ThreatFox IOCs for 2023-09-08
ThreatFox IOCs for 2023-09-08
AI Analysis
Technical Summary
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on September 8, 2023, categorized under malware with a focus on OSINT (Open Source Intelligence) activities. The threat is characterized primarily by network activity and payload delivery mechanisms, indicating that it involves the distribution or deployment of malicious payloads through network channels. However, no specific affected software versions or products are identified, and no patches are available, suggesting that this is not a vulnerability in a particular software product but rather a collection of threat intelligence related to malware campaigns or infrastructure. The threat level is rated as 2 on an unspecified scale, with analysis and distribution scores indicating moderate confidence and spread. The absence of known exploits in the wild and the lack of detailed technical indicators or CWEs (Common Weakness Enumerations) imply that this threat intelligence is more focused on detection and monitoring rather than an active exploit targeting a specific vulnerability. The TLP (Traffic Light Protocol) white tag indicates that the information is intended for unrestricted sharing, supporting broad dissemination for defensive purposes. Overall, this threat represents a medium-severity malware-related intelligence update that provides network-based indicators useful for OSINT-driven detection and response activities but does not describe a direct exploit or vulnerability requiring immediate patching or mitigation.
Potential Impact
For European organizations, the impact of this threat is primarily related to the potential for malware infections through network-based payload delivery mechanisms. Since the threat intelligence is OSINT-focused and does not specify particular exploited vulnerabilities or affected software, the risk centers on the ability of attackers to distribute malicious payloads that could compromise confidentiality, integrity, or availability if successfully deployed. The medium severity rating suggests that while the threat is notable, it does not currently represent a critical or widespread active exploitation campaign. European organizations involved in sectors with high network exposure, such as finance, telecommunications, and critical infrastructure, may face increased risk if attackers leverage these IOCs to evade detection or deliver payloads. The lack of known exploits in the wild reduces the immediacy of the threat but does not eliminate the possibility of future exploitation or targeted attacks using the identified indicators. Consequently, the impact is moderate, with potential consequences including data breaches, service disruptions, or unauthorized access if malware payloads are successfully delivered and executed.
Mitigation Recommendations
Given the nature of this threat as OSINT-based malware indicators without specific vulnerable products or patches, mitigation should focus on enhancing detection and prevention capabilities. European organizations should: 1) Integrate the provided IOCs into existing network monitoring and intrusion detection systems to improve early detection of related malicious activity. 2) Employ advanced network traffic analysis tools capable of identifying anomalous payload delivery patterns consistent with the threat’s network activity profile. 3) Maintain robust endpoint protection solutions with behavioral analysis to detect and block malware execution even if payloads bypass initial network defenses. 4) Conduct regular threat hunting exercises leveraging updated OSINT feeds to proactively identify potential compromises. 5) Ensure comprehensive logging and correlation of network events to facilitate rapid incident response. 6) Educate security teams on the importance of OSINT in threat detection and encourage collaboration with threat intelligence sharing communities to stay informed about evolving indicators. These measures go beyond generic advice by emphasizing the operational integration of OSINT-derived IOCs and proactive network behavior analysis tailored to the threat’s characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
Indicators of Compromise
- file: 20.0.54.48
- hash: 5810
- domain: sept7ama.tuktuk.ug
- domain: kevinbrawiewu.com
- domain: clainsrimauto.com
- domain: kaheshanpa.com
- domain: 04septgo.tuktuk.ug
- domain: ekb.tuktuk.ug
- domain: fk29.tuktuk.ug
- domain: msk.tuktuk.ug
- domain: sept4em.tuktuk.ug
- domain: sept5ama.tuktuk.ug
- domain: sept7amd.tuktuk.ug
- domain: bitsvertise.com
- domain: blgbeach.com
- domain: dbgsymbol.com
- domain: ecordillos.com
- domain: ismartrium.com
- domain: rapisigns.com
- file: 23.108.57.87
- hash: 11955
- domain: agostodosgad.duckdns.org
- domain: bdios8877.duckdns.org
- domain: cocomelon27.duckdns.org
- domain: dia16mayoje.duckdns.org
- domain: diosestaconmiugo.duckdns.org
- domain: eduardoestevex.duckdns.org
- domain: enagostoestb.duckdns.org
- domain: envio7sep2023.duckdns.org
- domain: esteesasyn.duckdns.org
- domain: esteesmider.duckdns.org
- domain: estemesesdedios.duckdns.org
- domain: estwrmessol.duckdns.org
- domain: lostermas.duckdns.org
- domain: mairoester.duckdns.org
- domain: marquesosa3.duckdns.org
- domain: parahotmejor.duckdns.org
- domain: parajulioped.duckdns.org
- domain: paraprobares.duckdns.org
- domain: quasintiner.duckdns.org
- domain: renvosdtutu.duckdns.org
- domain: servernjnuevo.duckdns.org
- domain: sientosmilter.duckdns.org
- domain: somosdecall.duckdns.org
- domain: todoparadios.duckdns.org
- domain: vamosaverc.duckdns.org
- file: 179.60.147.4
- hash: 58731
- url: https://heartwoodproperties.com/blog.php
- url: https://heldenfutter.de/blog.php
- url: https://gutesherz.or/go.php
- file: 194.147.140.232
- hash: 6609
- file: 3.214.57.4
- hash: 7443
- file: 208.123.119.100
- hash: 6613
- file: 66.135.16.39
- hash: 443
- file: 80.85.152.108
- hash: 443
- file: 159.223.205.33
- hash: 80
- file: 89.96.196.150
- hash: 445
- file: 3.216.91.201
- hash: 443
- file: 13.90.242.103
- hash: 80
- file: 165.154.221.149
- hash: 445
- file: 188.165.185.107
- hash: 445
- file: 223.26.57.45
- hash: 8848
- file: 180.12.159.131
- hash: 64432
- file: 150.107.2.176
- hash: 8848
- file: 42.194.178.221
- hash: 8888
- url: https://38.47.238.225/jquery-3.3.1.min.js
- file: 38.47.238.225
- hash: 443
- file: 217.145.238.175
- hash: 80
- file: 78.46.66.9
- hash: 8080
- file: 5.42.65.62
- hash: 46961
- file: 95.214.25.236
- hash: 4404
- domain: amadapi.tuktuk.ug
- url: https://paste.ee/d/jepak/0
- url: https://pastebin.com/raw/sfgsbg3v
- url: https://wtools.io/code/dl/bplb
- url: https://pasteio.com/download/xtnja1wvooam
- hash: d27224eb9e5c34abfb22ba1941f3c4c4fbcfb5702899f8cf4fe280f4aa881d44
- hash: 5a21b731fa6efbd890bcec79dc8ee32d38d78ff56ba4570b7edeef947b335484
- hash: 77e02a67b7335161ae2abc3cd2a71540b75c78ab564cb3d993ae1e6dbcbeb615
- domain: stracer.top
- domain: taybo.top
- domain: kik.taybo.top
- domain: srk.stracer.top
- file: 179.13.3.111
- hash: 2449
- file: 185.252.179.66
- hash: 6906
- url: https://oiuytyfvq621mb.org/vvmd54/
- url: https://oiuytyfvq621mb.org/zgbn19mx
- url: https://oiuytyfvq621mb.org/lander/chrome/_index.php
- file: 162.33.179.240
- hash: 433
- file: 45.61.138.12
- hash: 443
- file: 193.31.28.123
- hash: 4444
- file: 41.216.188.29
- hash: 5200
- file: 41.68.165.218
- hash: 1177
- url: http://bagisyapsendehadi.xyz/
- url: http://berkatamankimsedurduramaz.ml/
- url: http://yenilimit.xyz
- url: http://status.klopware.space/_defaultwindows.php
- file: 3.125.188.168
- hash: 12866
- file: 35.157.111.131
- hash: 12866
- file: 3.68.56.232
- hash: 12866
- url: https://pklkknj89bygvczvi.com/vvmd54/
- url: https://ngvcfrttgyu512vgv.net/zgbn19mx
- url: https://ngvcfrttgyu512vgv.net/lander/chrome/_index.php
- domain: cdn-new-dwnl.site
- domain: stats-best.site
- domain: pklkknj89bygvczvi.com
- domain: ngvcfrttgyu512vgv.net
- domain: 3v1n35i5kwx.life
- domain: newdnq1xnl9.life
- domain: itszko2ot5u.life
- domain: cmid1s1zeiu.life
- file: 91.103.252.180
- hash: 16711
- file: 91.149.232.174
- hash: 80
- file: 193.149.176.133
- hash: 80
- file: 87.237.54.28
- hash: 18186
- url: http://a0859540.xsph.ru/l1nc0in.php
- file: 93.123.118.3
- hash: 46308
- file: 89.23.98.29
- hash: 41686
ThreatFox IOCs for 2023-09-08
Description
ThreatFox IOCs for 2023-09-08
AI-Powered Analysis
Technical Analysis
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on September 8, 2023, categorized under malware with a focus on OSINT (Open Source Intelligence) activities. The threat is characterized primarily by network activity and payload delivery mechanisms, indicating that it involves the distribution or deployment of malicious payloads through network channels. However, no specific affected software versions or products are identified, and no patches are available, suggesting that this is not a vulnerability in a particular software product but rather a collection of threat intelligence related to malware campaigns or infrastructure. The threat level is rated as 2 on an unspecified scale, with analysis and distribution scores indicating moderate confidence and spread. The absence of known exploits in the wild and the lack of detailed technical indicators or CWEs (Common Weakness Enumerations) imply that this threat intelligence is more focused on detection and monitoring rather than an active exploit targeting a specific vulnerability. The TLP (Traffic Light Protocol) white tag indicates that the information is intended for unrestricted sharing, supporting broad dissemination for defensive purposes. Overall, this threat represents a medium-severity malware-related intelligence update that provides network-based indicators useful for OSINT-driven detection and response activities but does not describe a direct exploit or vulnerability requiring immediate patching or mitigation.
Potential Impact
For European organizations, the impact of this threat is primarily related to the potential for malware infections through network-based payload delivery mechanisms. Since the threat intelligence is OSINT-focused and does not specify particular exploited vulnerabilities or affected software, the risk centers on the ability of attackers to distribute malicious payloads that could compromise confidentiality, integrity, or availability if successfully deployed. The medium severity rating suggests that while the threat is notable, it does not currently represent a critical or widespread active exploitation campaign. European organizations involved in sectors with high network exposure, such as finance, telecommunications, and critical infrastructure, may face increased risk if attackers leverage these IOCs to evade detection or deliver payloads. The lack of known exploits in the wild reduces the immediacy of the threat but does not eliminate the possibility of future exploitation or targeted attacks using the identified indicators. Consequently, the impact is moderate, with potential consequences including data breaches, service disruptions, or unauthorized access if malware payloads are successfully delivered and executed.
Mitigation Recommendations
Given the nature of this threat as OSINT-based malware indicators without specific vulnerable products or patches, mitigation should focus on enhancing detection and prevention capabilities. European organizations should: 1) Integrate the provided IOCs into existing network monitoring and intrusion detection systems to improve early detection of related malicious activity. 2) Employ advanced network traffic analysis tools capable of identifying anomalous payload delivery patterns consistent with the threat’s network activity profile. 3) Maintain robust endpoint protection solutions with behavioral analysis to detect and block malware execution even if payloads bypass initial network defenses. 4) Conduct regular threat hunting exercises leveraging updated OSINT feeds to proactively identify potential compromises. 5) Ensure comprehensive logging and correlation of network events to facilitate rapid incident response. 6) Educate security teams on the importance of OSINT in threat detection and encourage collaboration with threat intelligence sharing communities to stay informed about evolving indicators. These measures go beyond generic advice by emphasizing the operational integration of OSINT-derived IOCs and proactive network behavior analysis tailored to the threat’s characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- fd6d6276-0d5f-4b2b-94e7-5681eaa31989
- Original Timestamp
- 1694217785
Indicators of Compromise
File
| Value | Description | Copy |
|---|---|---|
file20.0.54.48 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file23.108.57.87 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file179.60.147.4 | Meterpreter botnet C2 server (confidence level: 100%) | |
file194.147.140.232 | Remcos botnet C2 server (confidence level: 100%) | |
file3.214.57.4 | Unknown malware botnet C2 server (confidence level: 50%) | |
file208.123.119.100 | BianLian botnet C2 server (confidence level: 50%) | |
file66.135.16.39 | Havoc botnet C2 server (confidence level: 50%) | |
file80.85.152.108 | Havoc botnet C2 server (confidence level: 50%) | |
file159.223.205.33 | Havoc botnet C2 server (confidence level: 50%) | |
file89.96.196.150 | Responder botnet C2 server (confidence level: 50%) | |
file3.216.91.201 | Responder botnet C2 server (confidence level: 50%) | |
file13.90.242.103 | Responder botnet C2 server (confidence level: 50%) | |
file165.154.221.149 | Responder botnet C2 server (confidence level: 50%) | |
file188.165.185.107 | Responder botnet C2 server (confidence level: 50%) | |
file223.26.57.45 | DCRat botnet C2 server (confidence level: 50%) | |
file180.12.159.131 | DCRat botnet C2 server (confidence level: 50%) | |
file150.107.2.176 | DCRat botnet C2 server (confidence level: 50%) | |
file42.194.178.221 | Unknown malware botnet C2 server (confidence level: 50%) | |
file38.47.238.225 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file217.145.238.175 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
file78.46.66.9 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
file5.42.65.62 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file95.214.25.236 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file179.13.3.111 | Remcos payload delivery server (confidence level: 75%) | |
file185.252.179.66 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file162.33.179.240 | IcedID botnet C2 server (confidence level: 75%) | |
file45.61.138.12 | IcedID botnet C2 server (confidence level: 75%) | |
file193.31.28.123 | Meterpreter botnet C2 server (confidence level: 100%) | |
file41.216.188.29 | Ave Maria botnet C2 server (confidence level: 100%) | |
file41.68.165.218 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.125.188.168 | NjRAT botnet C2 server (confidence level: 100%) | |
file35.157.111.131 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.68.56.232 | NjRAT botnet C2 server (confidence level: 100%) | |
file91.103.252.180 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file91.149.232.174 | IcedID botnet C2 server (confidence level: 75%) | |
file193.149.176.133 | IcedID botnet C2 server (confidence level: 75%) | |
file87.237.54.28 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file93.123.118.3 | Ave Maria botnet C2 server (confidence level: 100%) | |
file89.23.98.29 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Hash
| Value | Description | Copy |
|---|---|---|
hash5810 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash11955 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash58731 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash6609 | Remcos botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash6613 | BianLian botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash80 | Havoc botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash443 | Responder botnet C2 server (confidence level: 50%) | |
hash80 | Responder botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash8848 | DCRat botnet C2 server (confidence level: 50%) | |
hash64432 | DCRat botnet C2 server (confidence level: 50%) | |
hash8848 | DCRat botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
hash8080 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
hash46961 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash4404 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hashd27224eb9e5c34abfb22ba1941f3c4c4fbcfb5702899f8cf4fe280f4aa881d44 | Remcos payload (confidence level: 75%) | |
hash5a21b731fa6efbd890bcec79dc8ee32d38d78ff56ba4570b7edeef947b335484 | Remcos payload (confidence level: 75%) | |
hash77e02a67b7335161ae2abc3cd2a71540b75c78ab564cb3d993ae1e6dbcbeb615 | Remcos payload (confidence level: 75%) | |
hash2449 | Remcos payload delivery server (confidence level: 75%) | |
hash6906 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash433 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash4444 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash5200 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash16711 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | IcedID botnet C2 server (confidence level: 75%) | |
hash80 | IcedID botnet C2 server (confidence level: 75%) | |
hash18186 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash46308 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash41686 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Domain
| Value | Description | Copy |
|---|---|---|
domainsept7ama.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainkevinbrawiewu.com | IcedID botnet C2 domain (confidence level: 100%) | |
domainclainsrimauto.com | IcedID botnet C2 domain (confidence level: 100%) | |
domainkaheshanpa.com | IcedID botnet C2 domain (confidence level: 100%) | |
domain04septgo.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainekb.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainfk29.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainmsk.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept4em.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept5ama.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept7amd.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainbitsvertise.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainblgbeach.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domaindbgsymbol.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainecordillos.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainismartrium.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainrapisigns.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainagostodosgad.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainbdios8877.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaincocomelon27.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaindia16mayoje.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaindiosestaconmiugo.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaineduardoestevex.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainenagostoestb.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainenvio7sep2023.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainesteesasyn.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainesteesmider.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainestemesesdedios.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainestwrmessol.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainlostermas.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainmairoester.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainmarquesosa3.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparahotmejor.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparajulioped.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparaprobares.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainquasintiner.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainrenvosdtutu.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainservernjnuevo.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainsientosmilter.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainsomosdecall.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaintodoparadios.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainvamosaverc.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainamadapi.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainstracer.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domaintaybo.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainkik.taybo.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsrk.stracer.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domaincdn-new-dwnl.site | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainstats-best.site | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainpklkknj89bygvczvi.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainngvcfrttgyu512vgv.net | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domain3v1n35i5kwx.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domainnewdnq1xnl9.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domainitszko2ot5u.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domaincmid1s1zeiu.life | BumbleBee botnet C2 domain (confidence level: 100%) |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://heartwoodproperties.com/blog.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://heldenfutter.de/blog.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://gutesherz.or/go.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://38.47.238.225/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://paste.ee/d/jepak/0 | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://pastebin.com/raw/sfgsbg3v | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://wtools.io/code/dl/bplb | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://pasteio.com/download/xtnja1wvooam | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://oiuytyfvq621mb.org/vvmd54/ | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://oiuytyfvq621mb.org/zgbn19mx | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://oiuytyfvq621mb.org/lander/chrome/_index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://bagisyapsendehadi.xyz/ | Alien botnet C2 (confidence level: 80%) | |
urlhttp://berkatamankimsedurduramaz.ml/ | Alien botnet C2 (confidence level: 80%) | |
urlhttp://yenilimit.xyz | Alien botnet C2 (confidence level: 80%) | |
urlhttp://status.klopware.space/_defaultwindows.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://pklkknj89bygvczvi.com/vvmd54/ | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://ngvcfrttgyu512vgv.net/zgbn19mx | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://ngvcfrttgyu512vgv.net/lander/chrome/_index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://a0859540.xsph.ru/l1nc0in.php | DCRat botnet C2 (confidence level: 100%) |
Threat ID: 682acdc3bbaf20d303f1d200
Added to database: 5/19/2025, 6:20:51 AM
Last enriched: 6/18/2025, 8:50:52 AM
Last updated: 12/2/2025, 5:26:39 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
NK Hackers Push 200 Malicious npm Packages with OtterCookie Malware
MediumResearchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera
MediumThreatFox IOCs for 2025-12-01
MediumNew Albiriox Android Malware Developed by Russian Cybercriminals
MediumWebinar: The "Agentic" Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.