ThreatFox IOCs for 2023-09-08
ThreatFox IOCs for 2023-09-08
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on September 8, 2023, by the ThreatFox MISP Feed. These IOCs are related to malware activities categorized under OSINT (Open Source Intelligence), network activity, and payload delivery. However, the data lacks specific technical details such as affected software versions, detailed attack vectors, or explicit malware behavior. The threat level is indicated as medium with a threatLevel score of 2, analysis score of 1, and distribution score of 3, suggesting moderate concern but limited immediate danger. No known exploits in the wild or patches are available, and there are no CWE identifiers linked to this threat, indicating that it may be a newly observed or emerging threat without established exploit patterns. The absence of indicators in the provided data limits the ability to perform detailed forensic or detection rule development. Overall, this appears to be a general alert about malware-related IOCs disseminated for situational awareness rather than a specific, active exploit or vulnerability targeting particular systems.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the lack of detailed exploit information and absence of known active exploitation. However, the presence of malware-related IOCs and payload delivery mechanisms implies potential risks if these indicators are linked to targeted campaigns or if they evolve into active threats. Organizations relying on OSINT for threat detection may benefit from integrating these IOCs into their monitoring systems to enhance early warning capabilities. The medium severity suggests that while immediate disruption or data compromise is unlikely, there is a moderate risk of network intrusion or malware infection if these IOCs correspond to emerging threats. European entities with critical infrastructure or sensitive data should remain vigilant, as payload delivery mechanisms can lead to ransomware, data exfiltration, or system compromise if exploited.
Mitigation Recommendations
Given the limited technical details, European organizations should focus on proactive threat intelligence integration and network hygiene. Specific recommendations include: 1) Incorporate the latest ThreatFox IOCs into SIEM and endpoint detection and response (EDR) platforms to improve detection of related malware activities. 2) Conduct regular network traffic analysis to identify anomalous payload delivery attempts, especially those matching known IOC patterns once available. 3) Enhance employee awareness training on phishing and social engineering, as payload delivery often leverages these vectors. 4) Maintain up-to-date backups and incident response plans to mitigate potential impacts of malware infections. 5) Collaborate with national cybersecurity centers and information sharing groups to receive timely updates on emerging threats linked to these IOCs. 6) Since no patches are available, focus on network segmentation and least privilege principles to limit lateral movement if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- file: 20.0.54.48
- hash: 5810
- domain: sept7ama.tuktuk.ug
- domain: kevinbrawiewu.com
- domain: clainsrimauto.com
- domain: kaheshanpa.com
- domain: 04septgo.tuktuk.ug
- domain: ekb.tuktuk.ug
- domain: fk29.tuktuk.ug
- domain: msk.tuktuk.ug
- domain: sept4em.tuktuk.ug
- domain: sept5ama.tuktuk.ug
- domain: sept7amd.tuktuk.ug
- domain: bitsvertise.com
- domain: blgbeach.com
- domain: dbgsymbol.com
- domain: ecordillos.com
- domain: ismartrium.com
- domain: rapisigns.com
- file: 23.108.57.87
- hash: 11955
- domain: agostodosgad.duckdns.org
- domain: bdios8877.duckdns.org
- domain: cocomelon27.duckdns.org
- domain: dia16mayoje.duckdns.org
- domain: diosestaconmiugo.duckdns.org
- domain: eduardoestevex.duckdns.org
- domain: enagostoestb.duckdns.org
- domain: envio7sep2023.duckdns.org
- domain: esteesasyn.duckdns.org
- domain: esteesmider.duckdns.org
- domain: estemesesdedios.duckdns.org
- domain: estwrmessol.duckdns.org
- domain: lostermas.duckdns.org
- domain: mairoester.duckdns.org
- domain: marquesosa3.duckdns.org
- domain: parahotmejor.duckdns.org
- domain: parajulioped.duckdns.org
- domain: paraprobares.duckdns.org
- domain: quasintiner.duckdns.org
- domain: renvosdtutu.duckdns.org
- domain: servernjnuevo.duckdns.org
- domain: sientosmilter.duckdns.org
- domain: somosdecall.duckdns.org
- domain: todoparadios.duckdns.org
- domain: vamosaverc.duckdns.org
- file: 179.60.147.4
- hash: 58731
- url: https://heartwoodproperties.com/blog.php
- url: https://heldenfutter.de/blog.php
- url: https://gutesherz.or/go.php
- file: 194.147.140.232
- hash: 6609
- file: 3.214.57.4
- hash: 7443
- file: 208.123.119.100
- hash: 6613
- file: 66.135.16.39
- hash: 443
- file: 80.85.152.108
- hash: 443
- file: 159.223.205.33
- hash: 80
- file: 89.96.196.150
- hash: 445
- file: 3.216.91.201
- hash: 443
- file: 13.90.242.103
- hash: 80
- file: 165.154.221.149
- hash: 445
- file: 188.165.185.107
- hash: 445
- file: 223.26.57.45
- hash: 8848
- file: 180.12.159.131
- hash: 64432
- file: 150.107.2.176
- hash: 8848
- file: 42.194.178.221
- hash: 8888
- url: https://38.47.238.225/jquery-3.3.1.min.js
- file: 38.47.238.225
- hash: 443
- file: 217.145.238.175
- hash: 80
- file: 78.46.66.9
- hash: 8080
- file: 5.42.65.62
- hash: 46961
- file: 95.214.25.236
- hash: 4404
- domain: amadapi.tuktuk.ug
- url: https://paste.ee/d/jepak/0
- url: https://pastebin.com/raw/sfgsbg3v
- url: https://wtools.io/code/dl/bplb
- url: https://pasteio.com/download/xtnja1wvooam
- hash: d27224eb9e5c34abfb22ba1941f3c4c4fbcfb5702899f8cf4fe280f4aa881d44
- hash: 5a21b731fa6efbd890bcec79dc8ee32d38d78ff56ba4570b7edeef947b335484
- hash: 77e02a67b7335161ae2abc3cd2a71540b75c78ab564cb3d993ae1e6dbcbeb615
- domain: stracer.top
- domain: taybo.top
- domain: kik.taybo.top
- domain: srk.stracer.top
- file: 179.13.3.111
- hash: 2449
- file: 185.252.179.66
- hash: 6906
- url: https://oiuytyfvq621mb.org/vvmd54/
- url: https://oiuytyfvq621mb.org/zgbn19mx
- url: https://oiuytyfvq621mb.org/lander/chrome/_index.php
- file: 162.33.179.240
- hash: 433
- file: 45.61.138.12
- hash: 443
- file: 193.31.28.123
- hash: 4444
- file: 41.216.188.29
- hash: 5200
- file: 41.68.165.218
- hash: 1177
- url: http://bagisyapsendehadi.xyz/
- url: http://berkatamankimsedurduramaz.ml/
- url: http://yenilimit.xyz
- url: http://status.klopware.space/_defaultwindows.php
- file: 3.125.188.168
- hash: 12866
- file: 35.157.111.131
- hash: 12866
- file: 3.68.56.232
- hash: 12866
- url: https://pklkknj89bygvczvi.com/vvmd54/
- url: https://ngvcfrttgyu512vgv.net/zgbn19mx
- url: https://ngvcfrttgyu512vgv.net/lander/chrome/_index.php
- domain: cdn-new-dwnl.site
- domain: stats-best.site
- domain: pklkknj89bygvczvi.com
- domain: ngvcfrttgyu512vgv.net
- domain: 3v1n35i5kwx.life
- domain: newdnq1xnl9.life
- domain: itszko2ot5u.life
- domain: cmid1s1zeiu.life
- file: 91.103.252.180
- hash: 16711
- file: 91.149.232.174
- hash: 80
- file: 193.149.176.133
- hash: 80
- file: 87.237.54.28
- hash: 18186
- url: http://a0859540.xsph.ru/l1nc0in.php
- file: 93.123.118.3
- hash: 46308
- file: 89.23.98.29
- hash: 41686
ThreatFox IOCs for 2023-09-08
Description
ThreatFox IOCs for 2023-09-08
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on September 8, 2023, by the ThreatFox MISP Feed. These IOCs are related to malware activities categorized under OSINT (Open Source Intelligence), network activity, and payload delivery. However, the data lacks specific technical details such as affected software versions, detailed attack vectors, or explicit malware behavior. The threat level is indicated as medium with a threatLevel score of 2, analysis score of 1, and distribution score of 3, suggesting moderate concern but limited immediate danger. No known exploits in the wild or patches are available, and there are no CWE identifiers linked to this threat, indicating that it may be a newly observed or emerging threat without established exploit patterns. The absence of indicators in the provided data limits the ability to perform detailed forensic or detection rule development. Overall, this appears to be a general alert about malware-related IOCs disseminated for situational awareness rather than a specific, active exploit or vulnerability targeting particular systems.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the lack of detailed exploit information and absence of known active exploitation. However, the presence of malware-related IOCs and payload delivery mechanisms implies potential risks if these indicators are linked to targeted campaigns or if they evolve into active threats. Organizations relying on OSINT for threat detection may benefit from integrating these IOCs into their monitoring systems to enhance early warning capabilities. The medium severity suggests that while immediate disruption or data compromise is unlikely, there is a moderate risk of network intrusion or malware infection if these IOCs correspond to emerging threats. European entities with critical infrastructure or sensitive data should remain vigilant, as payload delivery mechanisms can lead to ransomware, data exfiltration, or system compromise if exploited.
Mitigation Recommendations
Given the limited technical details, European organizations should focus on proactive threat intelligence integration and network hygiene. Specific recommendations include: 1) Incorporate the latest ThreatFox IOCs into SIEM and endpoint detection and response (EDR) platforms to improve detection of related malware activities. 2) Conduct regular network traffic analysis to identify anomalous payload delivery attempts, especially those matching known IOC patterns once available. 3) Enhance employee awareness training on phishing and social engineering, as payload delivery often leverages these vectors. 4) Maintain up-to-date backups and incident response plans to mitigate potential impacts of malware infections. 5) Collaborate with national cybersecurity centers and information sharing groups to receive timely updates on emerging threats linked to these IOCs. 6) Since no patches are available, focus on network segmentation and least privilege principles to limit lateral movement if compromise occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- fd6d6276-0d5f-4b2b-94e7-5681eaa31989
- Original Timestamp
- 1694217785
Indicators of Compromise
File
Value | Description | Copy |
---|---|---|
file20.0.54.48 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file23.108.57.87 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file179.60.147.4 | Meterpreter botnet C2 server (confidence level: 100%) | |
file194.147.140.232 | Remcos botnet C2 server (confidence level: 100%) | |
file3.214.57.4 | Unknown malware botnet C2 server (confidence level: 50%) | |
file208.123.119.100 | BianLian botnet C2 server (confidence level: 50%) | |
file66.135.16.39 | Havoc botnet C2 server (confidence level: 50%) | |
file80.85.152.108 | Havoc botnet C2 server (confidence level: 50%) | |
file159.223.205.33 | Havoc botnet C2 server (confidence level: 50%) | |
file89.96.196.150 | Responder botnet C2 server (confidence level: 50%) | |
file3.216.91.201 | Responder botnet C2 server (confidence level: 50%) | |
file13.90.242.103 | Responder botnet C2 server (confidence level: 50%) | |
file165.154.221.149 | Responder botnet C2 server (confidence level: 50%) | |
file188.165.185.107 | Responder botnet C2 server (confidence level: 50%) | |
file223.26.57.45 | DCRat botnet C2 server (confidence level: 50%) | |
file180.12.159.131 | DCRat botnet C2 server (confidence level: 50%) | |
file150.107.2.176 | DCRat botnet C2 server (confidence level: 50%) | |
file42.194.178.221 | Unknown malware botnet C2 server (confidence level: 50%) | |
file38.47.238.225 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file217.145.238.175 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
file78.46.66.9 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
file5.42.65.62 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file95.214.25.236 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file179.13.3.111 | Remcos payload delivery server (confidence level: 75%) | |
file185.252.179.66 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file162.33.179.240 | IcedID botnet C2 server (confidence level: 75%) | |
file45.61.138.12 | IcedID botnet C2 server (confidence level: 75%) | |
file193.31.28.123 | Meterpreter botnet C2 server (confidence level: 100%) | |
file41.216.188.29 | Ave Maria botnet C2 server (confidence level: 100%) | |
file41.68.165.218 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.125.188.168 | NjRAT botnet C2 server (confidence level: 100%) | |
file35.157.111.131 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.68.56.232 | NjRAT botnet C2 server (confidence level: 100%) | |
file91.103.252.180 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file91.149.232.174 | IcedID botnet C2 server (confidence level: 75%) | |
file193.149.176.133 | IcedID botnet C2 server (confidence level: 75%) | |
file87.237.54.28 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file93.123.118.3 | Ave Maria botnet C2 server (confidence level: 100%) | |
file89.23.98.29 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash5810 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash11955 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash58731 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash6609 | Remcos botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash6613 | BianLian botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash80 | Havoc botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash443 | Responder botnet C2 server (confidence level: 50%) | |
hash80 | Responder botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash8848 | DCRat botnet C2 server (confidence level: 50%) | |
hash64432 | DCRat botnet C2 server (confidence level: 50%) | |
hash8848 | DCRat botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
hash8080 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
hash46961 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash4404 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hashd27224eb9e5c34abfb22ba1941f3c4c4fbcfb5702899f8cf4fe280f4aa881d44 | Remcos payload (confidence level: 75%) | |
hash5a21b731fa6efbd890bcec79dc8ee32d38d78ff56ba4570b7edeef947b335484 | Remcos payload (confidence level: 75%) | |
hash77e02a67b7335161ae2abc3cd2a71540b75c78ab564cb3d993ae1e6dbcbeb615 | Remcos payload (confidence level: 75%) | |
hash2449 | Remcos payload delivery server (confidence level: 75%) | |
hash6906 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash433 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash4444 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash5200 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash16711 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | IcedID botnet C2 server (confidence level: 75%) | |
hash80 | IcedID botnet C2 server (confidence level: 75%) | |
hash18186 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash46308 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash41686 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainsept7ama.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainkevinbrawiewu.com | IcedID botnet C2 domain (confidence level: 100%) | |
domainclainsrimauto.com | IcedID botnet C2 domain (confidence level: 100%) | |
domainkaheshanpa.com | IcedID botnet C2 domain (confidence level: 100%) | |
domain04septgo.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainekb.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainfk29.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainmsk.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept4em.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept5ama.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept7amd.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainbitsvertise.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainblgbeach.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domaindbgsymbol.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainecordillos.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainismartrium.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainrapisigns.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainagostodosgad.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainbdios8877.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaincocomelon27.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaindia16mayoje.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaindiosestaconmiugo.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaineduardoestevex.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainenagostoestb.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainenvio7sep2023.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainesteesasyn.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainesteesmider.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainestemesesdedios.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainestwrmessol.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainlostermas.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainmairoester.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainmarquesosa3.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparahotmejor.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparajulioped.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparaprobares.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainquasintiner.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainrenvosdtutu.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainservernjnuevo.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainsientosmilter.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainsomosdecall.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaintodoparadios.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainvamosaverc.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainamadapi.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainstracer.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domaintaybo.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainkik.taybo.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsrk.stracer.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domaincdn-new-dwnl.site | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainstats-best.site | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainpklkknj89bygvczvi.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainngvcfrttgyu512vgv.net | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domain3v1n35i5kwx.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domainnewdnq1xnl9.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domainitszko2ot5u.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domaincmid1s1zeiu.life | BumbleBee botnet C2 domain (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttps://heartwoodproperties.com/blog.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://heldenfutter.de/blog.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://gutesherz.or/go.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://38.47.238.225/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://paste.ee/d/jepak/0 | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://pastebin.com/raw/sfgsbg3v | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://wtools.io/code/dl/bplb | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://pasteio.com/download/xtnja1wvooam | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://oiuytyfvq621mb.org/vvmd54/ | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://oiuytyfvq621mb.org/zgbn19mx | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://oiuytyfvq621mb.org/lander/chrome/_index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://bagisyapsendehadi.xyz/ | Alien botnet C2 (confidence level: 80%) | |
urlhttp://berkatamankimsedurduramaz.ml/ | Alien botnet C2 (confidence level: 80%) | |
urlhttp://yenilimit.xyz | Alien botnet C2 (confidence level: 80%) | |
urlhttp://status.klopware.space/_defaultwindows.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://pklkknj89bygvczvi.com/vvmd54/ | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://ngvcfrttgyu512vgv.net/zgbn19mx | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://ngvcfrttgyu512vgv.net/lander/chrome/_index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://a0859540.xsph.ru/l1nc0in.php | DCRat botnet C2 (confidence level: 100%) |
Threat ID: 68359c9d5d5f0974d01f3450
Added to database: 5/27/2025, 11:06:05 AM
Last enriched: 7/5/2025, 11:10:59 PM
Last updated: 7/30/2025, 2:18:08 AM
Views: 13
Related Threats
'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumKawabunga, Dude, You've Been Ransomed!
MediumERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
MediumThreat Bulletin: Fire in the Woods – A New Variant of FireWood
MediumThis 'SAP Ariba Quote' Isn't What It Seems—It's Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.