ThreatFox IOCs for 2022-12-11
ThreatFox IOCs for 2022-12-11
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on December 11, 2022, categorized under malware and OSINT (Open Source Intelligence). The data appears to be a collection of threat intelligence indicators rather than a specific malware sample or exploit. The threat is classified with a medium severity level and a threat level of 2 on an unspecified scale, indicating a moderate concern. The technical details mention a distribution score of 3, which may imply a moderate spread or dissemination of these IOCs within the threat intelligence community or potentially among threat actors. There are no affected product versions listed, no known exploits in the wild, and no patch links provided, suggesting that this is not a vulnerability tied to a specific software product but rather intelligence related to malware activity or infrastructure. The lack of CWEs (Common Weakness Enumerations) and absence of specific indicators in the data limits the ability to analyze attack vectors or malware behavior in detail. The threat is tagged as 'type:osint' and 'tlp:white,' indicating that the information is openly shareable and intended for broad distribution within the cybersecurity community. Overall, this entry represents a situational awareness update rather than a direct actionable threat, focusing on sharing IOCs that may assist organizations in detecting or mitigating malware-related activities identified around the publication date.
Potential Impact
Given the nature of this threat as a collection of IOCs rather than a direct exploit or vulnerability, the immediate impact on European organizations is indirect. The primary value lies in enhancing detection capabilities and situational awareness against malware campaigns or threat actor infrastructure. If these IOCs correspond to active malware campaigns, organizations that fail to incorporate them into their detection systems may face increased risk of undetected compromise, leading to potential data breaches, operational disruption, or lateral movement within networks. However, since no specific affected products or versions are identified, and no known exploits are reported, the risk of direct exploitation is low. European organizations that rely heavily on OSINT feeds and threat intelligence platforms will benefit most from integrating these IOCs to improve their security posture. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in sectors with high exposure to malware threats such as finance, critical infrastructure, and government entities.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools to enhance detection of related malware activity. 2. Regularly update threat intelligence feeds and ensure automated ingestion of new IOCs to maintain up-to-date defenses. 3. Conduct targeted threat hunting exercises using these IOCs to identify any latent infections or suspicious activity within organizational networks. 4. Enhance employee awareness and training on malware threats, emphasizing the importance of recognizing phishing attempts and suspicious communications that may deliver malware. 5. Implement network segmentation and strict access controls to limit the potential impact of malware infections. 6. Collaborate with national and European cybersecurity information sharing organizations to exchange intelligence and validate the relevance of these IOCs within local threat landscapes. 7. Since no patches or specific vulnerabilities are associated, focus on strengthening general malware defenses, including timely software updates, application whitelisting, and robust backup strategies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- url: http://121.34.150.119:37505/mozi.m
- url: http://27.40.86.210:55141/mozi.m
- file: 47.103.42.161
- hash: 8022
- file: 81.68.142.187
- hash: 443
- url: https://www.whatjs.gq/jquery-3.3.1.min.js
- domain: www.whatjs.gq
- file: 154.209.82.138
- hash: 443
- url: https://23.105.221.97:9999/www/handle/doc
- url: https://update.micsoft365.online:2096/5en1bjq8aauym2zgoy3k/ll_93667efa.js
- domain: update.micsoft365.online
- file: 43.156.150.242
- hash: 2096
- url: https://16.162.120.141:60001/load
- url: http://103.233.253.147:8088/_/scs/mail-static/_/js/
- url: http://update.micsoft365.online:2095/5en1bjq8aauym2zgoy3k/ll_93667efa.js
- file: 43.156.150.242
- hash: 2095
- file: 193.35.18.230
- hash: 420
- file: 151.65.67.211
- hash: 443
- url: http://95.216.216.219
- url: http://yamac23.co.vu
- url: http://yamac24.co.vu
- url: https://120.78.82.210/adapt/v7.82/nua9nh12f2gf
- file: 120.78.82.210
- hash: 443
- url: http://49.128.198.3:53/j.ad
- url: http://95.217.31.129/915
- url: http://95.217.29.31/1743
- url: http://bin.hik.icu/ca
- url: https://www.c1oudflare.tk:8443/case.js
- domain: www.c1oudflare.tk
- url: https://yetiorcvar.cf/jquery-3.3.1.min.js
- domain: yetiorcvar.cf
- url: https://bin.hik.icu/cx
- url: http://expoglobalservice.com/releases
- file: 46.142.186.28
- hash: 443
- hash: 5448fe5f744459507d71f6f73deecae110226fdb355969bcbc51c5cc08b840b9
- url: https://107.148.129.142/ca
- file: 107.148.129.142
- hash: 443
- url: https://s15.kaspenskyupdate.com/wp06/wp-includes/po.php
- domain: s15.kaspenskyupdate.com
- url: http://s15.kaspenskyupdate.com/wp06/wp-includes/po.php
- url: https://91.245.254.116/jquery-3.3.1.min.js
- file: 91.245.254.116
- hash: 443
- url: https://new.hik.icu/load
- file: 84.32.190.139
- hash: 443
- url: http://125.124.127.206:8001/ga.js
- url: http://new.hik.icu/fwlink
- file: 84.32.190.139
- hash: 80
- url: https://www.ubds.uk/jquery-3.3.1.min.js
- domain: www.ubds.uk
- file: 20.90.90.172
- hash: 443
- url: https://kratomleaf.strangled.net/jquery-3.3.1.min.js
- domain: kratomleaf.strangled.net
- file: 3.70.239.217
- hash: 443
- url: http://183.57.37.247:6666/dot.gif
- url: http://121.41.108.155:800/fwlink
- url: http://49.234.19.234:8089/match
- url: http://183.57.37.247:8080/visit.js
- file: 185.246.221.138
- hash: 9999
- domain: va-zum.com
- url: http://77.73.133.99/
- url: http://94.131.98.162/
- url: http://37.220.87.12/
- url: http://77.73.134.30/
- url: http://37.220.87.12/78119a08f643e7ea48258f90d06b0d3b
- url: http://94.131.98.162/2ec44083049b46b948f6c18775e29745
- file: 77.73.133.99
- hash: 80
- file: 94.131.98.162
- hash: 80
- file: 37.220.87.12
- hash: 80
- file: 77.73.134.30
- hash: 80
- domain: softeasy.org
- file: 82.115.223.140
- hash: 81
- domain: pushme.us.in
- file: 45.15.156.75
- hash: 80
- url: http://45.15.156.75/
- file: 82.115.223.190
- hash: 21927
- file: 157.90.123.253
- hash: 42705
- file: 49.12.200.37
- hash: 39330
- file: 45.15.157.136
- hash: 7429
- domain: www.softportal.online
- domain: whitegames.wepudas.guru
- domain: bcware.netlify.app
- domain: rootsweb.pw
- domain: icreativecloudpro.com
- domain: cracksoftware.site
- domain: softland-off.com
- domain: astoprograms.com
- domain: vipsoftware.pro
- domain: downloadfree-soft.com
- domain: allsoftware.store
- domain: simplysoft.org
- url: https://85.209.135.49/an.js
- file: 85.209.135.49
- hash: 443
- url: https://service-bzzkyay3-1304672019.bj.apigw.tencentcs.com/api/getit
- domain: service-bzzkyay3-1304672019.bj.apigw.tencentcs.com
- file: 81.70.203.138
- hash: 443
- url: http://185.246.221.111:8081/g.pixel
- url: http://155.94.156.132:10011/load
- url: http://54.199.163.150/match
- file: 54.199.163.150
- hash: 80
- url: https://54.199.163.150/pixel.gif
- file: 54.199.163.150
- hash: 443
ThreatFox IOCs for 2022-12-11
Description
ThreatFox IOCs for 2022-12-11
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on December 11, 2022, categorized under malware and OSINT (Open Source Intelligence). The data appears to be a collection of threat intelligence indicators rather than a specific malware sample or exploit. The threat is classified with a medium severity level and a threat level of 2 on an unspecified scale, indicating a moderate concern. The technical details mention a distribution score of 3, which may imply a moderate spread or dissemination of these IOCs within the threat intelligence community or potentially among threat actors. There are no affected product versions listed, no known exploits in the wild, and no patch links provided, suggesting that this is not a vulnerability tied to a specific software product but rather intelligence related to malware activity or infrastructure. The lack of CWEs (Common Weakness Enumerations) and absence of specific indicators in the data limits the ability to analyze attack vectors or malware behavior in detail. The threat is tagged as 'type:osint' and 'tlp:white,' indicating that the information is openly shareable and intended for broad distribution within the cybersecurity community. Overall, this entry represents a situational awareness update rather than a direct actionable threat, focusing on sharing IOCs that may assist organizations in detecting or mitigating malware-related activities identified around the publication date.
Potential Impact
Given the nature of this threat as a collection of IOCs rather than a direct exploit or vulnerability, the immediate impact on European organizations is indirect. The primary value lies in enhancing detection capabilities and situational awareness against malware campaigns or threat actor infrastructure. If these IOCs correspond to active malware campaigns, organizations that fail to incorporate them into their detection systems may face increased risk of undetected compromise, leading to potential data breaches, operational disruption, or lateral movement within networks. However, since no specific affected products or versions are identified, and no known exploits are reported, the risk of direct exploitation is low. European organizations that rely heavily on OSINT feeds and threat intelligence platforms will benefit most from integrating these IOCs to improve their security posture. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in sectors with high exposure to malware threats such as finance, critical infrastructure, and government entities.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools to enhance detection of related malware activity. 2. Regularly update threat intelligence feeds and ensure automated ingestion of new IOCs to maintain up-to-date defenses. 3. Conduct targeted threat hunting exercises using these IOCs to identify any latent infections or suspicious activity within organizational networks. 4. Enhance employee awareness and training on malware threats, emphasizing the importance of recognizing phishing attempts and suspicious communications that may deliver malware. 5. Implement network segmentation and strict access controls to limit the potential impact of malware infections. 6. Collaborate with national and European cybersecurity information sharing organizations to exchange intelligence and validate the relevance of these IOCs within local threat landscapes. 7. Since no patches or specific vulnerabilities are associated, focus on strengthening general malware defenses, including timely software updates, application whitelisting, and robust backup strategies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- ea7198b8-fa51-4c1c-b691-c61b451245d3
- Original Timestamp
- 1670803383
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://121.34.150.119:37505/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://27.40.86.210:55141/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttps://www.whatjs.gq/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://23.105.221.97:9999/www/handle/doc | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://update.micsoft365.online:2096/5en1bjq8aauym2zgoy3k/ll_93667efa.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://16.162.120.141:60001/load | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://103.233.253.147:8088/_/scs/mail-static/_/js/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://update.micsoft365.online:2095/5en1bjq8aauym2zgoy3k/ll_93667efa.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://95.216.216.219 | Alien botnet C2 (confidence level: 80%) | |
urlhttp://yamac23.co.vu | Alien botnet C2 (confidence level: 80%) | |
urlhttp://yamac24.co.vu | Alien botnet C2 (confidence level: 80%) | |
urlhttps://120.78.82.210/adapt/v7.82/nua9nh12f2gf | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://49.128.198.3:53/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://95.217.31.129/915 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://95.217.29.31/1743 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://bin.hik.icu/ca | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://www.c1oudflare.tk:8443/case.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://yetiorcvar.cf/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://bin.hik.icu/cx | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://expoglobalservice.com/releases | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://107.148.129.142/ca | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://s15.kaspenskyupdate.com/wp06/wp-includes/po.php | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://s15.kaspenskyupdate.com/wp06/wp-includes/po.php | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://91.245.254.116/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://new.hik.icu/load | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://125.124.127.206:8001/ga.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://new.hik.icu/fwlink | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://www.ubds.uk/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://kratomleaf.strangled.net/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://183.57.37.247:6666/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://121.41.108.155:800/fwlink | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://49.234.19.234:8089/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://183.57.37.247:8080/visit.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://77.73.133.99/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://94.131.98.162/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://37.220.87.12/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://77.73.134.30/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://37.220.87.12/78119a08f643e7ea48258f90d06b0d3b | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://94.131.98.162/2ec44083049b46b948f6c18775e29745 | Raccoon botnet C2 (confidence level: 100%) | |
urlhttp://45.15.156.75/ | Raccoon botnet C2 (confidence level: 100%) | |
urlhttps://85.209.135.49/an.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://service-bzzkyay3-1304672019.bj.apigw.tencentcs.com/api/getit | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://185.246.221.111:8081/g.pixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://155.94.156.132:10011/load | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://54.199.163.150/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://54.199.163.150/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) |
File
| Value | Description | Copy |
|---|---|---|
file47.103.42.161 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file81.68.142.187 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.209.82.138 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.156.150.242 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.156.150.242 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file193.35.18.230 | Mirai botnet C2 server (confidence level: 75%) | |
file151.65.67.211 | QakBot botnet C2 server (confidence level: 75%) | |
file120.78.82.210 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file46.142.186.28 | BumbleBee botnet C2 server (confidence level: 75%) | |
file107.148.129.142 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.245.254.116 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file84.32.190.139 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file84.32.190.139 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file20.90.90.172 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file3.70.239.217 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.246.221.138 | Bashlite botnet C2 server (confidence level: 75%) | |
file77.73.133.99 | Raccoon botnet C2 server (confidence level: 100%) | |
file94.131.98.162 | Raccoon botnet C2 server (confidence level: 100%) | |
file37.220.87.12 | Raccoon botnet C2 server (confidence level: 100%) | |
file77.73.134.30 | Raccoon botnet C2 server (confidence level: 100%) | |
file82.115.223.140 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file45.15.156.75 | Raccoon botnet C2 server (confidence level: 100%) | |
file82.115.223.190 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file157.90.123.253 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file49.12.200.37 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file45.15.157.136 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file85.209.135.49 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file81.70.203.138 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file54.199.163.150 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file54.199.163.150 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Hash
| Value | Description | Copy |
|---|---|---|
hash8022 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2096 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2095 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash420 | Mirai botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | BumbleBee botnet C2 server (confidence level: 75%) | |
hash5448fe5f744459507d71f6f73deecae110226fdb355969bcbc51c5cc08b840b9 | Emotet payload (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Bashlite botnet C2 server (confidence level: 75%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash81 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash21927 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash42705 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash39330 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash7429 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Domain
| Value | Description | Copy |
|---|---|---|
domainwww.whatjs.gq | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainupdate.micsoft365.online | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainwww.c1oudflare.tk | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainyetiorcvar.cf | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domains15.kaspenskyupdate.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainwww.ubds.uk | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainkratomleaf.strangled.net | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainva-zum.com | IcedID payload delivery domain (confidence level: 100%) | |
domainsofteasy.org | Raccoon payload delivery domain (confidence level: 75%) | |
domainpushme.us.in | RedLine Stealer botnet C2 domain (confidence level: 50%) | |
domainwww.softportal.online | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainwhitegames.wepudas.guru | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainbcware.netlify.app | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainrootsweb.pw | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainicreativecloudpro.com | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domaincracksoftware.site | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainsoftland-off.com | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainastoprograms.com | Vidar payload delivery domain (confidence level: 75%) | |
domainvipsoftware.pro | Raccoon payload delivery domain (confidence level: 75%) | |
domaindownloadfree-soft.com | Vidar payload delivery domain (confidence level: 75%) | |
domainallsoftware.store | Aurora Stealer payload delivery domain (confidence level: 75%) | |
domainsimplysoft.org | RedLine Stealer payload delivery domain (confidence level: 75%) | |
domainservice-bzzkyay3-1304672019.bj.apigw.tencentcs.com | Cobalt Strike botnet C2 domain (confidence level: 100%) |
Threat ID: 682c7ac1e3e6de8ceb765ed9
Added to database: 5/20/2025, 12:51:13 PM
Last enriched: 6/19/2025, 2:04:24 PM
Last updated: 12/2/2025, 10:42:25 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-01
MediumNew Albiriox Android Malware Developed by Russian Cybercriminals
MediumWebinar: The "Agentic" Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
MediumNew Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control
MediumThreatFox IOCs for 2025-11-30
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.