ThreatFox IOCs for 2022-12-18
ThreatFox IOCs for 2022-12-18
AI Analysis
Technical Summary
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published on December 18, 2022, by ThreatFox, a platform specializing in sharing threat intelligence data. The threat is categorized as malware-related and is associated with OSINT (Open Source Intelligence) data, suggesting that the information primarily consists of observable artifacts such as IP addresses, domains, file hashes, or URLs linked to malicious activity. However, the dataset lacks specific details about the malware family, attack vectors, affected software versions, or exploitation techniques. The absence of known exploits in the wild and the medium severity rating indicate that while the threat is recognized, it may not currently pose an immediate or widespread risk. The technical details include a threat level of 2 (on an unspecified scale), a moderate analysis score, and a distribution score of 3, which may imply moderate dissemination or detection frequency. No Common Weakness Enumerations (CWEs) or patch information are provided, limiting the ability to assess vulnerabilities or remediation steps directly. Overall, this threat intelligence appears to be a collection of IOCs intended to aid detection and response efforts rather than describing a novel or active malware campaign.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the lack of specific exploit details and the absence of known active exploitation. However, the presence of malware-related IOCs in OSINT feeds can indicate ongoing reconnaissance or preparatory stages of cyberattacks. If these IOCs correspond to malware targeting critical infrastructure, financial institutions, or government entities, there could be risks related to data confidentiality breaches, operational disruptions, or reputational damage. The medium severity suggests that while the threat is not immediately critical, organizations should remain vigilant, especially those in sectors with high exposure to cyber threats. The lack of authentication or user interaction details implies that exploitation complexity is unknown, but the availability of IOCs can facilitate proactive detection and containment. European organizations relying on threat intelligence feeds can leverage this information to enhance their security monitoring and incident response capabilities.
Mitigation Recommendations
Given the nature of this threat as a set of IOCs without specific exploit details, mitigation should focus on enhancing detection and response mechanisms. Organizations should: 1) Integrate the provided IOCs into Security Information and Event Management (SIEM) systems and Endpoint Detection and Response (EDR) tools to enable real-time monitoring and alerting for related malicious activity. 2) Conduct regular threat hunting exercises using these IOCs to identify potential compromises early. 3) Maintain up-to-date asset inventories and network segmentation to limit lateral movement if an infection occurs. 4) Ensure that all systems and software are patched promptly, even though no direct patch links are provided, to reduce the attack surface. 5) Train security teams to analyze and contextualize OSINT-derived IOCs to avoid false positives and prioritize response efforts effectively. 6) Collaborate with national and European cybersecurity centers to share intelligence and receive updates on evolving threats. These steps go beyond generic advice by emphasizing the operationalization of OSINT data and proactive threat hunting tailored to the provided IOCs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- url: http://81.70.213.54/jquery-3.3.1.min.js
- file: 81.70.213.54
- hash: 80
- file: 194.55.186.246
- hash: 80
- url: https://18.234.131.47/dot.gif
- file: 23.21.80.137
- hash: 443
- url: https://microupdate.online/owa/
- domain: microupdate.online
- url: https://23.254.225.252/owa/
- file: 23.254.225.252
- hash: 443
- url: http://microupdate.online/owa/
- url: http://23.254.225.252/owa/
- file: 23.254.225.252
- hash: 80
- url: http://47.100.69.112:31111/cm
- url: http://43.138.27.134/cm
- file: 43.138.27.134
- hash: 80
- file: 37.72.168.213
- hash: 80
- url: https://1.12.55.126:8088/image/
- file: 91.208.206.151
- hash: 9506
- file: 160.20.147.235
- hash: 80
- file: 88.198.137.61
- hash: 80
- url: https://t.me/cxjasdjk
- url: http://88.198.137.61/
- url: http://160.20.147.235/
- url: http://119.29.1.212:9088/activity
- url: https://update.huorongsec.com:2083/load
- domain: update.huorongsec.com
- url: http://cloudmane.online/c/msdownload/update/others/2020/10/29136388_
- url: http://77.73.134.23/c/msdownload/update/others/2020/10/29136388_
- file: 77.73.134.23
- hash: 80
- url: http://1.14.198.89:44477/ie9compatviewlist.xml
- url: https://8.134.96.195/activity
- file: 8.134.96.195
- hash: 443
- file: 45.141.58.139
- hash: 443
- file: 43.156.35.69
- hash: 56999
- file: 94.140.112.173
- hash: 443
- file: 5.252.22.202
- hash: 80
- url: http://5.252.22.202/
- file: 193.38.54.53
- hash: 80
- file: 95.217.51.158
- hash: 80
- file: 37.220.87.41
- hash: 80
- url: http://193.38.54.53/
- url: http://95.217.51.158/
- url: http://37.220.87.41/
- url: https://svchost20221216.ddnsfree.com/dynu-3.3.1.min.js
- domain: svchost20221216.ddnsfree.com
- url: https://bin.hik.icu/g.pixel
- url: https://103.233.253.147:2000/jquery-3.3.1.min.js
- url: http://103.233.253.147:8088/jquery-3.3.1.min.js
ThreatFox IOCs for 2022-12-18
Description
ThreatFox IOCs for 2022-12-18
AI-Powered Analysis
Technical Analysis
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published on December 18, 2022, by ThreatFox, a platform specializing in sharing threat intelligence data. The threat is categorized as malware-related and is associated with OSINT (Open Source Intelligence) data, suggesting that the information primarily consists of observable artifacts such as IP addresses, domains, file hashes, or URLs linked to malicious activity. However, the dataset lacks specific details about the malware family, attack vectors, affected software versions, or exploitation techniques. The absence of known exploits in the wild and the medium severity rating indicate that while the threat is recognized, it may not currently pose an immediate or widespread risk. The technical details include a threat level of 2 (on an unspecified scale), a moderate analysis score, and a distribution score of 3, which may imply moderate dissemination or detection frequency. No Common Weakness Enumerations (CWEs) or patch information are provided, limiting the ability to assess vulnerabilities or remediation steps directly. Overall, this threat intelligence appears to be a collection of IOCs intended to aid detection and response efforts rather than describing a novel or active malware campaign.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the lack of specific exploit details and the absence of known active exploitation. However, the presence of malware-related IOCs in OSINT feeds can indicate ongoing reconnaissance or preparatory stages of cyberattacks. If these IOCs correspond to malware targeting critical infrastructure, financial institutions, or government entities, there could be risks related to data confidentiality breaches, operational disruptions, or reputational damage. The medium severity suggests that while the threat is not immediately critical, organizations should remain vigilant, especially those in sectors with high exposure to cyber threats. The lack of authentication or user interaction details implies that exploitation complexity is unknown, but the availability of IOCs can facilitate proactive detection and containment. European organizations relying on threat intelligence feeds can leverage this information to enhance their security monitoring and incident response capabilities.
Mitigation Recommendations
Given the nature of this threat as a set of IOCs without specific exploit details, mitigation should focus on enhancing detection and response mechanisms. Organizations should: 1) Integrate the provided IOCs into Security Information and Event Management (SIEM) systems and Endpoint Detection and Response (EDR) tools to enable real-time monitoring and alerting for related malicious activity. 2) Conduct regular threat hunting exercises using these IOCs to identify potential compromises early. 3) Maintain up-to-date asset inventories and network segmentation to limit lateral movement if an infection occurs. 4) Ensure that all systems and software are patched promptly, even though no direct patch links are provided, to reduce the attack surface. 5) Train security teams to analyze and contextualize OSINT-derived IOCs to avoid false positives and prioritize response efforts effectively. 6) Collaborate with national and European cybersecurity centers to share intelligence and receive updates on evolving threats. These steps go beyond generic advice by emphasizing the operationalization of OSINT data and proactive threat hunting tailored to the provided IOCs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 0fafe05c-ecd5-4245-b24a-df4d5a4d0888
- Original Timestamp
- 1671408183
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttp://81.70.213.54/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://18.234.131.47/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://microupdate.online/owa/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://23.254.225.252/owa/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://microupdate.online/owa/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://23.254.225.252/owa/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://47.100.69.112:31111/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://43.138.27.134/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://1.12.55.126:8088/image/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://t.me/cxjasdjk | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://88.198.137.61/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://160.20.147.235/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://119.29.1.212:9088/activity | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://update.huorongsec.com:2083/load | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://cloudmane.online/c/msdownload/update/others/2020/10/29136388_ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://77.73.134.23/c/msdownload/update/others/2020/10/29136388_ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://1.14.198.89:44477/ie9compatviewlist.xml | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://8.134.96.195/activity | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://5.252.22.202/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://193.38.54.53/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://95.217.51.158/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://37.220.87.41/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://svchost20221216.ddnsfree.com/dynu-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://bin.hik.icu/g.pixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://103.233.253.147:2000/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://103.233.253.147:8088/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file81.70.213.54 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file194.55.186.246 | Gozi botnet C2 server (confidence level: 100%) | |
file23.21.80.137 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file23.254.225.252 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file23.254.225.252 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.138.27.134 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file37.72.168.213 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.208.206.151 | Mirai botnet C2 server (confidence level: 75%) | |
file160.20.147.235 | Vidar botnet C2 server (confidence level: 100%) | |
file88.198.137.61 | Vidar botnet C2 server (confidence level: 100%) | |
file77.73.134.23 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.134.96.195 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.141.58.139 | BumbleBee botnet C2 server (confidence level: 75%) | |
file43.156.35.69 | Mirai botnet C2 server (confidence level: 75%) | |
file94.140.112.173 | IcedID botnet C2 server (confidence level: 75%) | |
file5.252.22.202 | Vidar botnet C2 server (confidence level: 100%) | |
file193.38.54.53 | Vidar botnet C2 server (confidence level: 100%) | |
file95.217.51.158 | Vidar botnet C2 server (confidence level: 100%) | |
file37.220.87.41 | Vidar botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Gozi botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9506 | Mirai botnet C2 server (confidence level: 75%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | BumbleBee botnet C2 server (confidence level: 75%) | |
hash56999 | Mirai botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainmicroupdate.online | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainupdate.huorongsec.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainsvchost20221216.ddnsfree.com | Cobalt Strike botnet C2 domain (confidence level: 100%) |
Threat ID: 682b7baad3ddd8cef2ea69db
Added to database: 5/19/2025, 6:42:50 PM
Last enriched: 6/18/2025, 7:32:12 PM
Last updated: 8/12/2025, 10:46:47 AM
Views: 9
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.