ThreatFox IOCs for 2022-12-11
ThreatFox IOCs for 2022-12-11
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on December 11, 2022, categorized under malware and OSINT (Open Source Intelligence). The data appears to be a collection of threat intelligence indicators rather than a specific malware sample or exploit. The threat is classified with a medium severity level and a threat level of 2 on an unspecified scale, indicating a moderate concern. The technical details mention a distribution score of 3, which may imply a moderate spread or dissemination of these IOCs within the threat intelligence community or potentially among threat actors. There are no affected product versions listed, no known exploits in the wild, and no patch links provided, suggesting that this is not a vulnerability tied to a specific software product but rather intelligence related to malware activity or infrastructure. The lack of CWEs (Common Weakness Enumerations) and absence of specific indicators in the data limits the ability to analyze attack vectors or malware behavior in detail. The threat is tagged as 'type:osint' and 'tlp:white,' indicating that the information is openly shareable and intended for broad distribution within the cybersecurity community. Overall, this entry represents a situational awareness update rather than a direct actionable threat, focusing on sharing IOCs that may assist organizations in detecting or mitigating malware-related activities identified around the publication date.
Potential Impact
Given the nature of this threat as a collection of IOCs rather than a direct exploit or vulnerability, the immediate impact on European organizations is indirect. The primary value lies in enhancing detection capabilities and situational awareness against malware campaigns or threat actor infrastructure. If these IOCs correspond to active malware campaigns, organizations that fail to incorporate them into their detection systems may face increased risk of undetected compromise, leading to potential data breaches, operational disruption, or lateral movement within networks. However, since no specific affected products or versions are identified, and no known exploits are reported, the risk of direct exploitation is low. European organizations that rely heavily on OSINT feeds and threat intelligence platforms will benefit most from integrating these IOCs to improve their security posture. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in sectors with high exposure to malware threats such as finance, critical infrastructure, and government entities.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools to enhance detection of related malware activity. 2. Regularly update threat intelligence feeds and ensure automated ingestion of new IOCs to maintain up-to-date defenses. 3. Conduct targeted threat hunting exercises using these IOCs to identify any latent infections or suspicious activity within organizational networks. 4. Enhance employee awareness and training on malware threats, emphasizing the importance of recognizing phishing attempts and suspicious communications that may deliver malware. 5. Implement network segmentation and strict access controls to limit the potential impact of malware infections. 6. Collaborate with national and European cybersecurity information sharing organizations to exchange intelligence and validate the relevance of these IOCs within local threat landscapes. 7. Since no patches or specific vulnerabilities are associated, focus on strengthening general malware defenses, including timely software updates, application whitelisting, and robust backup strategies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- url: http://121.34.150.119:37505/mozi.m
- url: http://27.40.86.210:55141/mozi.m
- file: 47.103.42.161
- hash: 8022
- file: 81.68.142.187
- hash: 443
- url: https://www.whatjs.gq/jquery-3.3.1.min.js
- domain: www.whatjs.gq
- file: 154.209.82.138
- hash: 443
- url: https://23.105.221.97:9999/www/handle/doc
- url: https://update.micsoft365.online:2096/5en1bjq8aauym2zgoy3k/ll_93667efa.js
- domain: update.micsoft365.online
- file: 43.156.150.242
- hash: 2096
- url: https://16.162.120.141:60001/load
- url: http://103.233.253.147:8088/_/scs/mail-static/_/js/
- url: http://update.micsoft365.online:2095/5en1bjq8aauym2zgoy3k/ll_93667efa.js
- file: 43.156.150.242
- hash: 2095
- file: 193.35.18.230
- hash: 420
- file: 151.65.67.211
- hash: 443
- url: http://95.216.216.219
- url: http://yamac23.co.vu
- url: http://yamac24.co.vu
- url: https://120.78.82.210/adapt/v7.82/nua9nh12f2gf
- file: 120.78.82.210
- hash: 443
- url: http://49.128.198.3:53/j.ad
- url: http://95.217.31.129/915
- url: http://95.217.29.31/1743
- url: http://bin.hik.icu/ca
- url: https://www.c1oudflare.tk:8443/case.js
- domain: www.c1oudflare.tk
- url: https://yetiorcvar.cf/jquery-3.3.1.min.js
- domain: yetiorcvar.cf
- url: https://bin.hik.icu/cx
- url: http://expoglobalservice.com/releases
- file: 46.142.186.28
- hash: 443
- hash: 5448fe5f744459507d71f6f73deecae110226fdb355969bcbc51c5cc08b840b9
- url: https://107.148.129.142/ca
- file: 107.148.129.142
- hash: 443
- url: https://s15.kaspenskyupdate.com/wp06/wp-includes/po.php
- domain: s15.kaspenskyupdate.com
- url: http://s15.kaspenskyupdate.com/wp06/wp-includes/po.php
- url: https://91.245.254.116/jquery-3.3.1.min.js
- file: 91.245.254.116
- hash: 443
- url: https://new.hik.icu/load
- file: 84.32.190.139
- hash: 443
- url: http://125.124.127.206:8001/ga.js
- url: http://new.hik.icu/fwlink
- file: 84.32.190.139
- hash: 80
- url: https://www.ubds.uk/jquery-3.3.1.min.js
- domain: www.ubds.uk
- file: 20.90.90.172
- hash: 443
- url: https://kratomleaf.strangled.net/jquery-3.3.1.min.js
- domain: kratomleaf.strangled.net
- file: 3.70.239.217
- hash: 443
- url: http://183.57.37.247:6666/dot.gif
- url: http://121.41.108.155:800/fwlink
- url: http://49.234.19.234:8089/match
- url: http://183.57.37.247:8080/visit.js
- file: 185.246.221.138
- hash: 9999
- domain: va-zum.com
- url: http://77.73.133.99/
- url: http://94.131.98.162/
- url: http://37.220.87.12/
- url: http://77.73.134.30/
- url: http://37.220.87.12/78119a08f643e7ea48258f90d06b0d3b
- url: http://94.131.98.162/2ec44083049b46b948f6c18775e29745
- file: 77.73.133.99
- hash: 80
- file: 94.131.98.162
- hash: 80
- file: 37.220.87.12
- hash: 80
- file: 77.73.134.30
- hash: 80
- domain: softeasy.org
- file: 82.115.223.140
- hash: 81
- domain: pushme.us.in
- file: 45.15.156.75
- hash: 80
- url: http://45.15.156.75/
- file: 82.115.223.190
- hash: 21927
- file: 157.90.123.253
- hash: 42705
- file: 49.12.200.37
- hash: 39330
- file: 45.15.157.136
- hash: 7429
- domain: www.softportal.online
- domain: whitegames.wepudas.guru
- domain: bcware.netlify.app
- domain: rootsweb.pw
- domain: icreativecloudpro.com
- domain: cracksoftware.site
- domain: softland-off.com
- domain: astoprograms.com
- domain: vipsoftware.pro
- domain: downloadfree-soft.com
- domain: allsoftware.store
- domain: simplysoft.org
- url: https://85.209.135.49/an.js
- file: 85.209.135.49
- hash: 443
- url: https://service-bzzkyay3-1304672019.bj.apigw.tencentcs.com/api/getit
- domain: service-bzzkyay3-1304672019.bj.apigw.tencentcs.com
- file: 81.70.203.138
- hash: 443
- url: http://185.246.221.111:8081/g.pixel
- url: http://155.94.156.132:10011/load
- url: http://54.199.163.150/match
- file: 54.199.163.150
- hash: 80
- url: https://54.199.163.150/pixel.gif
- file: 54.199.163.150
- hash: 443
ThreatFox IOCs for 2022-12-11
Description
ThreatFox IOCs for 2022-12-11
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on December 11, 2022, categorized under malware and OSINT (Open Source Intelligence). The data appears to be a collection of threat intelligence indicators rather than a specific malware sample or exploit. The threat is classified with a medium severity level and a threat level of 2 on an unspecified scale, indicating a moderate concern. The technical details mention a distribution score of 3, which may imply a moderate spread or dissemination of these IOCs within the threat intelligence community or potentially among threat actors. There are no affected product versions listed, no known exploits in the wild, and no patch links provided, suggesting that this is not a vulnerability tied to a specific software product but rather intelligence related to malware activity or infrastructure. The lack of CWEs (Common Weakness Enumerations) and absence of specific indicators in the data limits the ability to analyze attack vectors or malware behavior in detail. The threat is tagged as 'type:osint' and 'tlp:white,' indicating that the information is openly shareable and intended for broad distribution within the cybersecurity community. Overall, this entry represents a situational awareness update rather than a direct actionable threat, focusing on sharing IOCs that may assist organizations in detecting or mitigating malware-related activities identified around the publication date.
Potential Impact
Given the nature of this threat as a collection of IOCs rather than a direct exploit or vulnerability, the immediate impact on European organizations is indirect. The primary value lies in enhancing detection capabilities and situational awareness against malware campaigns or threat actor infrastructure. If these IOCs correspond to active malware campaigns, organizations that fail to incorporate them into their detection systems may face increased risk of undetected compromise, leading to potential data breaches, operational disruption, or lateral movement within networks. However, since no specific affected products or versions are identified, and no known exploits are reported, the risk of direct exploitation is low. European organizations that rely heavily on OSINT feeds and threat intelligence platforms will benefit most from integrating these IOCs to improve their security posture. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in sectors with high exposure to malware threats such as finance, critical infrastructure, and government entities.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools to enhance detection of related malware activity. 2. Regularly update threat intelligence feeds and ensure automated ingestion of new IOCs to maintain up-to-date defenses. 3. Conduct targeted threat hunting exercises using these IOCs to identify any latent infections or suspicious activity within organizational networks. 4. Enhance employee awareness and training on malware threats, emphasizing the importance of recognizing phishing attempts and suspicious communications that may deliver malware. 5. Implement network segmentation and strict access controls to limit the potential impact of malware infections. 6. Collaborate with national and European cybersecurity information sharing organizations to exchange intelligence and validate the relevance of these IOCs within local threat landscapes. 7. Since no patches or specific vulnerabilities are associated, focus on strengthening general malware defenses, including timely software updates, application whitelisting, and robust backup strategies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- ea7198b8-fa51-4c1c-b691-c61b451245d3
- Original Timestamp
- 1670803383
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttp://121.34.150.119:37505/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://27.40.86.210:55141/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttps://www.whatjs.gq/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://23.105.221.97:9999/www/handle/doc | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://update.micsoft365.online:2096/5en1bjq8aauym2zgoy3k/ll_93667efa.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://16.162.120.141:60001/load | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://103.233.253.147:8088/_/scs/mail-static/_/js/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://update.micsoft365.online:2095/5en1bjq8aauym2zgoy3k/ll_93667efa.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://95.216.216.219 | Alien botnet C2 (confidence level: 80%) | |
urlhttp://yamac23.co.vu | Alien botnet C2 (confidence level: 80%) | |
urlhttp://yamac24.co.vu | Alien botnet C2 (confidence level: 80%) | |
urlhttps://120.78.82.210/adapt/v7.82/nua9nh12f2gf | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://49.128.198.3:53/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://95.217.31.129/915 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://95.217.29.31/1743 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://bin.hik.icu/ca | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://www.c1oudflare.tk:8443/case.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://yetiorcvar.cf/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://bin.hik.icu/cx | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://expoglobalservice.com/releases | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://107.148.129.142/ca | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://s15.kaspenskyupdate.com/wp06/wp-includes/po.php | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://s15.kaspenskyupdate.com/wp06/wp-includes/po.php | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://91.245.254.116/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://new.hik.icu/load | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://125.124.127.206:8001/ga.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://new.hik.icu/fwlink | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://www.ubds.uk/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://kratomleaf.strangled.net/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://183.57.37.247:6666/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://121.41.108.155:800/fwlink | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://49.234.19.234:8089/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://183.57.37.247:8080/visit.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://77.73.133.99/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://94.131.98.162/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://37.220.87.12/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://77.73.134.30/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://37.220.87.12/78119a08f643e7ea48258f90d06b0d3b | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://94.131.98.162/2ec44083049b46b948f6c18775e29745 | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://45.15.156.75/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttps://85.209.135.49/an.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://service-bzzkyay3-1304672019.bj.apigw.tencentcs.com/api/getit | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://185.246.221.111:8081/g.pixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://155.94.156.132:10011/load | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://54.199.163.150/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://54.199.163.150/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file47.103.42.161 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file81.68.142.187 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.209.82.138 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.156.150.242 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.156.150.242 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file193.35.18.230 | Mirai botnet C2 server (confidence level: 75%) | |
file151.65.67.211 | QakBot botnet C2 server (confidence level: 75%) | |
file120.78.82.210 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file46.142.186.28 | BumbleBee botnet C2 server (confidence level: 75%) | |
file107.148.129.142 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.245.254.116 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file84.32.190.139 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file84.32.190.139 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file20.90.90.172 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file3.70.239.217 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.246.221.138 | Bashlite botnet C2 server (confidence level: 75%) | |
file77.73.133.99 | Raccoon botnet C2 server (confidence level: 100%) | |
file94.131.98.162 | Raccoon botnet C2 server (confidence level: 100%) | |
file37.220.87.12 | Raccoon botnet C2 server (confidence level: 100%) | |
file77.73.134.30 | Raccoon botnet C2 server (confidence level: 100%) | |
file82.115.223.140 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file45.15.156.75 | Raccoon botnet C2 server (confidence level: 100%) | |
file82.115.223.190 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file157.90.123.253 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file49.12.200.37 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file45.15.157.136 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file85.209.135.49 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file81.70.203.138 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file54.199.163.150 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file54.199.163.150 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash8022 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2096 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2095 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash420 | Mirai botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | BumbleBee botnet C2 server (confidence level: 75%) | |
hash5448fe5f744459507d71f6f73deecae110226fdb355969bcbc51c5cc08b840b9 | Emotet payload (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Bashlite botnet C2 server (confidence level: 75%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash81 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash21927 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash42705 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash39330 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash7429 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainwww.whatjs.gq | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainupdate.micsoft365.online | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainwww.c1oudflare.tk | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainyetiorcvar.cf | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domains15.kaspenskyupdate.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainwww.ubds.uk | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainkratomleaf.strangled.net | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainva-zum.com | IcedID payload delivery domain (confidence level: 100%) | |
domainsofteasy.org | Raccoon payload delivery domain (confidence level: 75%) | |
domainpushme.us.in | RedLine Stealer botnet C2 domain (confidence level: 50%) | |
domainwww.softportal.online | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainwhitegames.wepudas.guru | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainbcware.netlify.app | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainrootsweb.pw | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainicreativecloudpro.com | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domaincracksoftware.site | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainsoftland-off.com | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainastoprograms.com | Vidar payload delivery domain (confidence level: 75%) | |
domainvipsoftware.pro | Raccoon payload delivery domain (confidence level: 75%) | |
domaindownloadfree-soft.com | Vidar payload delivery domain (confidence level: 75%) | |
domainallsoftware.store | Aurora Stealer payload delivery domain (confidence level: 75%) | |
domainsimplysoft.org | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainservice-bzzkyay3-1304672019.bj.apigw.tencentcs.com | Cobalt Strike botnet C2 domain (confidence level: 100%) |
Threat ID: 682c7ac1e3e6de8ceb765ed9
Added to database: 5/20/2025, 12:51:13 PM
Last enriched: 6/19/2025, 2:04:24 PM
Last updated: 8/9/2025, 1:54:29 PM
Views: 10
Related Threats
ThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.