ThreatFox IOCs for 2023-03-13
ThreatFox IOCs for 2023-03-13
AI Analysis
Technical Summary
The provided threat information pertains to a malware-related report titled "ThreatFox IOCs for 2023-03-13," sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The threat is categorized under "type:osint," indicating it is related to open-source intelligence, and is tagged with TLP:WHITE, meaning the information is intended for public sharing without restrictions. The report does not specify affected software versions, products, or detailed technical characteristics of the malware, nor does it include any indicators of compromise (IOCs) such as hashes, IP addresses, or domains. The severity is marked as medium, with no known exploits in the wild, and no associated Common Weakness Enumerations (CWEs) or patch links. Technical details include a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, which likely reflect moderate threat presence and dissemination. Given the lack of detailed technical data, this report appears to be a general intelligence update rather than a description of a specific, actively exploited malware variant. The absence of known exploits and detailed IOCs suggests that this threat is either emerging or of limited immediate operational impact. The focus on OSINT implies that the threat intelligence may be useful for situational awareness and preparatory defense rather than indicating an imminent attack vector.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the absence of known exploits and specific affected systems. However, as the threat is categorized as malware-related and distributed with moderate reach, there is a potential risk that it could evolve or be leveraged in targeted campaigns. The medium severity rating suggests that while immediate operational disruption or data compromise is unlikely, organizations should remain vigilant. The lack of detailed IOCs and affected products means that standard detection and prevention mechanisms may not yet be effective, potentially delaying response times if the threat materializes. European entities involved in cybersecurity monitoring, threat intelligence sharing, or those relying heavily on OSINT for defense may find this information useful for enhancing their situational awareness. The threat does not currently indicate direct risks to confidentiality, integrity, or availability but could serve as a precursor to more targeted or sophisticated attacks if further developments arise.
Mitigation Recommendations
Given the limited technical details and absence of known exploits, mitigation should focus on proactive threat intelligence integration and enhanced monitoring. European organizations should: 1) Incorporate ThreatFox and similar OSINT feeds into their security information and event management (SIEM) systems to detect any emerging indicators related to this threat. 2) Maintain up-to-date endpoint protection and malware detection solutions capable of identifying new or unknown threats through behavioral analysis. 3) Engage in active threat intelligence sharing communities to receive timely updates if this malware evolves or gains exploitation capabilities. 4) Conduct regular security awareness training emphasizing the importance of vigilance against emerging threats, even those currently assessed as medium risk. 5) Implement network segmentation and strict access controls to limit potential lateral movement should the malware be introduced. 6) Prepare incident response plans that can quickly adapt to new threat intelligence, ensuring rapid containment and remediation if exploitation attempts are detected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
Indicators of Compromise
- url: http://115.56.140.165:38785/mozi.m
- file: 141.255.158.122
- hash: 8080
- url: http://208.67.105.148/morgan/five/fre.php
- url: http://47.109.47.215:8888/pixel.gif
- url: http://194.87.45.68/eb132e03b76d10bd.php
- url: https://38.6.177.95:4433/match
- url: http://107.149.163.103:8999/pixel
- url: https://193.134.209.247:28443/www/handle/doc
- file: 154.29.75.225
- hash: 80
- url: https://23.95.44.80:11443/www/handle/doc
- url: https://bestbrandhubercenter.com/design/query/9x5m3soe0f
- domain: bestbrandhubercenter.com
- file: 23.236.181.106
- hash: 443
- url: http://23.224.39.41:8888/visit.js
- url: https://154.26.192.32/cx
- file: 154.26.192.32
- hash: 443
- url: https://204.188.203.212/match
- url: https://devoinnanote.com/push
- domain: devoinnanote.com
- file: 204.188.203.212
- hash: 443
- url: http://155.138.141.11/dot.gif
- file: 155.138.141.11
- hash: 80
- url: http://204.188.203.212/push
- file: 204.188.203.212
- hash: 80
- file: 18.230.83.128
- hash: 13666
- file: 85.31.45.232
- hash: 1338
- url: http://85.31.45.29/office/index.php
- file: 138.197.96.208
- hash: 80
- url: http://185.246.220.85/luna/five/fre.php
- file: 163.123.142.155
- hash: 5764
- hash: c623dbe17f278fd3a72c5681102a74d8
- url: http://nideso.mywebcommunity.org/kipyyh/list.php
- hash: bd8d4d9e7eba11f4290582ef94f9941e
- url: https://virginiaservice.org/nd.js
- domain: virginiaservice.org
- url: http://virginiaservice.org/af.css
- url: http://150.158.164.79:6666/ie9compatviewlist.xml
- url: https://163.123.142.213:10443/c/msdownload/update/others/2020/10/29136388_
- url: http://service-jnbjutxg-1304098235.hk.apigw.tencentcs.com/api/getit
- domain: service-jnbjutxg-1304098235.hk.apigw.tencentcs.com
- file: 182.255.45.211
- hash: 80
- url: http://43.142.187.77/match
- file: 43.142.187.77
- hash: 80
- url: http://175.178.35.25:3333/match
- url: http://114.55.24.71/fwlink
- file: 114.55.24.71
- hash: 80
- url: http://101.34.36.50:1234/j.ad
- url: http://125.41.205.91:50003/preload
- file: 39.165.214.6
- hash: 50003
- file: 103.123.223.144
- hash: 443
- file: 217.165.232.217
- hash: 443
- file: 86.98.216.189
- hash: 2222
- file: 47.61.70.76
- hash: 2078
- file: 70.53.96.223
- hash: 995
- file: 86.166.76.246
- hash: 443
- file: 200.84.195.17
- hash: 2222
- file: 212.70.98.141
- hash: 2222
- file: 105.186.191.24
- hash: 995
- file: 116.75.63.121
- hash: 443
- file: 202.187.87.178
- hash: 995
- file: 51.37.187.159
- hash: 443
- file: 180.162.231.210
- hash: 995
- file: 2.49.58.47
- hash: 2222
- file: 31.166.152.157
- hash: 995
- file: 83.7.55.212
- hash: 443
- file: 90.55.105.42
- hash: 2222
- file: 178.153.2.76
- hash: 443
- file: 201.249.12.75
- hash: 2222
- file: 78.19.1.3
- hash: 443
- file: 86.172.181.82
- hash: 443
- file: 122.184.143.84
- hash: 443
- file: 92.20.204.198
- hash: 2222
- file: 86.165.156.39
- hash: 443
- file: 39.55.251.26
- hash: 995
- file: 64.237.245.195
- hash: 443
- file: 94.200.183.66
- hash: 2222
- file: 223.176.7.23
- hash: 2222
- file: 31.104.18.253
- hash: 443
- url: http://39.98.163.184:8080/lib/v2/wcp-consent.js
- domain: arrowlchat.com
- url: https://23.95.44.80/www/handle/doc
- file: 23.95.44.80
- hash: 80
- url: http://47.92.126.126/visit.js
- file: 47.92.126.126
- hash: 80
- url: http://hmgeneralcompany.com/lc/lc.js?
- url: https://expertwritingpros.com/aee/aee.js?
- url: https://majlissala.ma/eusn/eusn.js?
- url: https://nortskyltd.com/oaum/oaum.js?
- url: https://azarmadar.com/auql/120
- url: https://glumtoglad.com/bywzj/120
- url: https://onurmmdv.com/eans/120
- url: https://utedallal.com/ezv/120
- url: http://27.122.56.137:443/components/remove.gif
- url: https://fensisup.shop:4433/match
- url: http://47.103.64.64:1111/pixel.gif
- url: https://47.93.60.109/ie9compatviewlist.xml
- url: http://43.143.153.235/__utm.gif
- url: https://t.me/zaskullz
- url: https://steamcommunity.com/profiles/76561199486572327
- url: http://135.181.87.234/
- url: http://91.107.229.3/
- url: http://91.107.199.176/
- url: http://91.107.229.3/edit.zip
- url: http://91.107.199.176/edit.zip
- url: http://135.181.87.234/edit.zip
- file: 135.181.87.234
- hash: 80
- file: 91.107.229.3
- hash: 80
- file: 91.107.199.176
- hash: 80
- url: https://burnandsweat.com/ia/ia.js
- url: https://classified.com.bd/ti/ti.js?
- url: https://maanstores.com/hob/120
- url: https://esrarengo.com/lkc6pyy/120
- url: https://elanis-dz.org/kmj2/120
- url: https://chiomadigitalconsultant.com.ng/iq/iq.js?
- file: 77.91.78.46
- hash: 80
- file: 77.91.78.50
- hash: 80
- file: 77.91.84.20
- hash: 80
- file: 77.91.84.68
- hash: 80
- file: 85.192.63.59
- hash: 80
- file: 94.237.46.83
- hash: 80
- file: 194.163.177.109
- hash: 80
- url: http://143.42.120.56:8086/discussion/mayo-clinic-radio-als/
- url: https://moviprime.com/tig/tig.js?
- url: https://gepex.ma/oee/oee.js?
- hash: 9203e23be95a8c5c34903dd61bdbcd0d
- hash: 641dd9f95db7f9c223b37effce5713b0
- hash: 57f76e0fc959bcae9ef9dc5121c1ffce2c7305ef
- hash: 929db6b94609e8f9cd56f58c54a9170a8e4b9146
- hash: 4d88008dd3eedf40defa061dcf1920aa4c5ef9d55ef7ba6041d46a630bccb8ea
- hash: de66f8a8b32941597f13a3a782d4256dbaccadc1533229270847b7cd1640172e
- url: http://45.66.159.41:4445/en_us/all.js
- url: https://103.234.72.215:9001/fwlink
- url: http://143.42.120.56:8084/discussion/mayo-clinic-radio-als/
- domain: top.noforabusers1.xyz
- domain: bmarch459.sytes.net
- url: https://insurancegag.com/oq/oq.js?
- domain: bot.ddosing.online
- url: http://45.207.58.57:2090/j.ad
- url: http://13.214.153.85/ie9compatviewlist.xml
- url: http://143.42.120.56:48888/hubcap/mayo-clinic-radio-full-shows/
- url: http://backdfxcf2.ml/eg/eg.js
- url: http://datapawa.com/niis/niis.js
- url: http://davidprestigeas.com/tuc/tuc.js
- url: http://hmgeneralcompany.com/lc/lc.js
- url: http://newzblogzart22.cf/di/di.js
- url: http://newzblogzart410.cf/erdc/erdc.js
- url: http://newzblogzart412.cf/nmo/nmo.js
- url: http://newzblogzart589.cf/tuba/tuba.js
- url: http://newzblogzart592.cf/le/le.js
- url: http://srpimpex.in/efe/efe.js
- url: https://agewatchafrica.com/enno/enno.js
- url: https://agriformexico.com/so/so.js
- url: https://amcghbd.org/xeuq/xeuq.js
- url: https://auditek.com.pe/it/it.js
- url: https://beadvisors.ma/ii/ii.js
- url: https://biddingenterprise.com.au/ud/ud.js
- url: https://bitkiselgida.com/cm/cm.js
- url: https://borsystemslimited.com/mno/mno.js
- url: https://byoug.org/setu/setu.js
- url: https://chiomadigitalagency.com.ng/ait/ait.js
- url: https://chiomadigitalconsultant.com.ng/iq/iq.js
- url: https://classified.com.bd/ti/ti.js
- url: https://cloudrealestate.co.ke/ra/ra.js
- url: https://cloudzsoft.com/daee/daee.js
- url: https://dankard.com.ng/tuaa/tuaa.js
- url: https://dockworthservicesint.com/odeo/odeo.js
- url: https://drraducampeanu.ro/rnu/rnu.js
- url: https://essperu.com.pe/uaep/uaep.js
- url: https://expertwritingpros.com/aee/aee.js
- url: https://faharigas.co.ke/cote/cote.js
- url: https://famelandfittings.co.ke/leta/leta.js
- url: https://fazalcoldstorage.com/atqu/atqu.js
- url: https://filmebunehd1.com/aa/aa.js
- url: https://gathkenya.com/ttla/ttla.js
- url: https://gepex.ma/oee/oee.js
- url: https://greatermen.com/eqpu/eqpu.js
- url: https://hagere.et/ldoo/ldoo.js
- url: https://handikaputra.my.id/iemn/iemn.js
- url: https://harsh24.ml/ixn/ixn.js
- url: https://healthmired.com/oeni/oeni.js
- url: https://heykemisola.ng/et/et.js
- url: https://hikersband.sa/io/io.js
- url: https://hmbconstructions.com/umn/umn.js
- url: https://hotelvillamaior.com.br/pi/pi.js
- url: https://hotrecruiter.com/tu/tu.js
- url: https://impresstv.net/sl/sl.js
- url: https://innovita.az/as/as.js
- url: https://insurancegag.com/oq/oq.js
- url: https://jotamaia.com.br/naai/naai.js
- url: https://kingspartypromotions.com/sibi/sibi.js
- url: https://kiranudyog.com/as/as.js
- url: https://krishnaplastpack.com/ota/ota.js
- url: https://learningbelt.academy/erdn/erdn.js
- url: https://ltrain.ir/rl/rl.js
- url: https://mahdipes.ir/sm/sm.js
- url: https://mail-verification.ml/crea/crea.js
- url: https://majesticmicalhotel.com/otsp/otsp.js
- url: https://majlissala.ma/eusn/eusn.js
- url: https://marketingsolutionbd.com/olt/olt.js
- url: https://mgpconsulting.com.mx/eia/eia.js
- url: https://moglowskincare.com/qap/qap.js
- url: https://moviprime.com/tig/tig.js
- url: https://nortskyltd.com/oaum/oaum.js
- url: https://nusatoyota.co.id/teev/teev.js
- url: https://omnicare.com.bd/ssuq/ssuq.js
- url: https://osamasabir.com/teto/teto.js
- url: https://p-alwatany-ps.com/eioo/eioo.js
- url: https://parla-music.ir/qeq/qeq.js
- url: https://pashupatimitra.edu.np/itau/itau.js
- url: https://pecadosdelamalta.com/ltse/ltse.js
- url: https://perpusmtsns.my.id/stan/stan.js
- url: https://presidentialmetals.net/eon/eon.js
- url: https://promenadesfantomes.com/ine/ine.js
- url: https://propertysupermarket.ug/lqa/lqa.js
- url: https://radioskn.com/qeeo/qeeo.js
- url: https://ric-finanz.com/um/um.js
- url: https://roadtorace.es/admi/admi.js
- url: https://rustamov.az/eo/eo.js
- url: https://safirnikrah.ir/aa/aa.js
- url: https://scmsgroup.org/et/et.js
- url: https://security-audit-internal-audit.com/mei/mei.js
- url: https://sistemprint.pe/orir/orir.js
- url: https://sivsanbupriyal.com/tatm/tatm.js
- url: https://skynnex.com/ru/ru.js
- url: https://smilehope.org/siu/siu.js
- url: https://sonteq.co.ke/uesm/uesm.js
- url: https://spoar.org.in/gcn/gcn.js
- url: https://sunflexpackagers.com/odtm/odtm.js
- url: https://sushishop.com.tr/eatn/eatn.js
- url: https://tanzanitedecor.com/ui/ui.js
- url: https://tarimtokat.com/tae/tae.js
- url: https://upplysningavancez.com/eidq/eidq.js
- url: https://vitoturizm.com.tr/ao/ao.js
- url: https://worleybuildersinc.com/ma/ma.js
- url: https://yektamehr.com/ps/ps.js
- url: https://zombieproofsecurity.co.za/ei/ei.js
- url: https://zonaah.co.uk/lmo/lmo.js
- file: 103.124.104.80
- hash: 3131
- file: 5.161.51.212
- hash: 443
- file: 104.238.35.26
- hash: 6488
- file: 204.152.203.94
- hash: 80
- file: 208.123.119.100
- hash: 80
- file: 208.123.119.100
- hash: 443
- file: 208.123.119.100
- hash: 8080
- file: 5.230.76.198
- hash: 443
- url: http://vsrssup.com/ch.html
- file: 5.255.111.128
- hash: 56999
- url: https://34.125.190.77:5005/dot.gif
- file: 34.125.175.64
- hash: 5005
- url: http://185.232.92.68:10080/www/handle/doc
- url: https://47.94.91.32:34231/cm
- file: 107.174.186.22
- hash: 34231
- url: http://cs.docker-compose-update.com:8880/ie9compatviewlist.xml
- domain: cs.docker-compose-update.com
- file: 27.124.22.148
- hash: 8880
- url: http://45.12.131.79:8989/pixel.gif
- url: http://15.152.246.8:50080/broadcast
- file: 15.152.168.240
- hash: 50080
ThreatFox IOCs for 2023-03-13
Description
ThreatFox IOCs for 2023-03-13
AI-Powered Analysis
Technical Analysis
The provided threat information pertains to a malware-related report titled "ThreatFox IOCs for 2023-03-13," sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The threat is categorized under "type:osint," indicating it is related to open-source intelligence, and is tagged with TLP:WHITE, meaning the information is intended for public sharing without restrictions. The report does not specify affected software versions, products, or detailed technical characteristics of the malware, nor does it include any indicators of compromise (IOCs) such as hashes, IP addresses, or domains. The severity is marked as medium, with no known exploits in the wild, and no associated Common Weakness Enumerations (CWEs) or patch links. Technical details include a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, which likely reflect moderate threat presence and dissemination. Given the lack of detailed technical data, this report appears to be a general intelligence update rather than a description of a specific, actively exploited malware variant. The absence of known exploits and detailed IOCs suggests that this threat is either emerging or of limited immediate operational impact. The focus on OSINT implies that the threat intelligence may be useful for situational awareness and preparatory defense rather than indicating an imminent attack vector.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the absence of known exploits and specific affected systems. However, as the threat is categorized as malware-related and distributed with moderate reach, there is a potential risk that it could evolve or be leveraged in targeted campaigns. The medium severity rating suggests that while immediate operational disruption or data compromise is unlikely, organizations should remain vigilant. The lack of detailed IOCs and affected products means that standard detection and prevention mechanisms may not yet be effective, potentially delaying response times if the threat materializes. European entities involved in cybersecurity monitoring, threat intelligence sharing, or those relying heavily on OSINT for defense may find this information useful for enhancing their situational awareness. The threat does not currently indicate direct risks to confidentiality, integrity, or availability but could serve as a precursor to more targeted or sophisticated attacks if further developments arise.
Mitigation Recommendations
Given the limited technical details and absence of known exploits, mitigation should focus on proactive threat intelligence integration and enhanced monitoring. European organizations should: 1) Incorporate ThreatFox and similar OSINT feeds into their security information and event management (SIEM) systems to detect any emerging indicators related to this threat. 2) Maintain up-to-date endpoint protection and malware detection solutions capable of identifying new or unknown threats through behavioral analysis. 3) Engage in active threat intelligence sharing communities to receive timely updates if this malware evolves or gains exploitation capabilities. 4) Conduct regular security awareness training emphasizing the importance of vigilance against emerging threats, even those currently assessed as medium risk. 5) Implement network segmentation and strict access controls to limit potential lateral movement should the malware be introduced. 6) Prepare incident response plans that can quickly adapt to new threat intelligence, ensuring rapid containment and remediation if exploitation attempts are detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- f09afb75-f80a-45a8-928b-f9abd459ee14
- Original Timestamp
- 1678752184
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttp://115.56.140.165:38785/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://208.67.105.148/morgan/five/fre.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 100%) | |
urlhttp://47.109.47.215:8888/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://194.87.45.68/eb132e03b76d10bd.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttps://38.6.177.95:4433/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://107.149.163.103:8999/pixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://193.134.209.247:28443/www/handle/doc | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://23.95.44.80:11443/www/handle/doc | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://bestbrandhubercenter.com/design/query/9x5m3soe0f | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://23.224.39.41:8888/visit.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://154.26.192.32/cx | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://204.188.203.212/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://devoinnanote.com/push | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://155.138.141.11/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://204.188.203.212/push | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://85.31.45.29/office/index.php | Azorult botnet C2 (confidence level: 75%) | |
urlhttp://185.246.220.85/luna/five/fre.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 75%) | |
urlhttp://nideso.mywebcommunity.org/kipyyh/list.php | Kimsuky botnet C2 (confidence level: 100%) | |
urlhttps://virginiaservice.org/nd.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://virginiaservice.org/af.css | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://150.158.164.79:6666/ie9compatviewlist.xml | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://163.123.142.213:10443/c/msdownload/update/others/2020/10/29136388_ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://service-jnbjutxg-1304098235.hk.apigw.tencentcs.com/api/getit | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://43.142.187.77/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://175.178.35.25:3333/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://114.55.24.71/fwlink | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://101.34.36.50:1234/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://125.41.205.91:50003/preload | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://39.98.163.184:8080/lib/v2/wcp-consent.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://23.95.44.80/www/handle/doc | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://47.92.126.126/visit.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://hmgeneralcompany.com/lc/lc.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://expertwritingpros.com/aee/aee.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://majlissala.ma/eusn/eusn.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://nortskyltd.com/oaum/oaum.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://azarmadar.com/auql/120 | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://glumtoglad.com/bywzj/120 | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://onurmmdv.com/eans/120 | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://utedallal.com/ezv/120 | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://27.122.56.137:443/components/remove.gif | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttps://fensisup.shop:4433/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://47.103.64.64:1111/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://47.93.60.109/ie9compatviewlist.xml | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://43.143.153.235/__utm.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://t.me/zaskullz | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://steamcommunity.com/profiles/76561199486572327 | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://135.181.87.234/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://91.107.229.3/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://91.107.199.176/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://91.107.229.3/edit.zip | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://91.107.199.176/edit.zip | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://135.181.87.234/edit.zip | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://burnandsweat.com/ia/ia.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://classified.com.bd/ti/ti.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://maanstores.com/hob/120 | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://esrarengo.com/lkc6pyy/120 | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://elanis-dz.org/kmj2/120 | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://chiomadigitalconsultant.com.ng/iq/iq.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://143.42.120.56:8086/discussion/mayo-clinic-radio-als/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://moviprime.com/tig/tig.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://gepex.ma/oee/oee.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://45.66.159.41:4445/en_us/all.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://103.234.72.215:9001/fwlink | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://143.42.120.56:8084/discussion/mayo-clinic-radio-als/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://insurancegag.com/oq/oq.js? | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://45.207.58.57:2090/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://13.214.153.85/ie9compatviewlist.xml | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://143.42.120.56:48888/hubcap/mayo-clinic-radio-full-shows/ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://backdfxcf2.ml/eg/eg.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://datapawa.com/niis/niis.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://davidprestigeas.com/tuc/tuc.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://hmgeneralcompany.com/lc/lc.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://newzblogzart22.cf/di/di.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://newzblogzart410.cf/erdc/erdc.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://newzblogzart412.cf/nmo/nmo.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://newzblogzart589.cf/tuba/tuba.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://newzblogzart592.cf/le/le.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://srpimpex.in/efe/efe.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://agewatchafrica.com/enno/enno.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://agriformexico.com/so/so.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://amcghbd.org/xeuq/xeuq.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://auditek.com.pe/it/it.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://beadvisors.ma/ii/ii.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://biddingenterprise.com.au/ud/ud.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://bitkiselgida.com/cm/cm.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://borsystemslimited.com/mno/mno.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://byoug.org/setu/setu.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://chiomadigitalagency.com.ng/ait/ait.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://chiomadigitalconsultant.com.ng/iq/iq.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://classified.com.bd/ti/ti.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://cloudrealestate.co.ke/ra/ra.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://cloudzsoft.com/daee/daee.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://dankard.com.ng/tuaa/tuaa.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://dockworthservicesint.com/odeo/odeo.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://drraducampeanu.ro/rnu/rnu.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://essperu.com.pe/uaep/uaep.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://expertwritingpros.com/aee/aee.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://faharigas.co.ke/cote/cote.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://famelandfittings.co.ke/leta/leta.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://fazalcoldstorage.com/atqu/atqu.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://filmebunehd1.com/aa/aa.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://gathkenya.com/ttla/ttla.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://gepex.ma/oee/oee.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://greatermen.com/eqpu/eqpu.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://hagere.et/ldoo/ldoo.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://handikaputra.my.id/iemn/iemn.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://harsh24.ml/ixn/ixn.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://healthmired.com/oeni/oeni.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://heykemisola.ng/et/et.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://hikersband.sa/io/io.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://hmbconstructions.com/umn/umn.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://hotelvillamaior.com.br/pi/pi.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://hotrecruiter.com/tu/tu.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://impresstv.net/sl/sl.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://innovita.az/as/as.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://insurancegag.com/oq/oq.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://jotamaia.com.br/naai/naai.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://kingspartypromotions.com/sibi/sibi.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://kiranudyog.com/as/as.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://krishnaplastpack.com/ota/ota.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://learningbelt.academy/erdn/erdn.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://ltrain.ir/rl/rl.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://mahdipes.ir/sm/sm.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://mail-verification.ml/crea/crea.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://majesticmicalhotel.com/otsp/otsp.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://majlissala.ma/eusn/eusn.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://marketingsolutionbd.com/olt/olt.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://mgpconsulting.com.mx/eia/eia.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://moglowskincare.com/qap/qap.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://moviprime.com/tig/tig.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://nortskyltd.com/oaum/oaum.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://nusatoyota.co.id/teev/teev.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://omnicare.com.bd/ssuq/ssuq.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://osamasabir.com/teto/teto.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://p-alwatany-ps.com/eioo/eioo.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://parla-music.ir/qeq/qeq.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://pashupatimitra.edu.np/itau/itau.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://pecadosdelamalta.com/ltse/ltse.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://perpusmtsns.my.id/stan/stan.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://presidentialmetals.net/eon/eon.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://promenadesfantomes.com/ine/ine.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://propertysupermarket.ug/lqa/lqa.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://radioskn.com/qeeo/qeeo.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://ric-finanz.com/um/um.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://roadtorace.es/admi/admi.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://rustamov.az/eo/eo.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://safirnikrah.ir/aa/aa.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://scmsgroup.org/et/et.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://security-audit-internal-audit.com/mei/mei.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://sistemprint.pe/orir/orir.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://sivsanbupriyal.com/tatm/tatm.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://skynnex.com/ru/ru.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://smilehope.org/siu/siu.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://sonteq.co.ke/uesm/uesm.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://spoar.org.in/gcn/gcn.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://sunflexpackagers.com/odtm/odtm.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://sushishop.com.tr/eatn/eatn.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://tanzanitedecor.com/ui/ui.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://tarimtokat.com/tae/tae.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://upplysningavancez.com/eidq/eidq.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://vitoturizm.com.tr/ao/ao.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://worleybuildersinc.com/ma/ma.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://yektamehr.com/ps/ps.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://zombieproofsecurity.co.za/ei/ei.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttps://zonaah.co.uk/lmo/lmo.js | QakBot payload delivery URL (confidence level: 100%) | |
urlhttp://vsrssup.com/ch.html | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://34.125.190.77:5005/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://185.232.92.68:10080/www/handle/doc | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://47.94.91.32:34231/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://cs.docker-compose-update.com:8880/ie9compatviewlist.xml | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://45.12.131.79:8989/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://15.152.246.8:50080/broadcast | Cobalt Strike botnet C2 (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file141.255.158.122 | CyberGate botnet C2 server (confidence level: 100%) | |
file154.29.75.225 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file23.236.181.106 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.26.192.32 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file204.188.203.212 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file155.138.141.11 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file204.188.203.212 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file18.230.83.128 | Mirai botnet C2 server (confidence level: 75%) | |
file85.31.45.232 | Mirai botnet C2 server (confidence level: 75%) | |
file138.197.96.208 | Unidentified 001 payload delivery server (confidence level: 50%) | |
file163.123.142.155 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file182.255.45.211 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.142.187.77 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file114.55.24.71 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.165.214.6 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.123.223.144 | QakBot botnet C2 server (confidence level: 100%) | |
file217.165.232.217 | QakBot botnet C2 server (confidence level: 100%) | |
file86.98.216.189 | QakBot botnet C2 server (confidence level: 100%) | |
file47.61.70.76 | QakBot botnet C2 server (confidence level: 100%) | |
file70.53.96.223 | QakBot botnet C2 server (confidence level: 100%) | |
file86.166.76.246 | QakBot botnet C2 server (confidence level: 100%) | |
file200.84.195.17 | QakBot botnet C2 server (confidence level: 100%) | |
file212.70.98.141 | QakBot botnet C2 server (confidence level: 100%) | |
file105.186.191.24 | QakBot botnet C2 server (confidence level: 100%) | |
file116.75.63.121 | QakBot botnet C2 server (confidence level: 100%) | |
file202.187.87.178 | QakBot botnet C2 server (confidence level: 100%) | |
file51.37.187.159 | QakBot botnet C2 server (confidence level: 100%) | |
file180.162.231.210 | QakBot botnet C2 server (confidence level: 100%) | |
file2.49.58.47 | QakBot botnet C2 server (confidence level: 100%) | |
file31.166.152.157 | QakBot botnet C2 server (confidence level: 100%) | |
file83.7.55.212 | QakBot botnet C2 server (confidence level: 100%) | |
file90.55.105.42 | QakBot botnet C2 server (confidence level: 100%) | |
file178.153.2.76 | QakBot botnet C2 server (confidence level: 100%) | |
file201.249.12.75 | QakBot botnet C2 server (confidence level: 100%) | |
file78.19.1.3 | QakBot botnet C2 server (confidence level: 100%) | |
file86.172.181.82 | QakBot botnet C2 server (confidence level: 100%) | |
file122.184.143.84 | QakBot botnet C2 server (confidence level: 100%) | |
file92.20.204.198 | QakBot botnet C2 server (confidence level: 100%) | |
file86.165.156.39 | QakBot botnet C2 server (confidence level: 100%) | |
file39.55.251.26 | QakBot botnet C2 server (confidence level: 100%) | |
file64.237.245.195 | QakBot botnet C2 server (confidence level: 100%) | |
file94.200.183.66 | QakBot botnet C2 server (confidence level: 100%) | |
file223.176.7.23 | QakBot botnet C2 server (confidence level: 100%) | |
file31.104.18.253 | QakBot botnet C2 server (confidence level: 100%) | |
file23.95.44.80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.92.126.126 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file135.181.87.234 | Vidar botnet C2 server (confidence level: 100%) | |
file91.107.229.3 | Vidar botnet C2 server (confidence level: 100%) | |
file91.107.199.176 | Vidar botnet C2 server (confidence level: 100%) | |
file77.91.78.46 | RecordBreaker botnet C2 server (confidence level: 100%) | |
file77.91.78.50 | RecordBreaker botnet C2 server (confidence level: 100%) | |
file77.91.84.20 | RecordBreaker botnet C2 server (confidence level: 100%) | |
file77.91.84.68 | RecordBreaker botnet C2 server (confidence level: 100%) | |
file85.192.63.59 | RecordBreaker botnet C2 server (confidence level: 100%) | |
file94.237.46.83 | RecordBreaker botnet C2 server (confidence level: 100%) | |
file194.163.177.109 | RecordBreaker botnet C2 server (confidence level: 100%) | |
file103.124.104.80 | Sliver botnet C2 server (confidence level: 50%) | |
file5.161.51.212 | BianLian botnet C2 server (confidence level: 50%) | |
file104.238.35.26 | BianLian botnet C2 server (confidence level: 50%) | |
file204.152.203.94 | BianLian botnet C2 server (confidence level: 50%) | |
file208.123.119.100 | BianLian botnet C2 server (confidence level: 50%) | |
file208.123.119.100 | BianLian botnet C2 server (confidence level: 50%) | |
file208.123.119.100 | BianLian botnet C2 server (confidence level: 50%) | |
file5.230.76.198 | IcedID botnet C2 server (confidence level: 75%) | |
file5.255.111.128 | Mirai botnet C2 server (confidence level: 75%) | |
file34.125.175.64 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file107.174.186.22 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file27.124.22.148 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file15.152.168.240 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash8080 | CyberGate botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash13666 | Mirai botnet C2 server (confidence level: 75%) | |
hash1338 | Mirai botnet C2 server (confidence level: 75%) | |
hash80 | Unidentified 001 payload delivery server (confidence level: 50%) | |
hash5764 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hashc623dbe17f278fd3a72c5681102a74d8 | Kimsuky payload (confidence level: 100%) | |
hashbd8d4d9e7eba11f4290582ef94f9941e | Unknown malware payload (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash50003 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash2078 | QakBot botnet C2 server (confidence level: 100%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash2222 | QakBot botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | RecordBreaker botnet C2 server (confidence level: 100%) | |
hash80 | RecordBreaker botnet C2 server (confidence level: 100%) | |
hash80 | RecordBreaker botnet C2 server (confidence level: 100%) | |
hash80 | RecordBreaker botnet C2 server (confidence level: 100%) | |
hash80 | RecordBreaker botnet C2 server (confidence level: 100%) | |
hash80 | RecordBreaker botnet C2 server (confidence level: 100%) | |
hash80 | RecordBreaker botnet C2 server (confidence level: 100%) | |
hash9203e23be95a8c5c34903dd61bdbcd0d | Unidentified 001 payload (confidence level: 50%) | |
hash641dd9f95db7f9c223b37effce5713b0 | Unidentified 001 payload (confidence level: 50%) | |
hash57f76e0fc959bcae9ef9dc5121c1ffce2c7305ef | Unidentified 001 payload (confidence level: 50%) | |
hash929db6b94609e8f9cd56f58c54a9170a8e4b9146 | Unidentified 001 payload (confidence level: 50%) | |
hash4d88008dd3eedf40defa061dcf1920aa4c5ef9d55ef7ba6041d46a630bccb8ea | Unidentified 001 payload (confidence level: 50%) | |
hashde66f8a8b32941597f13a3a782d4256dbaccadc1533229270847b7cd1640172e | Unidentified 001 payload (confidence level: 50%) | |
hash3131 | Sliver botnet C2 server (confidence level: 50%) | |
hash443 | BianLian botnet C2 server (confidence level: 50%) | |
hash6488 | BianLian botnet C2 server (confidence level: 50%) | |
hash80 | BianLian botnet C2 server (confidence level: 50%) | |
hash80 | BianLian botnet C2 server (confidence level: 50%) | |
hash443 | BianLian botnet C2 server (confidence level: 50%) | |
hash8080 | BianLian botnet C2 server (confidence level: 50%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash56999 | Mirai botnet C2 server (confidence level: 75%) | |
hash5005 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash34231 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8880 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash50080 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainbestbrandhubercenter.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domaindevoinnanote.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainvirginiaservice.org | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainservice-jnbjutxg-1304098235.hk.apigw.tencentcs.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainarrowlchat.com | ViperSoftX botnet C2 domain (confidence level: 100%) | |
domaintop.noforabusers1.xyz | Remcos botnet C2 domain (confidence level: 100%) | |
domainbmarch459.sytes.net | Remcos botnet C2 domain (confidence level: 100%) | |
domainbot.ddosing.online | Mirai botnet C2 domain (confidence level: 100%) | |
domaincs.docker-compose-update.com | Cobalt Strike botnet C2 domain (confidence level: 100%) |
Threat ID: 682c7abde3e6de8ceb7527fa
Added to database: 5/20/2025, 12:51:09 PM
Last enriched: 6/19/2025, 1:17:10 PM
Last updated: 8/16/2025, 12:25:04 PM
Views: 10
Related Threats
ThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.