Skip to main content

ThreatFox IOCs for 2023-09-08

Medium
Published: Fri Sep 08 2023 (09/08/2023, 00:00:00 UTC)
Source: ThreatFox
Vendor/Project: type
Product: osint

Description

ThreatFox IOCs for 2023-09-08

AI-Powered Analysis

AILast updated: 06/18/2025, 08:50:52 UTC

Technical Analysis

The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on September 8, 2023, categorized under malware with a focus on OSINT (Open Source Intelligence) activities. The threat is characterized primarily by network activity and payload delivery mechanisms, indicating that it involves the distribution or deployment of malicious payloads through network channels. However, no specific affected software versions or products are identified, and no patches are available, suggesting that this is not a vulnerability in a particular software product but rather a collection of threat intelligence related to malware campaigns or infrastructure. The threat level is rated as 2 on an unspecified scale, with analysis and distribution scores indicating moderate confidence and spread. The absence of known exploits in the wild and the lack of detailed technical indicators or CWEs (Common Weakness Enumerations) imply that this threat intelligence is more focused on detection and monitoring rather than an active exploit targeting a specific vulnerability. The TLP (Traffic Light Protocol) white tag indicates that the information is intended for unrestricted sharing, supporting broad dissemination for defensive purposes. Overall, this threat represents a medium-severity malware-related intelligence update that provides network-based indicators useful for OSINT-driven detection and response activities but does not describe a direct exploit or vulnerability requiring immediate patching or mitigation.

Potential Impact

For European organizations, the impact of this threat is primarily related to the potential for malware infections through network-based payload delivery mechanisms. Since the threat intelligence is OSINT-focused and does not specify particular exploited vulnerabilities or affected software, the risk centers on the ability of attackers to distribute malicious payloads that could compromise confidentiality, integrity, or availability if successfully deployed. The medium severity rating suggests that while the threat is notable, it does not currently represent a critical or widespread active exploitation campaign. European organizations involved in sectors with high network exposure, such as finance, telecommunications, and critical infrastructure, may face increased risk if attackers leverage these IOCs to evade detection or deliver payloads. The lack of known exploits in the wild reduces the immediacy of the threat but does not eliminate the possibility of future exploitation or targeted attacks using the identified indicators. Consequently, the impact is moderate, with potential consequences including data breaches, service disruptions, or unauthorized access if malware payloads are successfully delivered and executed.

Mitigation Recommendations

Given the nature of this threat as OSINT-based malware indicators without specific vulnerable products or patches, mitigation should focus on enhancing detection and prevention capabilities. European organizations should: 1) Integrate the provided IOCs into existing network monitoring and intrusion detection systems to improve early detection of related malicious activity. 2) Employ advanced network traffic analysis tools capable of identifying anomalous payload delivery patterns consistent with the threat’s network activity profile. 3) Maintain robust endpoint protection solutions with behavioral analysis to detect and block malware execution even if payloads bypass initial network defenses. 4) Conduct regular threat hunting exercises leveraging updated OSINT feeds to proactively identify potential compromises. 5) Ensure comprehensive logging and correlation of network events to facilitate rapid incident response. 6) Educate security teams on the importance of OSINT in threat detection and encourage collaboration with threat intelligence sharing communities to stay informed about evolving indicators. These measures go beyond generic advice by emphasizing the operational integration of OSINT-derived IOCs and proactive network behavior analysis tailored to the threat’s characteristics.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
1
Distribution
3
Uuid
fd6d6276-0d5f-4b2b-94e7-5681eaa31989
Original Timestamp
1694217785

Indicators of Compromise

File

ValueDescriptionCopy
file20.0.54.48
RedLine Stealer botnet C2 server (confidence level: 100%)
file23.108.57.87
RedLine Stealer botnet C2 server (confidence level: 100%)
file179.60.147.4
Meterpreter botnet C2 server (confidence level: 100%)
file194.147.140.232
Remcos botnet C2 server (confidence level: 100%)
file3.214.57.4
Unknown malware botnet C2 server (confidence level: 50%)
file208.123.119.100
BianLian botnet C2 server (confidence level: 50%)
file66.135.16.39
Havoc botnet C2 server (confidence level: 50%)
file80.85.152.108
Havoc botnet C2 server (confidence level: 50%)
file159.223.205.33
Havoc botnet C2 server (confidence level: 50%)
file89.96.196.150
Responder botnet C2 server (confidence level: 50%)
file3.216.91.201
Responder botnet C2 server (confidence level: 50%)
file13.90.242.103
Responder botnet C2 server (confidence level: 50%)
file165.154.221.149
Responder botnet C2 server (confidence level: 50%)
file188.165.185.107
Responder botnet C2 server (confidence level: 50%)
file223.26.57.45
DCRat botnet C2 server (confidence level: 50%)
file180.12.159.131
DCRat botnet C2 server (confidence level: 50%)
file150.107.2.176
DCRat botnet C2 server (confidence level: 50%)
file42.194.178.221
Unknown malware botnet C2 server (confidence level: 50%)
file38.47.238.225
Cobalt Strike botnet C2 server (confidence level: 100%)
file217.145.238.175
WhiteSnake Stealer botnet C2 server (confidence level: 100%)
file78.46.66.9
WhiteSnake Stealer botnet C2 server (confidence level: 100%)
file5.42.65.62
RedLine Stealer botnet C2 server (confidence level: 100%)
file95.214.25.236
AsyncRAT botnet C2 server (confidence level: 75%)
file179.13.3.111
Remcos payload delivery server (confidence level: 75%)
file185.252.179.66
AsyncRAT botnet C2 server (confidence level: 75%)
file162.33.179.240
IcedID botnet C2 server (confidence level: 75%)
file45.61.138.12
IcedID botnet C2 server (confidence level: 75%)
file193.31.28.123
Meterpreter botnet C2 server (confidence level: 100%)
file41.216.188.29
Ave Maria botnet C2 server (confidence level: 100%)
file41.68.165.218
NjRAT botnet C2 server (confidence level: 100%)
file3.125.188.168
NjRAT botnet C2 server (confidence level: 100%)
file35.157.111.131
NjRAT botnet C2 server (confidence level: 100%)
file3.68.56.232
NjRAT botnet C2 server (confidence level: 100%)
file91.103.252.180
RedLine Stealer botnet C2 server (confidence level: 100%)
file91.149.232.174
IcedID botnet C2 server (confidence level: 75%)
file193.149.176.133
IcedID botnet C2 server (confidence level: 75%)
file87.237.54.28
RedLine Stealer botnet C2 server (confidence level: 100%)
file93.123.118.3
Ave Maria botnet C2 server (confidence level: 100%)
file89.23.98.29
RedLine Stealer botnet C2 server (confidence level: 100%)

Hash

ValueDescriptionCopy
hash5810
RedLine Stealer botnet C2 server (confidence level: 100%)
hash11955
RedLine Stealer botnet C2 server (confidence level: 100%)
hash58731
Meterpreter botnet C2 server (confidence level: 100%)
hash6609
Remcos botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 50%)
hash6613
BianLian botnet C2 server (confidence level: 50%)
hash443
Havoc botnet C2 server (confidence level: 50%)
hash443
Havoc botnet C2 server (confidence level: 50%)
hash80
Havoc botnet C2 server (confidence level: 50%)
hash445
Responder botnet C2 server (confidence level: 50%)
hash443
Responder botnet C2 server (confidence level: 50%)
hash80
Responder botnet C2 server (confidence level: 50%)
hash445
Responder botnet C2 server (confidence level: 50%)
hash445
Responder botnet C2 server (confidence level: 50%)
hash8848
DCRat botnet C2 server (confidence level: 50%)
hash64432
DCRat botnet C2 server (confidence level: 50%)
hash8848
DCRat botnet C2 server (confidence level: 50%)
hash8888
Unknown malware botnet C2 server (confidence level: 50%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
WhiteSnake Stealer botnet C2 server (confidence level: 100%)
hash8080
WhiteSnake Stealer botnet C2 server (confidence level: 100%)
hash46961
RedLine Stealer botnet C2 server (confidence level: 100%)
hash4404
AsyncRAT botnet C2 server (confidence level: 75%)
hashd27224eb9e5c34abfb22ba1941f3c4c4fbcfb5702899f8cf4fe280f4aa881d44
Remcos payload (confidence level: 75%)
hash5a21b731fa6efbd890bcec79dc8ee32d38d78ff56ba4570b7edeef947b335484
Remcos payload (confidence level: 75%)
hash77e02a67b7335161ae2abc3cd2a71540b75c78ab564cb3d993ae1e6dbcbeb615
Remcos payload (confidence level: 75%)
hash2449
Remcos payload delivery server (confidence level: 75%)
hash6906
AsyncRAT botnet C2 server (confidence level: 75%)
hash433
IcedID botnet C2 server (confidence level: 75%)
hash443
IcedID botnet C2 server (confidence level: 75%)
hash4444
Meterpreter botnet C2 server (confidence level: 100%)
hash5200
Ave Maria botnet C2 server (confidence level: 100%)
hash1177
NjRAT botnet C2 server (confidence level: 100%)
hash12866
NjRAT botnet C2 server (confidence level: 100%)
hash12866
NjRAT botnet C2 server (confidence level: 100%)
hash12866
NjRAT botnet C2 server (confidence level: 100%)
hash16711
RedLine Stealer botnet C2 server (confidence level: 100%)
hash80
IcedID botnet C2 server (confidence level: 75%)
hash80
IcedID botnet C2 server (confidence level: 75%)
hash18186
RedLine Stealer botnet C2 server (confidence level: 100%)
hash46308
Ave Maria botnet C2 server (confidence level: 100%)
hash41686
RedLine Stealer botnet C2 server (confidence level: 100%)

Domain

ValueDescriptionCopy
domainsept7ama.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainkevinbrawiewu.com
IcedID botnet C2 domain (confidence level: 100%)
domainclainsrimauto.com
IcedID botnet C2 domain (confidence level: 100%)
domainkaheshanpa.com
IcedID botnet C2 domain (confidence level: 100%)
domain04septgo.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainekb.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainfk29.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainmsk.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainsept4em.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainsept5ama.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainsept7amd.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainbitsvertise.com
Unknown malware payload delivery domain (confidence level: 100%)
domainblgbeach.com
Unknown malware payload delivery domain (confidence level: 100%)
domaindbgsymbol.com
Unknown malware payload delivery domain (confidence level: 100%)
domainecordillos.com
Unknown malware payload delivery domain (confidence level: 100%)
domainismartrium.com
Unknown malware payload delivery domain (confidence level: 100%)
domainrapisigns.com
Unknown malware payload delivery domain (confidence level: 100%)
domainagostodosgad.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainbdios8877.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domaincocomelon27.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domaindia16mayoje.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domaindiosestaconmiugo.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domaineduardoestevex.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainenagostoestb.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainenvio7sep2023.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainesteesasyn.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainesteesmider.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainestemesesdedios.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainestwrmessol.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainlostermas.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainmairoester.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainmarquesosa3.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainparahotmejor.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainparajulioped.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainparaprobares.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainquasintiner.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainrenvosdtutu.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainservernjnuevo.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainsientosmilter.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainsomosdecall.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domaintodoparadios.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainvamosaverc.duckdns.org
Remcos botnet C2 domain (confidence level: 100%)
domainamadapi.tuktuk.ug
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainstracer.top
RedLine Stealer botnet C2 domain (confidence level: 100%)
domaintaybo.top
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainkik.taybo.top
RedLine Stealer botnet C2 domain (confidence level: 100%)
domainsrk.stracer.top
RedLine Stealer botnet C2 domain (confidence level: 100%)
domaincdn-new-dwnl.site
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainstats-best.site
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainpklkknj89bygvczvi.com
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainngvcfrttgyu512vgv.net
FAKEUPDATES payload delivery domain (confidence level: 100%)
domain3v1n35i5kwx.life
BumbleBee botnet C2 domain (confidence level: 100%)
domainnewdnq1xnl9.life
BumbleBee botnet C2 domain (confidence level: 100%)
domainitszko2ot5u.life
BumbleBee botnet C2 domain (confidence level: 100%)
domaincmid1s1zeiu.life
BumbleBee botnet C2 domain (confidence level: 100%)

Url

ValueDescriptionCopy
urlhttps://heartwoodproperties.com/blog.php
GootLoader payload delivery URL (confidence level: 100%)
urlhttps://heldenfutter.de/blog.php
GootLoader payload delivery URL (confidence level: 100%)
urlhttps://gutesherz.or/go.php
GootLoader payload delivery URL (confidence level: 100%)
urlhttps://38.47.238.225/jquery-3.3.1.min.js
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://paste.ee/d/jepak/0
Remcos payload delivery URL (confidence level: 75%)
urlhttps://pastebin.com/raw/sfgsbg3v
Remcos payload delivery URL (confidence level: 75%)
urlhttps://wtools.io/code/dl/bplb
Remcos payload delivery URL (confidence level: 75%)
urlhttps://pasteio.com/download/xtnja1wvooam
Remcos payload delivery URL (confidence level: 75%)
urlhttps://oiuytyfvq621mb.org/vvmd54/
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://oiuytyfvq621mb.org/zgbn19mx
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://oiuytyfvq621mb.org/lander/chrome/_index.php
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttp://bagisyapsendehadi.xyz/
Alien botnet C2 (confidence level: 80%)
urlhttp://berkatamankimsedurduramaz.ml/
Alien botnet C2 (confidence level: 80%)
urlhttp://yenilimit.xyz
Alien botnet C2 (confidence level: 80%)
urlhttp://status.klopware.space/_defaultwindows.php
DCRat botnet C2 (confidence level: 100%)
urlhttps://pklkknj89bygvczvi.com/vvmd54/
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://ngvcfrttgyu512vgv.net/zgbn19mx
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://ngvcfrttgyu512vgv.net/lander/chrome/_index.php
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttp://a0859540.xsph.ru/l1nc0in.php
DCRat botnet C2 (confidence level: 100%)

Threat ID: 682acdc3bbaf20d303f1d200

Added to database: 5/19/2025, 6:20:51 AM

Last enriched: 6/18/2025, 8:50:52 AM

Last updated: 8/11/2025, 2:16:56 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats