ThreatFox IOCs for 2023-09-08
ThreatFox IOCs for 2023-09-08
AI Analysis
Technical Summary
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on September 8, 2023, categorized under malware with a focus on OSINT (Open Source Intelligence) activities. The threat is characterized primarily by network activity and payload delivery mechanisms, indicating that it involves the distribution or deployment of malicious payloads through network channels. However, no specific affected software versions or products are identified, and no patches are available, suggesting that this is not a vulnerability in a particular software product but rather a collection of threat intelligence related to malware campaigns or infrastructure. The threat level is rated as 2 on an unspecified scale, with analysis and distribution scores indicating moderate confidence and spread. The absence of known exploits in the wild and the lack of detailed technical indicators or CWEs (Common Weakness Enumerations) imply that this threat intelligence is more focused on detection and monitoring rather than an active exploit targeting a specific vulnerability. The TLP (Traffic Light Protocol) white tag indicates that the information is intended for unrestricted sharing, supporting broad dissemination for defensive purposes. Overall, this threat represents a medium-severity malware-related intelligence update that provides network-based indicators useful for OSINT-driven detection and response activities but does not describe a direct exploit or vulnerability requiring immediate patching or mitigation.
Potential Impact
For European organizations, the impact of this threat is primarily related to the potential for malware infections through network-based payload delivery mechanisms. Since the threat intelligence is OSINT-focused and does not specify particular exploited vulnerabilities or affected software, the risk centers on the ability of attackers to distribute malicious payloads that could compromise confidentiality, integrity, or availability if successfully deployed. The medium severity rating suggests that while the threat is notable, it does not currently represent a critical or widespread active exploitation campaign. European organizations involved in sectors with high network exposure, such as finance, telecommunications, and critical infrastructure, may face increased risk if attackers leverage these IOCs to evade detection or deliver payloads. The lack of known exploits in the wild reduces the immediacy of the threat but does not eliminate the possibility of future exploitation or targeted attacks using the identified indicators. Consequently, the impact is moderate, with potential consequences including data breaches, service disruptions, or unauthorized access if malware payloads are successfully delivered and executed.
Mitigation Recommendations
Given the nature of this threat as OSINT-based malware indicators without specific vulnerable products or patches, mitigation should focus on enhancing detection and prevention capabilities. European organizations should: 1) Integrate the provided IOCs into existing network monitoring and intrusion detection systems to improve early detection of related malicious activity. 2) Employ advanced network traffic analysis tools capable of identifying anomalous payload delivery patterns consistent with the threat’s network activity profile. 3) Maintain robust endpoint protection solutions with behavioral analysis to detect and block malware execution even if payloads bypass initial network defenses. 4) Conduct regular threat hunting exercises leveraging updated OSINT feeds to proactively identify potential compromises. 5) Ensure comprehensive logging and correlation of network events to facilitate rapid incident response. 6) Educate security teams on the importance of OSINT in threat detection and encourage collaboration with threat intelligence sharing communities to stay informed about evolving indicators. These measures go beyond generic advice by emphasizing the operational integration of OSINT-derived IOCs and proactive network behavior analysis tailored to the threat’s characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
Indicators of Compromise
- file: 20.0.54.48
- hash: 5810
- domain: sept7ama.tuktuk.ug
- domain: kevinbrawiewu.com
- domain: clainsrimauto.com
- domain: kaheshanpa.com
- domain: 04septgo.tuktuk.ug
- domain: ekb.tuktuk.ug
- domain: fk29.tuktuk.ug
- domain: msk.tuktuk.ug
- domain: sept4em.tuktuk.ug
- domain: sept5ama.tuktuk.ug
- domain: sept7amd.tuktuk.ug
- domain: bitsvertise.com
- domain: blgbeach.com
- domain: dbgsymbol.com
- domain: ecordillos.com
- domain: ismartrium.com
- domain: rapisigns.com
- file: 23.108.57.87
- hash: 11955
- domain: agostodosgad.duckdns.org
- domain: bdios8877.duckdns.org
- domain: cocomelon27.duckdns.org
- domain: dia16mayoje.duckdns.org
- domain: diosestaconmiugo.duckdns.org
- domain: eduardoestevex.duckdns.org
- domain: enagostoestb.duckdns.org
- domain: envio7sep2023.duckdns.org
- domain: esteesasyn.duckdns.org
- domain: esteesmider.duckdns.org
- domain: estemesesdedios.duckdns.org
- domain: estwrmessol.duckdns.org
- domain: lostermas.duckdns.org
- domain: mairoester.duckdns.org
- domain: marquesosa3.duckdns.org
- domain: parahotmejor.duckdns.org
- domain: parajulioped.duckdns.org
- domain: paraprobares.duckdns.org
- domain: quasintiner.duckdns.org
- domain: renvosdtutu.duckdns.org
- domain: servernjnuevo.duckdns.org
- domain: sientosmilter.duckdns.org
- domain: somosdecall.duckdns.org
- domain: todoparadios.duckdns.org
- domain: vamosaverc.duckdns.org
- file: 179.60.147.4
- hash: 58731
- url: https://heartwoodproperties.com/blog.php
- url: https://heldenfutter.de/blog.php
- url: https://gutesherz.or/go.php
- file: 194.147.140.232
- hash: 6609
- file: 3.214.57.4
- hash: 7443
- file: 208.123.119.100
- hash: 6613
- file: 66.135.16.39
- hash: 443
- file: 80.85.152.108
- hash: 443
- file: 159.223.205.33
- hash: 80
- file: 89.96.196.150
- hash: 445
- file: 3.216.91.201
- hash: 443
- file: 13.90.242.103
- hash: 80
- file: 165.154.221.149
- hash: 445
- file: 188.165.185.107
- hash: 445
- file: 223.26.57.45
- hash: 8848
- file: 180.12.159.131
- hash: 64432
- file: 150.107.2.176
- hash: 8848
- file: 42.194.178.221
- hash: 8888
- url: https://38.47.238.225/jquery-3.3.1.min.js
- file: 38.47.238.225
- hash: 443
- file: 217.145.238.175
- hash: 80
- file: 78.46.66.9
- hash: 8080
- file: 5.42.65.62
- hash: 46961
- file: 95.214.25.236
- hash: 4404
- domain: amadapi.tuktuk.ug
- url: https://paste.ee/d/jepak/0
- url: https://pastebin.com/raw/sfgsbg3v
- url: https://wtools.io/code/dl/bplb
- url: https://pasteio.com/download/xtnja1wvooam
- hash: d27224eb9e5c34abfb22ba1941f3c4c4fbcfb5702899f8cf4fe280f4aa881d44
- hash: 5a21b731fa6efbd890bcec79dc8ee32d38d78ff56ba4570b7edeef947b335484
- hash: 77e02a67b7335161ae2abc3cd2a71540b75c78ab564cb3d993ae1e6dbcbeb615
- domain: stracer.top
- domain: taybo.top
- domain: kik.taybo.top
- domain: srk.stracer.top
- file: 179.13.3.111
- hash: 2449
- file: 185.252.179.66
- hash: 6906
- url: https://oiuytyfvq621mb.org/vvmd54/
- url: https://oiuytyfvq621mb.org/zgbn19mx
- url: https://oiuytyfvq621mb.org/lander/chrome/_index.php
- file: 162.33.179.240
- hash: 433
- file: 45.61.138.12
- hash: 443
- file: 193.31.28.123
- hash: 4444
- file: 41.216.188.29
- hash: 5200
- file: 41.68.165.218
- hash: 1177
- url: http://bagisyapsendehadi.xyz/
- url: http://berkatamankimsedurduramaz.ml/
- url: http://yenilimit.xyz
- url: http://status.klopware.space/_defaultwindows.php
- file: 3.125.188.168
- hash: 12866
- file: 35.157.111.131
- hash: 12866
- file: 3.68.56.232
- hash: 12866
- url: https://pklkknj89bygvczvi.com/vvmd54/
- url: https://ngvcfrttgyu512vgv.net/zgbn19mx
- url: https://ngvcfrttgyu512vgv.net/lander/chrome/_index.php
- domain: cdn-new-dwnl.site
- domain: stats-best.site
- domain: pklkknj89bygvczvi.com
- domain: ngvcfrttgyu512vgv.net
- domain: 3v1n35i5kwx.life
- domain: newdnq1xnl9.life
- domain: itszko2ot5u.life
- domain: cmid1s1zeiu.life
- file: 91.103.252.180
- hash: 16711
- file: 91.149.232.174
- hash: 80
- file: 193.149.176.133
- hash: 80
- file: 87.237.54.28
- hash: 18186
- url: http://a0859540.xsph.ru/l1nc0in.php
- file: 93.123.118.3
- hash: 46308
- file: 89.23.98.29
- hash: 41686
ThreatFox IOCs for 2023-09-08
Description
ThreatFox IOCs for 2023-09-08
AI-Powered Analysis
Technical Analysis
The provided threat information pertains to a set of Indicators of Compromise (IOCs) published by ThreatFox on September 8, 2023, categorized under malware with a focus on OSINT (Open Source Intelligence) activities. The threat is characterized primarily by network activity and payload delivery mechanisms, indicating that it involves the distribution or deployment of malicious payloads through network channels. However, no specific affected software versions or products are identified, and no patches are available, suggesting that this is not a vulnerability in a particular software product but rather a collection of threat intelligence related to malware campaigns or infrastructure. The threat level is rated as 2 on an unspecified scale, with analysis and distribution scores indicating moderate confidence and spread. The absence of known exploits in the wild and the lack of detailed technical indicators or CWEs (Common Weakness Enumerations) imply that this threat intelligence is more focused on detection and monitoring rather than an active exploit targeting a specific vulnerability. The TLP (Traffic Light Protocol) white tag indicates that the information is intended for unrestricted sharing, supporting broad dissemination for defensive purposes. Overall, this threat represents a medium-severity malware-related intelligence update that provides network-based indicators useful for OSINT-driven detection and response activities but does not describe a direct exploit or vulnerability requiring immediate patching or mitigation.
Potential Impact
For European organizations, the impact of this threat is primarily related to the potential for malware infections through network-based payload delivery mechanisms. Since the threat intelligence is OSINT-focused and does not specify particular exploited vulnerabilities or affected software, the risk centers on the ability of attackers to distribute malicious payloads that could compromise confidentiality, integrity, or availability if successfully deployed. The medium severity rating suggests that while the threat is notable, it does not currently represent a critical or widespread active exploitation campaign. European organizations involved in sectors with high network exposure, such as finance, telecommunications, and critical infrastructure, may face increased risk if attackers leverage these IOCs to evade detection or deliver payloads. The lack of known exploits in the wild reduces the immediacy of the threat but does not eliminate the possibility of future exploitation or targeted attacks using the identified indicators. Consequently, the impact is moderate, with potential consequences including data breaches, service disruptions, or unauthorized access if malware payloads are successfully delivered and executed.
Mitigation Recommendations
Given the nature of this threat as OSINT-based malware indicators without specific vulnerable products or patches, mitigation should focus on enhancing detection and prevention capabilities. European organizations should: 1) Integrate the provided IOCs into existing network monitoring and intrusion detection systems to improve early detection of related malicious activity. 2) Employ advanced network traffic analysis tools capable of identifying anomalous payload delivery patterns consistent with the threat’s network activity profile. 3) Maintain robust endpoint protection solutions with behavioral analysis to detect and block malware execution even if payloads bypass initial network defenses. 4) Conduct regular threat hunting exercises leveraging updated OSINT feeds to proactively identify potential compromises. 5) Ensure comprehensive logging and correlation of network events to facilitate rapid incident response. 6) Educate security teams on the importance of OSINT in threat detection and encourage collaboration with threat intelligence sharing communities to stay informed about evolving indicators. These measures go beyond generic advice by emphasizing the operational integration of OSINT-derived IOCs and proactive network behavior analysis tailored to the threat’s characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- fd6d6276-0d5f-4b2b-94e7-5681eaa31989
- Original Timestamp
- 1694217785
Indicators of Compromise
File
Value | Description | Copy |
---|---|---|
file20.0.54.48 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file23.108.57.87 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file179.60.147.4 | Meterpreter botnet C2 server (confidence level: 100%) | |
file194.147.140.232 | Remcos botnet C2 server (confidence level: 100%) | |
file3.214.57.4 | Unknown malware botnet C2 server (confidence level: 50%) | |
file208.123.119.100 | BianLian botnet C2 server (confidence level: 50%) | |
file66.135.16.39 | Havoc botnet C2 server (confidence level: 50%) | |
file80.85.152.108 | Havoc botnet C2 server (confidence level: 50%) | |
file159.223.205.33 | Havoc botnet C2 server (confidence level: 50%) | |
file89.96.196.150 | Responder botnet C2 server (confidence level: 50%) | |
file3.216.91.201 | Responder botnet C2 server (confidence level: 50%) | |
file13.90.242.103 | Responder botnet C2 server (confidence level: 50%) | |
file165.154.221.149 | Responder botnet C2 server (confidence level: 50%) | |
file188.165.185.107 | Responder botnet C2 server (confidence level: 50%) | |
file223.26.57.45 | DCRat botnet C2 server (confidence level: 50%) | |
file180.12.159.131 | DCRat botnet C2 server (confidence level: 50%) | |
file150.107.2.176 | DCRat botnet C2 server (confidence level: 50%) | |
file42.194.178.221 | Unknown malware botnet C2 server (confidence level: 50%) | |
file38.47.238.225 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file217.145.238.175 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
file78.46.66.9 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
file5.42.65.62 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file95.214.25.236 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file179.13.3.111 | Remcos payload delivery server (confidence level: 75%) | |
file185.252.179.66 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file162.33.179.240 | IcedID botnet C2 server (confidence level: 75%) | |
file45.61.138.12 | IcedID botnet C2 server (confidence level: 75%) | |
file193.31.28.123 | Meterpreter botnet C2 server (confidence level: 100%) | |
file41.216.188.29 | Ave Maria botnet C2 server (confidence level: 100%) | |
file41.68.165.218 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.125.188.168 | NjRAT botnet C2 server (confidence level: 100%) | |
file35.157.111.131 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.68.56.232 | NjRAT botnet C2 server (confidence level: 100%) | |
file91.103.252.180 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file91.149.232.174 | IcedID botnet C2 server (confidence level: 75%) | |
file193.149.176.133 | IcedID botnet C2 server (confidence level: 75%) | |
file87.237.54.28 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file93.123.118.3 | Ave Maria botnet C2 server (confidence level: 100%) | |
file89.23.98.29 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash5810 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash11955 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash58731 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash6609 | Remcos botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash6613 | BianLian botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash80 | Havoc botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash443 | Responder botnet C2 server (confidence level: 50%) | |
hash80 | Responder botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash8848 | DCRat botnet C2 server (confidence level: 50%) | |
hash64432 | DCRat botnet C2 server (confidence level: 50%) | |
hash8848 | DCRat botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
hash8080 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
hash46961 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash4404 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hashd27224eb9e5c34abfb22ba1941f3c4c4fbcfb5702899f8cf4fe280f4aa881d44 | Remcos payload (confidence level: 75%) | |
hash5a21b731fa6efbd890bcec79dc8ee32d38d78ff56ba4570b7edeef947b335484 | Remcos payload (confidence level: 75%) | |
hash77e02a67b7335161ae2abc3cd2a71540b75c78ab564cb3d993ae1e6dbcbeb615 | Remcos payload (confidence level: 75%) | |
hash2449 | Remcos payload delivery server (confidence level: 75%) | |
hash6906 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash433 | IcedID botnet C2 server (confidence level: 75%) | |
hash443 | IcedID botnet C2 server (confidence level: 75%) | |
hash4444 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash5200 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12866 | NjRAT botnet C2 server (confidence level: 100%) | |
hash16711 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | IcedID botnet C2 server (confidence level: 75%) | |
hash80 | IcedID botnet C2 server (confidence level: 75%) | |
hash18186 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash46308 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash41686 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainsept7ama.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainkevinbrawiewu.com | IcedID botnet C2 domain (confidence level: 100%) | |
domainclainsrimauto.com | IcedID botnet C2 domain (confidence level: 100%) | |
domainkaheshanpa.com | IcedID botnet C2 domain (confidence level: 100%) | |
domain04septgo.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainekb.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainfk29.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainmsk.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept4em.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept5ama.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsept7amd.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainbitsvertise.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainblgbeach.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domaindbgsymbol.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainecordillos.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainismartrium.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainrapisigns.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainagostodosgad.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainbdios8877.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaincocomelon27.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaindia16mayoje.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaindiosestaconmiugo.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaineduardoestevex.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainenagostoestb.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainenvio7sep2023.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainesteesasyn.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainesteesmider.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainestemesesdedios.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainestwrmessol.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainlostermas.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainmairoester.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainmarquesosa3.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparahotmejor.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparajulioped.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparaprobares.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainquasintiner.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainrenvosdtutu.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainservernjnuevo.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainsientosmilter.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainsomosdecall.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaintodoparadios.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainvamosaverc.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainamadapi.tuktuk.ug | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainstracer.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domaintaybo.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainkik.taybo.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domainsrk.stracer.top | RedLine Stealer botnet C2 domain (confidence level: 100%) | |
domaincdn-new-dwnl.site | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainstats-best.site | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainpklkknj89bygvczvi.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainngvcfrttgyu512vgv.net | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domain3v1n35i5kwx.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domainnewdnq1xnl9.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domainitszko2ot5u.life | BumbleBee botnet C2 domain (confidence level: 100%) | |
domaincmid1s1zeiu.life | BumbleBee botnet C2 domain (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttps://heartwoodproperties.com/blog.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://heldenfutter.de/blog.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://gutesherz.or/go.php | GootLoader payload delivery URL (confidence level: 100%) | |
urlhttps://38.47.238.225/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://paste.ee/d/jepak/0 | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://pastebin.com/raw/sfgsbg3v | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://wtools.io/code/dl/bplb | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://pasteio.com/download/xtnja1wvooam | Remcos payload delivery URL (confidence level: 75%) | |
urlhttps://oiuytyfvq621mb.org/vvmd54/ | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://oiuytyfvq621mb.org/zgbn19mx | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://oiuytyfvq621mb.org/lander/chrome/_index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://bagisyapsendehadi.xyz/ | Alien botnet C2 (confidence level: 80%) | |
urlhttp://berkatamankimsedurduramaz.ml/ | Alien botnet C2 (confidence level: 80%) | |
urlhttp://yenilimit.xyz | Alien botnet C2 (confidence level: 80%) | |
urlhttp://status.klopware.space/_defaultwindows.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://pklkknj89bygvczvi.com/vvmd54/ | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://ngvcfrttgyu512vgv.net/zgbn19mx | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://ngvcfrttgyu512vgv.net/lander/chrome/_index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://a0859540.xsph.ru/l1nc0in.php | DCRat botnet C2 (confidence level: 100%) |
Threat ID: 682acdc3bbaf20d303f1d200
Added to database: 5/19/2025, 6:20:51 AM
Last enriched: 6/18/2025, 8:50:52 AM
Last updated: 8/11/2025, 2:16:56 AM
Views: 9
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.