ThreatFox IOCs for 2023-01-23
ThreatFox IOCs for 2023-01-23
AI Analysis
Technical Summary
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on January 23, 2023, categorized under malware with a focus on OSINT (Open Source Intelligence), network activity, and payload delivery. The data appears to be a collection of threat intelligence artifacts rather than a specific malware variant or exploit. The absence of affected versions or specific vulnerable products suggests that this is not a vulnerability report but rather a compilation of observed malicious activities or artifacts used in cyberattacks. The threat level is indicated as 2 (on an unspecified scale), with analysis and distribution scores of 1 and 3 respectively, implying moderate dissemination but limited detailed analysis. No patches are available, and no known exploits in the wild have been reported, indicating that this is primarily intelligence for detection and monitoring purposes rather than an active exploit targeting a specific vulnerability. The lack of technical details such as attack vectors, payload specifics, or exploitation methods limits the ability to provide a granular technical breakdown. However, the categorization under OSINT and network activity suggests these IOCs could be used for identifying malicious network traffic or payload delivery mechanisms, aiding defenders in recognizing and mitigating threats through enhanced detection capabilities.
Potential Impact
For European organizations, the impact of this threat is primarily in the realm of situational awareness and threat detection rather than direct compromise. Since the data represents IOCs related to malware and network activity, organizations can leverage this intelligence to enhance their monitoring and incident response capabilities. The absence of active exploits or patches indicates that the threat does not currently pose an immediate risk of exploitation or system compromise. However, failure to incorporate these IOCs into security monitoring tools could result in delayed detection of malicious activities, potentially allowing attackers to establish footholds or exfiltrate data undetected. Given the medium severity rating, the threat could facilitate reconnaissance or initial payload delivery stages in multi-stage attacks, which, if unmitigated, might lead to more severe consequences such as data breaches or service disruptions. Therefore, the impact is indirect but significant in maintaining robust defense postures.
Mitigation Recommendations
Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems and Intrusion Detection/Prevention Systems (IDS/IPS) to enhance detection of related malicious network activity. Regularly update threat intelligence feeds and correlate these IOCs with internal logs to identify potential indicators of compromise early. Conduct network traffic analysis focusing on unusual payload delivery patterns or communications matching the IOCs to detect potential infiltration attempts. Train security operations center (SOC) personnel to recognize and respond to alerts generated from these IOCs, ensuring timely investigation and containment. Implement network segmentation and strict egress filtering to limit the ability of malware to communicate externally or move laterally within the network. Since no patches are available, emphasize proactive monitoring and incident response readiness rather than reliance on vulnerability remediation. Collaborate with information sharing and analysis centers (ISACs) relevant to the industry and region to stay updated on evolving threat intelligence related to these IOCs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
Indicators of Compromise
- file: 119.29.82.40
- hash: 8053
- file: 3.136.65.236
- hash: 13705
- file: 3.129.187.220
- hash: 13705
- file: 3.133.207.110
- hash: 13705
- file: 3.131.147.49
- hash: 13705
- file: 37.44.238.144
- hash: 1302
- file: 62.204.41.242
- hash: 80
- url: http://3.92.113.197:8082/hubcap/mayo-clinic-radio-full-shows/
- url: http://3.92.113.197:8084/discussion/mayo-clinic-radio-als/
- url: https://8.214.108.207:14443/activity
- file: 66.112.219.122
- hash: 14443
- url: http://208.67.105.87:12338/match
- url: https://44.201.225.29/cm
- file: 44.201.225.29
- hash: 443
- url: https://45.12.253.139/favicon.js
- file: 45.12.253.139
- hash: 443
- url: http://62.233.51.173/jb9szzzbv7/login.php
- url: http://62.233.51.173/jb9szzzbv7/index.php?scr=1
- url: http://62.233.51.173/jb9szzzbv7/index.php
- url: http://62.233.51.173/jb9szzzbv7/plugins/cred64.dll
- url: http://62.233.51.173/jb9szzzbv7/plugins/clip64.dll
- file: 212.193.30.230
- hash: 60705
- file: 45.9.74.6
- hash: 80
- file: 45.15.156.239
- hash: 80
- file: 45.15.156.251
- hash: 80
- file: 45.90.59.19
- hash: 80
- file: 46.151.31.216
- hash: 80
- file: 77.73.134.81
- hash: 80
- file: 77.73.134.82
- hash: 80
- file: 77.91.78.44
- hash: 80
- file: 77.91.78.69
- hash: 80
- file: 77.91.124.79
- hash: 80
- file: 78.153.130.127
- hash: 80
- file: 80.85.139.245
- hash: 80
- file: 83.217.11.19
- hash: 80
- file: 83.217.11.20
- hash: 80
- file: 83.217.11.22
- hash: 80
- file: 83.217.11.23
- hash: 80
- file: 84.32.190.128
- hash: 80
- file: 84.247.51.113
- hash: 80
- file: 85.192.63.161
- hash: 80
- file: 86.105.18.13
- hash: 80
- file: 88.119.161.37
- hash: 80
- file: 88.119.175.232
- hash: 80
- file: 89.44.9.71
- hash: 80
- file: 91.107.180.190
- hash: 80
- file: 142.132.167.230
- hash: 80
- file: 146.70.100.89
- hash: 80
- file: 147.78.47.232
- hash: 80
- file: 172.86.75.81
- hash: 80
- file: 185.173.34.73
- hash: 80
- file: 185.173.34.208
- hash: 80
- file: 185.225.73.102
- hash: 80
- file: 185.246.220.203
- hash: 80
- file: 185.253.96.110
- hash: 80
- file: 188.119.113.237
- hash: 80
- file: 193.149.185.13
- hash: 80
- file: 193.149.187.53
- hash: 80
- file: 194.5.177.193
- hash: 80
- file: 194.87.199.101
- hash: 80
- file: 195.123.241.57
- hash: 80
- file: 45.128.234.198
- hash: 6888
- file: 45.15.156.175
- hash: 8081
- file: 45.15.156.224
- hash: 8081
- file: 45.15.156.234
- hash: 8081
- file: 45.15.156.242
- hash: 8081
- file: 45.15.156.246
- hash: 8081
- file: 45.15.156.249
- hash: 8081
- file: 45.15.156.250
- hash: 8081
- file: 45.61.139.86
- hash: 8081
- file: 45.151.144.19
- hash: 8081
- file: 65.109.216.5
- hash: 8081
- file: 77.91.124.12
- hash: 8081
- file: 95.215.108.15
- hash: 8081
- file: 95.217.235.8
- hash: 8081
- file: 135.181.107.76
- hash: 8081
- file: 193.188.23.177
- hash: 8081
- file: 212.192.31.29
- hash: 8081
- url: http://45.15.156.175/auth
- url: http://45.15.156.234/auth
- url: http://45.15.156.246/auth
- url: http://45.15.156.250/auth
- url: http://45.61.139.86/auth
- url: http://45.151.144.19/auth
- url: http://95.215.108.15/auth
- url: http://95.217.235.8/auth
- url: http://135.181.107.76/auth
- url: http://193.188.23.177/auth
- url: http://212.192.31.29/auth
- file: 5.75.168.236
- hash: 443
- file: 62.233.51.121
- hash: 443
- file: 62.233.51.122
- hash: 443
- file: 144.76.33.241
- hash: 443
- file: 179.43.187.197
- hash: 443
- file: 179.43.187.201
- hash: 443
- file: 179.43.187.217
- hash: 443
- file: 193.37.70.80
- hash: 443
- file: 194.180.48.19
- hash: 443
- url: http://65.109.208.142/851
- url: http://65.109.208.142/580
- url: http://65.109.208.142/237
- url: http://65.109.208.142/701
- url: http://65.109.208.142/19
- url: http://195.201.251.109/701
- url: http://65.109.208.140/20
- url: http://116.202.0.132/784
- file: 91.231.84.41
- hash: 52651
- file: 10.5.175.21
- hash: 52651
- url: http://142.132.228.93/
- url: http://62.204.41.88/9vdvvvjsw/index.php
- file: 142.202.242.197
- hash: 35704
- file: 194.226.121.225
- hash: 12286
- url: http://194.67.87.32/securetrafficdatalife.php
- file: 208.85.21.88
- hash: 45110
- hash: 43723dfa8e7a99421cb5d50cf28c86a5
- file: 3.133.207.110
- hash: 13961
- hash: 8ee1e415d1d3db2d58b5929ef9068408a3041a870a6115c3f62794aec88d5687
- domain: gfduytsdf.shop
- domain: log.gfduytsdf.shop
- file: 3.1.208.125
- hash: 443
- file: 46.8.210.28
- hash: 445
- file: 62.173.138.24
- hash: 445
- url: http://193.0.178.235/drew/
- url: http://62.173.149.10/drew/
- url: http://31.41.44.27/drew/
- file: 193.0.178.235
- hash: 80
- file: 62.173.149.10
- hash: 80
- file: 31.41.44.27
- hash: 80
- file: 62.173.149.123
- hash: 443
- file: 62.173.145.119
- hash: 443
- file: 31.41.44.185
- hash: 443
- file: 31.41.44.184
- hash: 443
- file: 193.233.175.18
- hash: 443
- file: 194.116.162.13
- hash: 443
- file: 46.8.19.215
- hash: 443
- file: 46.8.210.177
- hash: 443
- domain: tibloautonef.com
- domain: nomaeradiur.com
- domain: trotimera.com
- domain: swordnifhing.com
- domain: trustopaj.com
- domain: ulrtonemio.com
- domain: rolewzullo.com
- domain: trastbaki.com
- domain: iskopila.com
- domain: scanproluet.com
- domain: spotifrezise.com
- file: 62.173.139.250
- hash: 30266
- file: 45.139.105.174
- hash: 6320
- file: 3.133.207.110
- hash: 18766
- file: 3.129.187.220
- hash: 18766
- file: 3.131.147.49
- hash: 18766
- file: 3.136.65.236
- hash: 18766
- file: 46.8.210.26
- hash: 445
- file: 46.8.210.29
- hash: 445
- file: 62.173.140.128
- hash: 445
- file: 62.173.140.192
- hash: 445
- file: 185.31.160.229
- hash: 445
- file: 193.233.175.99
- hash: 445
- file: 193.0.178.237
- hash: 445
- file: 194.116.162.14
- hash: 445
- file: 184.75.223.235
- hash: 3847
- file: 185.252.178.121
- hash: 6126
- file: 18.197.239.109
- hash: 10146
- file: 3.69.115.178
- hash: 10146
- url: http://35.88.90.115/dz
- url: https://goupdatemic.online:8888/c/msdownload/update/others/2020/10/29136388_
- url: https://77.73.134.51:8888/c/msdownload/update/others/2020/10/29136388_
- file: 3.69.157.220
- hash: 10146
- file: 3.66.38.117
- hash: 10146
- file: 49.232.21.201
- hash: 9091
- file: 91.215.85.196
- hash: 80
- file: 62.233.51.173
- hash: 80
- file: 45.15.156.246
- hash: 80
- file: 45.15.156.234
- hash: 80
- file: 45.15.156.175
- hash: 80
- file: 193.188.23.177
- hash: 80
- file: 135.181.107.76
- hash: 80
- file: 95.217.235.8
- hash: 80
- file: 95.215.108.15
- hash: 80
- file: 45.61.139.86
- hash: 80
- file: 62.204.41.88
- hash: 80
- file: 172.104.244.136
- hash: 23
- file: 136.36.83.93
- hash: 8888
- file: 31.192.232.48
- hash: 1991
- url: http://neverchurka.ml/linemultiflower.php
- url: https://drgb74ojbgxg7.cloudfront.net/ku
- domain: drgb74ojbgxg7.cloudfront.net
- file: 3.17.7.232
- hash: 13186
- file: 5.75.149.127
- hash: 80
- file: 37.44.238.144
- hash: 60195
- file: 3.134.39.220
- hash: 13186
- file: 185.225.74.148
- hash: 2404
- file: 154.12.234.207
- hash: 4782
- file: 91.192.100.5
- hash: 20391
- file: 194.180.49.225
- hash: 1780
- domain: wwwirsforms-com.top
- domain: libre-offlce.top
- domain: adobecom.top
- domain: www-adobe-com.top
- domain: microsoft-teamscom.top
- domain: wwwteamviewercom.top
- domain: www-discord-com.top
- domain: www-irs-form.top
- domain: www-onenote-com.top
- domain: wwwslackcom.top
- domain: wwwanydesk-com.top
- url: http://18.117.193.148//receive.php
- file: 154.12.234.207
- hash: 8808
- file: 45.137.22.77
- hash: 8780
- url: http://185.225.74.69/mad/inc/1c468152070648.php
- url: http://65.109.210.114/
- file: 90.156.230.53
- hash: 8080
- hash: 9f30f4572aabbaf043659e43faa646619d525947b5ac7142106edf4e9a41136a
- url: https://t.me/litlebey
- url: http://5.75.149.127/
- file: 65.109.210.114
- hash: 80
- hash: 9fcc0a561c8f144be6a6988185befd05
- url: http://89.185.84.43/20.01/pl/lot.djvu
- hash: 1994fa4183b160cfb8931100f218b331
- hash: 801b0800b59e45135865c2c96257399e
- hash: ebf7728724651e00053e83e4cadf4885
- url: http://195.201.251.109/15
- url: http://195.201.251.109/682
- url: http://65.109.208.142/862
- url: http://65.21.58.6/784
- file: 62.204.41.24
- hash: 44076
- file: 62.204.41.175
- hash: 44271
- file: 198.98.51.250
- hash: 443
- domain: frun.digital
- url: http://frun.digital/letsgo.php
- file: 194.15.112.63
- hash: 443
- file: 164.92.67.126
- hash: 17044
- file: 45.151.144.19
- hash: 80
- file: 45.15.156.250
- hash: 80
- file: 45.15.156.249
- hash: 80
- file: 77.83.242.206
- hash: 4782
- file: 37.220.31.17
- hash: 443
- file: 37.220.31.17
- hash: 2095
- file: 37.220.31.17
- hash: 8443
- file: 44.212.9.14
- hash: 8443
- file: 144.217.36.75
- hash: 10011
- file: 149.154.158.56
- hash: 3190
- file: 65.109.139.121
- hash: 28859
- domain: jcdruzgqg.buzz
- domain: mdjisnele.best
- domain: pwlzcblyl.icu
- domain: tesfwjcun.shop
- domain: zeoccodxa.click
- domain: bustlingservidor.one
- domain: chevalprovedores.one
- domain: cloisteredkona.one
- domain: faoprovedores.one
- domain: harmoniousutter.one
- domain: jazzysmartie.one
- domain: liaresolute.one
- domain: nondescriptresolute.one
- domain: provedoresdesu.one
- domain: resolutelitz.one
- domain: thedebonairutter.one
- domain: utterpya.one
- domain: uttproeser.one
- url: http://83.217.11.23/
- url: http://88.119.175.149:9999/cm
- url: https://vd-ntds.com/_/scs/mail-static/_/js/
- domain: vd-ntds.com
- file: 91.215.85.196
- hash: 443
- url: http://konactoratec.xyz/_/scs/mail-static/_/js/
- domain: konactoratec.xyz
- file: 179.43.175.220
- hash: 80
- url: http://137.220.135.199:6789/dot.gif
- file: 137.220.135.206
- hash: 6789
- url: https://208.67.105.87:13443/pixel.gif
- file: 5.255.107.149
- hash: 443
- url: http://vd-ntds.com/_/scs/mail-static/_/js/
- file: 137.220.135.200
- hash: 6789
- file: 20.4.6.16
- hash: 43521
- file: 18.197.239.109
- hash: 11548
- file: 116.108.48.70
- hash: 374
ThreatFox IOCs for 2023-01-23
Description
ThreatFox IOCs for 2023-01-23
AI-Powered Analysis
Technical Analysis
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on January 23, 2023, categorized under malware with a focus on OSINT (Open Source Intelligence), network activity, and payload delivery. The data appears to be a collection of threat intelligence artifacts rather than a specific malware variant or exploit. The absence of affected versions or specific vulnerable products suggests that this is not a vulnerability report but rather a compilation of observed malicious activities or artifacts used in cyberattacks. The threat level is indicated as 2 (on an unspecified scale), with analysis and distribution scores of 1 and 3 respectively, implying moderate dissemination but limited detailed analysis. No patches are available, and no known exploits in the wild have been reported, indicating that this is primarily intelligence for detection and monitoring purposes rather than an active exploit targeting a specific vulnerability. The lack of technical details such as attack vectors, payload specifics, or exploitation methods limits the ability to provide a granular technical breakdown. However, the categorization under OSINT and network activity suggests these IOCs could be used for identifying malicious network traffic or payload delivery mechanisms, aiding defenders in recognizing and mitigating threats through enhanced detection capabilities.
Potential Impact
For European organizations, the impact of this threat is primarily in the realm of situational awareness and threat detection rather than direct compromise. Since the data represents IOCs related to malware and network activity, organizations can leverage this intelligence to enhance their monitoring and incident response capabilities. The absence of active exploits or patches indicates that the threat does not currently pose an immediate risk of exploitation or system compromise. However, failure to incorporate these IOCs into security monitoring tools could result in delayed detection of malicious activities, potentially allowing attackers to establish footholds or exfiltrate data undetected. Given the medium severity rating, the threat could facilitate reconnaissance or initial payload delivery stages in multi-stage attacks, which, if unmitigated, might lead to more severe consequences such as data breaches or service disruptions. Therefore, the impact is indirect but significant in maintaining robust defense postures.
Mitigation Recommendations
Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems and Intrusion Detection/Prevention Systems (IDS/IPS) to enhance detection of related malicious network activity. Regularly update threat intelligence feeds and correlate these IOCs with internal logs to identify potential indicators of compromise early. Conduct network traffic analysis focusing on unusual payload delivery patterns or communications matching the IOCs to detect potential infiltration attempts. Train security operations center (SOC) personnel to recognize and respond to alerts generated from these IOCs, ensuring timely investigation and containment. Implement network segmentation and strict egress filtering to limit the ability of malware to communicate externally or move laterally within the network. Since no patches are available, emphasize proactive monitoring and incident response readiness rather than reliance on vulnerability remediation. Collaborate with information sharing and analysis centers (ISACs) relevant to the industry and region to stay updated on evolving threat intelligence related to these IOCs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- fbc4818b-0b8a-4d17-954d-cd39f11ff688
- Original Timestamp
- 1674518584
Indicators of Compromise
File
Value | Description | Copy |
---|---|---|
file119.29.82.40 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file3.136.65.236 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.129.187.220 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.133.207.110 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.131.147.49 | NjRAT botnet C2 server (confidence level: 100%) | |
file37.44.238.144 | Mirai botnet C2 server (confidence level: 75%) | |
file62.204.41.242 | Amadey botnet C2 server (confidence level: 50%) | |
file66.112.219.122 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file44.201.225.29 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.12.253.139 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file212.193.30.230 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file45.9.74.6 | Raccoon botnet C2 server (confidence level: 100%) | |
file45.15.156.239 | Raccoon botnet C2 server (confidence level: 100%) | |
file45.15.156.251 | Raccoon botnet C2 server (confidence level: 100%) | |
file45.90.59.19 | Raccoon botnet C2 server (confidence level: 100%) | |
file46.151.31.216 | Raccoon botnet C2 server (confidence level: 100%) | |
file77.73.134.81 | Raccoon botnet C2 server (confidence level: 100%) | |
file77.73.134.82 | Raccoon botnet C2 server (confidence level: 100%) | |
file77.91.78.44 | Raccoon botnet C2 server (confidence level: 100%) | |
file77.91.78.69 | Raccoon botnet C2 server (confidence level: 100%) | |
file77.91.124.79 | Raccoon botnet C2 server (confidence level: 100%) | |
file78.153.130.127 | Raccoon botnet C2 server (confidence level: 100%) | |
file80.85.139.245 | Raccoon botnet C2 server (confidence level: 100%) | |
file83.217.11.19 | Raccoon botnet C2 server (confidence level: 100%) | |
file83.217.11.20 | Raccoon botnet C2 server (confidence level: 100%) | |
file83.217.11.22 | Raccoon botnet C2 server (confidence level: 100%) | |
file83.217.11.23 | Raccoon botnet C2 server (confidence level: 100%) | |
file84.32.190.128 | Raccoon botnet C2 server (confidence level: 100%) | |
file84.247.51.113 | Raccoon botnet C2 server (confidence level: 100%) | |
file85.192.63.161 | Raccoon botnet C2 server (confidence level: 100%) | |
file86.105.18.13 | Raccoon botnet C2 server (confidence level: 100%) | |
file88.119.161.37 | Raccoon botnet C2 server (confidence level: 100%) | |
file88.119.175.232 | Raccoon botnet C2 server (confidence level: 100%) | |
file89.44.9.71 | Raccoon botnet C2 server (confidence level: 100%) | |
file91.107.180.190 | Raccoon botnet C2 server (confidence level: 100%) | |
file142.132.167.230 | Raccoon botnet C2 server (confidence level: 100%) | |
file146.70.100.89 | Raccoon botnet C2 server (confidence level: 100%) | |
file147.78.47.232 | Raccoon botnet C2 server (confidence level: 100%) | |
file172.86.75.81 | Raccoon botnet C2 server (confidence level: 100%) | |
file185.173.34.73 | Raccoon botnet C2 server (confidence level: 100%) | |
file185.173.34.208 | Raccoon botnet C2 server (confidence level: 100%) | |
file185.225.73.102 | Raccoon botnet C2 server (confidence level: 100%) | |
file185.246.220.203 | Raccoon botnet C2 server (confidence level: 100%) | |
file185.253.96.110 | Raccoon botnet C2 server (confidence level: 100%) | |
file188.119.113.237 | Raccoon botnet C2 server (confidence level: 100%) | |
file193.149.185.13 | Raccoon botnet C2 server (confidence level: 100%) | |
file193.149.187.53 | Raccoon botnet C2 server (confidence level: 100%) | |
file194.5.177.193 | Raccoon botnet C2 server (confidence level: 100%) | |
file194.87.199.101 | Raccoon botnet C2 server (confidence level: 100%) | |
file195.123.241.57 | Raccoon botnet C2 server (confidence level: 100%) | |
file45.128.234.198 | Mirai botnet C2 server (confidence level: 75%) | |
file45.15.156.175 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file45.15.156.224 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file45.15.156.234 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file45.15.156.242 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file45.15.156.246 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file45.15.156.249 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file45.15.156.250 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file45.61.139.86 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file45.151.144.19 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file65.109.216.5 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file77.91.124.12 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file95.215.108.15 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file95.217.235.8 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file135.181.107.76 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file193.188.23.177 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file212.192.31.29 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
file5.75.168.236 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file62.233.51.121 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file62.233.51.122 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file144.76.33.241 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file179.43.187.197 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file179.43.187.201 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file179.43.187.217 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file193.37.70.80 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file194.180.48.19 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file91.231.84.41 | Remcos botnet C2 server (confidence level: 100%) | |
file10.5.175.21 | Remcos botnet C2 server (confidence level: 75%) | |
file142.202.242.197 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file194.226.121.225 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file208.85.21.88 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file3.133.207.110 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.1.208.125 | Unknown malware botnet C2 server (confidence level: 75%) | |
file46.8.210.28 | ISFB payload delivery server (confidence level: 75%) | |
file62.173.138.24 | ISFB payload delivery server (confidence level: 75%) | |
file193.0.178.235 | ISFB botnet C2 server (confidence level: 75%) | |
file62.173.149.10 | ISFB botnet C2 server (confidence level: 75%) | |
file31.41.44.27 | ISFB botnet C2 server (confidence level: 75%) | |
file62.173.149.123 | ISFB botnet C2 server (confidence level: 75%) | |
file62.173.145.119 | ISFB botnet C2 server (confidence level: 75%) | |
file31.41.44.185 | ISFB botnet C2 server (confidence level: 75%) | |
file31.41.44.184 | ISFB botnet C2 server (confidence level: 75%) | |
file193.233.175.18 | ISFB botnet C2 server (confidence level: 75%) | |
file194.116.162.13 | ISFB botnet C2 server (confidence level: 75%) | |
file46.8.19.215 | ISFB botnet C2 server (confidence level: 75%) | |
file46.8.210.177 | ISFB botnet C2 server (confidence level: 75%) | |
file62.173.139.250 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file45.139.105.174 | Remcos botnet C2 server (confidence level: 75%) | |
file3.133.207.110 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.129.187.220 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.131.147.49 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.136.65.236 | NjRAT botnet C2 server (confidence level: 100%) | |
file46.8.210.26 | ISFB payload delivery server (confidence level: 75%) | |
file46.8.210.29 | ISFB payload delivery server (confidence level: 75%) | |
file62.173.140.128 | ISFB payload delivery server (confidence level: 75%) | |
file62.173.140.192 | ISFB payload delivery server (confidence level: 75%) | |
file185.31.160.229 | ISFB payload delivery server (confidence level: 75%) | |
file193.233.175.99 | ISFB payload delivery server (confidence level: 75%) | |
file193.0.178.237 | ISFB payload delivery server (confidence level: 75%) | |
file194.116.162.14 | ISFB payload delivery server (confidence level: 75%) | |
file184.75.223.235 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file185.252.178.121 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file18.197.239.109 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.69.115.178 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.69.157.220 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.66.38.117 | NjRAT botnet C2 server (confidence level: 100%) | |
file49.232.21.201 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file91.215.85.196 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file62.233.51.173 | Amadey botnet C2 server (confidence level: 50%) | |
file45.15.156.246 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file45.15.156.234 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file45.15.156.175 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file193.188.23.177 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file135.181.107.76 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file95.217.235.8 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file95.215.108.15 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file45.61.139.86 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file62.204.41.88 | Amadey botnet C2 server (confidence level: 50%) | |
file172.104.244.136 | Bashlite botnet C2 server (confidence level: 75%) | |
file136.36.83.93 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file31.192.232.48 | Remcos botnet C2 server (confidence level: 75%) | |
file3.17.7.232 | NjRAT botnet C2 server (confidence level: 100%) | |
file5.75.149.127 | Vidar botnet C2 server (confidence level: 100%) | |
file37.44.238.144 | Mirai botnet C2 server (confidence level: 75%) | |
file3.134.39.220 | NjRAT botnet C2 server (confidence level: 100%) | |
file185.225.74.148 | Remcos botnet C2 server (confidence level: 75%) | |
file154.12.234.207 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file91.192.100.5 | Ave Maria botnet C2 server (confidence level: 100%) | |
file194.180.49.225 | STRRAT botnet C2 server (confidence level: 100%) | |
file154.12.234.207 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.137.22.77 | Remcos botnet C2 server (confidence level: 100%) | |
file90.156.230.53 | Ficker Stealer botnet C2 server (confidence level: 100%) | |
file65.109.210.114 | Vidar botnet C2 server (confidence level: 100%) | |
file62.204.41.24 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file62.204.41.175 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file198.98.51.250 | BumbleBee botnet C2 server (confidence level: 75%) | |
file194.15.112.63 | Unknown malware botnet C2 server (confidence level: 75%) | |
file164.92.67.126 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file45.151.144.19 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file45.15.156.250 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file45.15.156.249 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
file77.83.242.206 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file37.220.31.17 | BianLian botnet C2 server (confidence level: 50%) | |
file37.220.31.17 | BianLian botnet C2 server (confidence level: 50%) | |
file37.220.31.17 | BianLian botnet C2 server (confidence level: 50%) | |
file44.212.9.14 | BianLian botnet C2 server (confidence level: 50%) | |
file144.217.36.75 | BianLian botnet C2 server (confidence level: 50%) | |
file149.154.158.56 | BianLian botnet C2 server (confidence level: 50%) | |
file65.109.139.121 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file91.215.85.196 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file179.43.175.220 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file137.220.135.206 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file5.255.107.149 | IcedID botnet C2 server (confidence level: 75%) | |
file137.220.135.200 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file20.4.6.16 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file18.197.239.109 | NjRAT botnet C2 server (confidence level: 100%) | |
file116.108.48.70 | AsyncRAT botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash8053 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash13705 | NjRAT botnet C2 server (confidence level: 100%) | |
hash13705 | NjRAT botnet C2 server (confidence level: 100%) | |
hash13705 | NjRAT botnet C2 server (confidence level: 100%) | |
hash13705 | NjRAT botnet C2 server (confidence level: 100%) | |
hash1302 | Mirai botnet C2 server (confidence level: 75%) | |
hash80 | Amadey botnet C2 server (confidence level: 50%) | |
hash14443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash60705 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash80 | Raccoon botnet C2 server (confidence level: 100%) | |
hash6888 | Mirai botnet C2 server (confidence level: 75%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash8081 | Aurora Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash52651 | Remcos botnet C2 server (confidence level: 100%) | |
hash52651 | Remcos botnet C2 server (confidence level: 75%) | |
hash35704 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash12286 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash45110 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash43723dfa8e7a99421cb5d50cf28c86a5 | Agent Tesla payload (confidence level: 50%) | |
hash13961 | NjRAT botnet C2 server (confidence level: 100%) | |
hash8ee1e415d1d3db2d58b5929ef9068408a3041a870a6115c3f62794aec88d5687 | Unknown malware payload (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash80 | ISFB botnet C2 server (confidence level: 75%) | |
hash80 | ISFB botnet C2 server (confidence level: 75%) | |
hash80 | ISFB botnet C2 server (confidence level: 75%) | |
hash443 | ISFB botnet C2 server (confidence level: 75%) | |
hash443 | ISFB botnet C2 server (confidence level: 75%) | |
hash443 | ISFB botnet C2 server (confidence level: 75%) | |
hash443 | ISFB botnet C2 server (confidence level: 75%) | |
hash443 | ISFB botnet C2 server (confidence level: 75%) | |
hash443 | ISFB botnet C2 server (confidence level: 75%) | |
hash443 | ISFB botnet C2 server (confidence level: 75%) | |
hash443 | ISFB botnet C2 server (confidence level: 75%) | |
hash30266 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash6320 | Remcos botnet C2 server (confidence level: 75%) | |
hash18766 | NjRAT botnet C2 server (confidence level: 100%) | |
hash18766 | NjRAT botnet C2 server (confidence level: 100%) | |
hash18766 | NjRAT botnet C2 server (confidence level: 100%) | |
hash18766 | NjRAT botnet C2 server (confidence level: 100%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash445 | ISFB payload delivery server (confidence level: 75%) | |
hash3847 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash6126 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash10146 | NjRAT botnet C2 server (confidence level: 100%) | |
hash10146 | NjRAT botnet C2 server (confidence level: 100%) | |
hash10146 | NjRAT botnet C2 server (confidence level: 100%) | |
hash10146 | NjRAT botnet C2 server (confidence level: 100%) | |
hash9091 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Amadey botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Amadey botnet C2 server (confidence level: 50%) | |
hash23 | Bashlite botnet C2 server (confidence level: 75%) | |
hash8888 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash1991 | Remcos botnet C2 server (confidence level: 75%) | |
hash13186 | NjRAT botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash60195 | Mirai botnet C2 server (confidence level: 75%) | |
hash13186 | NjRAT botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 75%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash20391 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash1780 | STRRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8780 | Remcos botnet C2 server (confidence level: 100%) | |
hash8080 | Ficker Stealer botnet C2 server (confidence level: 100%) | |
hash9f30f4572aabbaf043659e43faa646619d525947b5ac7142106edf4e9a41136a | Emotet payload (confidence level: 75%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash9fcc0a561c8f144be6a6988185befd05 | Unknown malware payload (confidence level: 50%) | |
hash1994fa4183b160cfb8931100f218b331 | Unknown malware payload (confidence level: 100%) | |
hash801b0800b59e45135865c2c96257399e | Unknown malware payload (confidence level: 100%) | |
hashebf7728724651e00053e83e4cadf4885 | Unknown malware payload (confidence level: 100%) | |
hash44076 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash44271 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | BumbleBee botnet C2 server (confidence level: 75%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 75%) | |
hash17044 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash80 | Aurora Stealer botnet C2 server (confidence level: 50%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | BianLian botnet C2 server (confidence level: 50%) | |
hash2095 | BianLian botnet C2 server (confidence level: 50%) | |
hash8443 | BianLian botnet C2 server (confidence level: 50%) | |
hash8443 | BianLian botnet C2 server (confidence level: 50%) | |
hash10011 | BianLian botnet C2 server (confidence level: 50%) | |
hash3190 | BianLian botnet C2 server (confidence level: 50%) | |
hash28859 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash6789 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash6789 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash43521 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash11548 | NjRAT botnet C2 server (confidence level: 100%) | |
hash374 | AsyncRAT botnet C2 server (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttp://3.92.113.197:8082/hubcap/mayo-clinic-radio-full-shows/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://3.92.113.197:8084/discussion/mayo-clinic-radio-als/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://8.214.108.207:14443/activity | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://208.67.105.87:12338/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://44.201.225.29/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://45.12.253.139/favicon.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://62.233.51.173/jb9szzzbv7/login.php | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://62.233.51.173/jb9szzzbv7/index.php?scr=1 | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://62.233.51.173/jb9szzzbv7/index.php | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://62.233.51.173/jb9szzzbv7/plugins/cred64.dll | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://62.233.51.173/jb9szzzbv7/plugins/clip64.dll | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://45.15.156.175/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://45.15.156.234/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://45.15.156.246/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://45.15.156.250/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://45.61.139.86/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://45.151.144.19/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://95.215.108.15/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://95.217.235.8/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://135.181.107.76/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://193.188.23.177/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://212.192.31.29/auth | Aurora Stealer botnet C2 (confidence level: 100%) | |
urlhttp://65.109.208.142/851 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://65.109.208.142/580 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://65.109.208.142/237 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://65.109.208.142/701 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://65.109.208.142/19 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://195.201.251.109/701 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://65.109.208.140/20 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://116.202.0.132/784 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://142.132.228.93/ | Arkei Stealer botnet C2 (confidence level: 100%) | |
urlhttp://62.204.41.88/9vdvvvjsw/index.php | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://194.67.87.32/securetrafficdatalife.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://193.0.178.235/drew/ | ISFB botnet C2 (confidence level: 100%) | |
urlhttp://62.173.149.10/drew/ | ISFB botnet C2 (confidence level: 100%) | |
urlhttp://31.41.44.27/drew/ | ISFB botnet C2 (confidence level: 100%) | |
urlhttp://35.88.90.115/dz | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://goupdatemic.online:8888/c/msdownload/update/others/2020/10/29136388_ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://77.73.134.51:8888/c/msdownload/update/others/2020/10/29136388_ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://neverchurka.ml/linemultiflower.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://drgb74ojbgxg7.cloudfront.net/ku | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://18.117.193.148//receive.php | BlackNET RAT botnet C2 (confidence level: 100%) | |
urlhttp://185.225.74.69/mad/inc/1c468152070648.php | Agent Tesla botnet C2 (confidence level: 100%) | |
urlhttp://65.109.210.114/ | Arkei Stealer botnet C2 (confidence level: 100%) | |
urlhttps://t.me/litlebey | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://5.75.149.127/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://89.185.84.43/20.01/pl/lot.djvu | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://195.201.251.109/15 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://195.201.251.109/682 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://65.109.208.142/862 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://65.21.58.6/784 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://frun.digital/letsgo.php | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://83.217.11.23/ | RecordBreaker botnet C2 (confidence level: 100%) | |
urlhttp://88.119.175.149:9999/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://vd-ntds.com/_/scs/mail-static/_/js/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://konactoratec.xyz/_/scs/mail-static/_/js/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://137.220.135.199:6789/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://208.67.105.87:13443/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://vd-ntds.com/_/scs/mail-static/_/js/ | Cobalt Strike botnet C2 (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domaingfduytsdf.shop | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainlog.gfduytsdf.shop | Unknown malware botnet C2 domain (confidence level: 100%) | |
domaintibloautonef.com | IcedID botnet C2 domain (confidence level: 50%) | |
domainnomaeradiur.com | IcedID botnet C2 domain (confidence level: 50%) | |
domaintrotimera.com | IcedID botnet C2 domain (confidence level: 50%) | |
domainswordnifhing.com | IcedID botnet C2 domain (confidence level: 50%) | |
domaintrustopaj.com | IcedID botnet C2 domain (confidence level: 50%) | |
domainulrtonemio.com | IcedID botnet C2 domain (confidence level: 50%) | |
domainrolewzullo.com | IcedID botnet C2 domain (confidence level: 50%) | |
domaintrastbaki.com | IcedID botnet C2 domain (confidence level: 50%) | |
domainiskopila.com | IcedID botnet C2 domain (confidence level: 50%) | |
domainscanproluet.com | IcedID botnet C2 domain (confidence level: 50%) | |
domainspotifrezise.com | IcedID botnet C2 domain (confidence level: 50%) | |
domaindrgb74ojbgxg7.cloudfront.net | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainwwwirsforms-com.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainlibre-offlce.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainadobecom.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainwww-adobe-com.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainmicrosoft-teamscom.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainwwwteamviewercom.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainwww-discord-com.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainwww-irs-form.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainwww-onenote-com.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainwwwslackcom.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainwwwanydesk-com.top | IcedID Downloader payload delivery domain (confidence level: 100%) | |
domainfrun.digital | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainjcdruzgqg.buzz | Astaroth botnet C2 domain (confidence level: 100%) | |
domainmdjisnele.best | Astaroth botnet C2 domain (confidence level: 100%) | |
domainpwlzcblyl.icu | Astaroth botnet C2 domain (confidence level: 100%) | |
domaintesfwjcun.shop | Astaroth botnet C2 domain (confidence level: 100%) | |
domainzeoccodxa.click | Astaroth botnet C2 domain (confidence level: 100%) | |
domainbustlingservidor.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainchevalprovedores.one | Astaroth payload delivery domain (confidence level: 100%) | |
domaincloisteredkona.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainfaoprovedores.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainharmoniousutter.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainjazzysmartie.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainliaresolute.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainnondescriptresolute.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainprovedoresdesu.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainresolutelitz.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainthedebonairutter.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainutterpya.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainuttproeser.one | Astaroth payload delivery domain (confidence level: 100%) | |
domainvd-ntds.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainkonactoratec.xyz | Cobalt Strike botnet C2 domain (confidence level: 100%) |
Threat ID: 682acdc3bbaf20d303f1de23
Added to database: 5/19/2025, 6:20:51 AM
Last enriched: 6/18/2025, 8:35:47 AM
Last updated: 8/1/2025, 6:09:46 AM
Views: 9
Related Threats
ThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.