Skip to main content

ThreatFox IOCs for 2022-12-11

Medium
Published: Sun Dec 11 2022 (12/11/2022, 00:00:00 UTC)
Source: ThreatFox
Vendor/Project: type
Product: osint

Description

ThreatFox IOCs for 2022-12-11

AI-Powered Analysis

AILast updated: 06/19/2025, 14:04:24 UTC

Technical Analysis

The provided information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on December 11, 2022, categorized under malware and OSINT (Open Source Intelligence). The data appears to be a collection of threat intelligence indicators rather than a specific malware sample or exploit. The threat is classified with a medium severity level and a threat level of 2 on an unspecified scale, indicating a moderate concern. The technical details mention a distribution score of 3, which may imply a moderate spread or dissemination of these IOCs within the threat intelligence community or potentially among threat actors. There are no affected product versions listed, no known exploits in the wild, and no patch links provided, suggesting that this is not a vulnerability tied to a specific software product but rather intelligence related to malware activity or infrastructure. The lack of CWEs (Common Weakness Enumerations) and absence of specific indicators in the data limits the ability to analyze attack vectors or malware behavior in detail. The threat is tagged as 'type:osint' and 'tlp:white,' indicating that the information is openly shareable and intended for broad distribution within the cybersecurity community. Overall, this entry represents a situational awareness update rather than a direct actionable threat, focusing on sharing IOCs that may assist organizations in detecting or mitigating malware-related activities identified around the publication date.

Potential Impact

Given the nature of this threat as a collection of IOCs rather than a direct exploit or vulnerability, the immediate impact on European organizations is indirect. The primary value lies in enhancing detection capabilities and situational awareness against malware campaigns or threat actor infrastructure. If these IOCs correspond to active malware campaigns, organizations that fail to incorporate them into their detection systems may face increased risk of undetected compromise, leading to potential data breaches, operational disruption, or lateral movement within networks. However, since no specific affected products or versions are identified, and no known exploits are reported, the risk of direct exploitation is low. European organizations that rely heavily on OSINT feeds and threat intelligence platforms will benefit most from integrating these IOCs to improve their security posture. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in sectors with high exposure to malware threats such as finance, critical infrastructure, and government entities.

Mitigation Recommendations

1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools to enhance detection of related malware activity. 2. Regularly update threat intelligence feeds and ensure automated ingestion of new IOCs to maintain up-to-date defenses. 3. Conduct targeted threat hunting exercises using these IOCs to identify any latent infections or suspicious activity within organizational networks. 4. Enhance employee awareness and training on malware threats, emphasizing the importance of recognizing phishing attempts and suspicious communications that may deliver malware. 5. Implement network segmentation and strict access controls to limit the potential impact of malware infections. 6. Collaborate with national and European cybersecurity information sharing organizations to exchange intelligence and validate the relevance of these IOCs within local threat landscapes. 7. Since no patches or specific vulnerabilities are associated, focus on strengthening general malware defenses, including timely software updates, application whitelisting, and robust backup strategies.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
1
Distribution
3
Uuid
ea7198b8-fa51-4c1c-b691-c61b451245d3
Original Timestamp
1670803383

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://121.34.150.119:37505/mozi.m
Mozi payload delivery URL (confidence level: 50%)
urlhttp://27.40.86.210:55141/mozi.m
Mozi payload delivery URL (confidence level: 50%)
urlhttps://www.whatjs.gq/jquery-3.3.1.min.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://23.105.221.97:9999/www/handle/doc
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://update.micsoft365.online:2096/5en1bjq8aauym2zgoy3k/ll_93667efa.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://16.162.120.141:60001/load
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://103.233.253.147:8088/_/scs/mail-static/_/js/
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://update.micsoft365.online:2095/5en1bjq8aauym2zgoy3k/ll_93667efa.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://95.216.216.219
Alien botnet C2 (confidence level: 80%)
urlhttp://yamac23.co.vu
Alien botnet C2 (confidence level: 80%)
urlhttp://yamac24.co.vu
Alien botnet C2 (confidence level: 80%)
urlhttps://120.78.82.210/adapt/v7.82/nua9nh12f2gf
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://49.128.198.3:53/j.ad
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://95.217.31.129/915
Vidar botnet C2 (confidence level: 100%)
urlhttp://95.217.29.31/1743
Vidar botnet C2 (confidence level: 100%)
urlhttp://bin.hik.icu/ca
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://www.c1oudflare.tk:8443/case.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://yetiorcvar.cf/jquery-3.3.1.min.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://bin.hik.icu/cx
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://expoglobalservice.com/releases
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://107.148.129.142/ca
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://s15.kaspenskyupdate.com/wp06/wp-includes/po.php
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://s15.kaspenskyupdate.com/wp06/wp-includes/po.php
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://91.245.254.116/jquery-3.3.1.min.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://new.hik.icu/load
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://125.124.127.206:8001/ga.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://new.hik.icu/fwlink
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://www.ubds.uk/jquery-3.3.1.min.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://kratomleaf.strangled.net/jquery-3.3.1.min.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://183.57.37.247:6666/dot.gif
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://121.41.108.155:800/fwlink
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://49.234.19.234:8089/match
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://183.57.37.247:8080/visit.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://77.73.133.99/
Raccoon botnet C2 (confidence level: 100%)
urlhttp://94.131.98.162/
Raccoon botnet C2 (confidence level: 100%)
urlhttp://37.220.87.12/
Raccoon botnet C2 (confidence level: 100%)
urlhttp://77.73.134.30/
Raccoon botnet C2 (confidence level: 100%)
urlhttp://37.220.87.12/78119a08f643e7ea48258f90d06b0d3b
Raccoon botnet C2 (confidence level: 100%)
urlhttp://94.131.98.162/2ec44083049b46b948f6c18775e29745
Raccoon botnet C2 (confidence level: 100%)
urlhttp://45.15.156.75/
Raccoon botnet C2 (confidence level: 100%)
urlhttps://85.209.135.49/an.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://service-bzzkyay3-1304672019.bj.apigw.tencentcs.com/api/getit
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://185.246.221.111:8081/g.pixel
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://155.94.156.132:10011/load
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttp://54.199.163.150/match
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://54.199.163.150/pixel.gif
Cobalt Strike botnet C2 (confidence level: 100%)

File

ValueDescriptionCopy
file47.103.42.161
Cobalt Strike botnet C2 server (confidence level: 100%)
file81.68.142.187
Cobalt Strike botnet C2 server (confidence level: 100%)
file154.209.82.138
Cobalt Strike botnet C2 server (confidence level: 100%)
file43.156.150.242
Cobalt Strike botnet C2 server (confidence level: 100%)
file43.156.150.242
Cobalt Strike botnet C2 server (confidence level: 100%)
file193.35.18.230
Mirai botnet C2 server (confidence level: 75%)
file151.65.67.211
QakBot botnet C2 server (confidence level: 75%)
file120.78.82.210
Cobalt Strike botnet C2 server (confidence level: 100%)
file46.142.186.28
BumbleBee botnet C2 server (confidence level: 75%)
file107.148.129.142
Cobalt Strike botnet C2 server (confidence level: 100%)
file91.245.254.116
Cobalt Strike botnet C2 server (confidence level: 100%)
file84.32.190.139
Cobalt Strike botnet C2 server (confidence level: 100%)
file84.32.190.139
Cobalt Strike botnet C2 server (confidence level: 100%)
file20.90.90.172
Cobalt Strike botnet C2 server (confidence level: 100%)
file3.70.239.217
Cobalt Strike botnet C2 server (confidence level: 100%)
file185.246.221.138
Bashlite botnet C2 server (confidence level: 75%)
file77.73.133.99
Raccoon botnet C2 server (confidence level: 100%)
file94.131.98.162
Raccoon botnet C2 server (confidence level: 100%)
file37.220.87.12
Raccoon botnet C2 server (confidence level: 100%)
file77.73.134.30
Raccoon botnet C2 server (confidence level: 100%)
file82.115.223.140
RedLine Stealer botnet C2 server (confidence level: 100%)
file45.15.156.75
Raccoon botnet C2 server (confidence level: 100%)
file82.115.223.190
RedLine Stealer botnet C2 server (confidence level: 100%)
file157.90.123.253
RedLine Stealer botnet C2 server (confidence level: 100%)
file49.12.200.37
RedLine Stealer botnet C2 server (confidence level: 100%)
file45.15.157.136
RedLine Stealer botnet C2 server (confidence level: 100%)
file85.209.135.49
Cobalt Strike botnet C2 server (confidence level: 100%)
file81.70.203.138
Cobalt Strike botnet C2 server (confidence level: 100%)
file54.199.163.150
Cobalt Strike botnet C2 server (confidence level: 100%)
file54.199.163.150
Cobalt Strike botnet C2 server (confidence level: 100%)

Hash

ValueDescriptionCopy
hash8022
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash2096
Cobalt Strike botnet C2 server (confidence level: 100%)
hash2095
Cobalt Strike botnet C2 server (confidence level: 100%)
hash420
Mirai botnet C2 server (confidence level: 75%)
hash443
QakBot botnet C2 server (confidence level: 75%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
BumbleBee botnet C2 server (confidence level: 75%)
hash5448fe5f744459507d71f6f73deecae110226fdb355969bcbc51c5cc08b840b9
Emotet payload (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash9999
Bashlite botnet C2 server (confidence level: 75%)
hash80
Raccoon botnet C2 server (confidence level: 100%)
hash80
Raccoon botnet C2 server (confidence level: 100%)
hash80
Raccoon botnet C2 server (confidence level: 100%)
hash80
Raccoon botnet C2 server (confidence level: 100%)
hash81
RedLine Stealer botnet C2 server (confidence level: 100%)
hash80
Raccoon botnet C2 server (confidence level: 100%)
hash21927
RedLine Stealer botnet C2 server (confidence level: 100%)
hash42705
RedLine Stealer botnet C2 server (confidence level: 100%)
hash39330
RedLine Stealer botnet C2 server (confidence level: 100%)
hash7429
RedLine Stealer botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)

Domain

ValueDescriptionCopy
domainwww.whatjs.gq
Cobalt Strike botnet C2 domain (confidence level: 100%)
domainupdate.micsoft365.online
Cobalt Strike botnet C2 domain (confidence level: 100%)
domainwww.c1oudflare.tk
Cobalt Strike botnet C2 domain (confidence level: 100%)
domainyetiorcvar.cf
Cobalt Strike botnet C2 domain (confidence level: 100%)
domains15.kaspenskyupdate.com
Cobalt Strike botnet C2 domain (confidence level: 100%)
domainwww.ubds.uk
Cobalt Strike botnet C2 domain (confidence level: 100%)
domainkratomleaf.strangled.net
Cobalt Strike botnet C2 domain (confidence level: 100%)
domainva-zum.com
IcedID payload delivery domain (confidence level: 100%)
domainsofteasy.org
Raccoon payload delivery domain (confidence level: 75%)
domainpushme.us.in
RedLine Stealer botnet C2 domain (confidence level: 50%)
domainwww.softportal.online
RedLine Stealer payload delivery domain (confidence level: 75%)
domainwhitegames.wepudas.guru
RedLine Stealer payload delivery domain (confidence level: 75%)
domainbcware.netlify.app
RedLine Stealer payload delivery domain (confidence level: 75%)
domainrootsweb.pw
RedLine Stealer payload delivery domain (confidence level: 75%)
domainicreativecloudpro.com
RedLine Stealer payload delivery domain (confidence level: 75%)
domaincracksoftware.site
RedLine Stealer payload delivery domain (confidence level: 75%)
domainsoftland-off.com
RedLine Stealer payload delivery domain (confidence level: 75%)
domainastoprograms.com
Vidar payload delivery domain (confidence level: 75%)
domainvipsoftware.pro
Raccoon payload delivery domain (confidence level: 75%)
domaindownloadfree-soft.com
Vidar payload delivery domain (confidence level: 75%)
domainallsoftware.store
Aurora Stealer payload delivery domain (confidence level: 75%)
domainsimplysoft.org
RedLine Stealer payload delivery domain (confidence level: 75%)
domainservice-bzzkyay3-1304672019.bj.apigw.tencentcs.com
Cobalt Strike botnet C2 domain (confidence level: 100%)

Threat ID: 682c7ac1e3e6de8ceb765ed9

Added to database: 5/20/2025, 12:51:13 PM

Last enriched: 6/19/2025, 2:04:24 PM

Last updated: 8/9/2025, 1:54:29 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats