (confidence level: 100%) | |
domainf4iidk.felipeemarlimarketingl.link | Astaroth botnet C2 domain (confidence level: 100%) | |
domainvjur2fho2j3.clus.ga | Astaroth botnet C2 domain (confidence level: 100%) | |
domainassessirianricoadvocacia.cloud | Astaroth payload delivery domain (confidence level: 100%) | |
domainwraa5f.assessirianricoadvocacia.cloud | Astaroth payload delivery domain (confidence level: 100%) | |
domainmandingo.dvrlists.com | Remcos botnet C2 domain (confidence level: 100%) | |
domaindkbillly.run | IcedID botnet C2 domain (confidence level: 100%) | |
domaintrallfasterinf.com | IcedID botnet C2 domain (confidence level: 100%) | |
domainantiflamez.bar | IcedID botnet C2 domain (confidence level: 100%) | |
domainerinindiaka.quest | IcedID botnet C2 domain (confidence level: 100%) | |
domainconsiderf.info | IcedID botnet C2 domain (confidence level: 100%) | |
domainchoifejuce.lol | IcedID botnet C2 domain (confidence level: 100%) |
Threat ID: 682b7b9dd3ddd8cef2e58151
Added to database: 5/19/2025, 6:42:37 PM
Last enriched: 6/18/2025, 7:16:52 PM
Last updated: 8/12/2025, 2:08:07 AM
Views: 14
Related Threats
Efimer Trojan Steals Crypto, Hacks WordPress Sites via Torrents and Phishing
MediumSilent Watcher: Dissecting Cmimai Stealer's VBS Payload
MediumCastleLoader Analysis
MediumThe Dark Side of Parental Control Apps
MediumUncovering a Web3 Interview Scam
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.