ThreatFox IOCs for 2024-02-02
ThreatFox IOCs for 2024-02-02
AI Analysis
Technical Summary
The provided threat intelligence pertains to a set of Indicators of Compromise (IOCs) published on February 2, 2024, by ThreatFox, a platform specializing in sharing threat intelligence data. The threat is categorized as malware-related, specifically linked to OSINT (Open Source Intelligence) activities. However, no specific malware family, variant, or affected software versions are identified. The absence of detailed technical indicators such as file hashes, command and control (C2) infrastructure, or attack vectors limits the granularity of analysis. The threat level is rated as 2 on an unspecified scale, with a medium severity classification. There are no known exploits in the wild associated with this threat at the time of publication, and no patches or mitigations have been linked directly to it. The technical details indicate moderate distribution (level 3) but low analysis (level 1), suggesting that while the threat may be somewhat widespread or recognized, it has not been deeply analyzed or understood. The lack of CWEs (Common Weakness Enumerations) and absence of user interaction or authentication requirements further imply that this threat may be passive or reconnaissance-oriented rather than an active exploitation campaign. Overall, this appears to be an early-stage or low-impact malware-related threat primarily disseminated through OSINT channels, with limited actionable technical data currently available.
Potential Impact
For European organizations, the impact of this threat is currently assessed as moderate due to the medium severity rating and lack of known active exploitation. Since the threat is related to OSINT and malware but lacks specific exploit details or targeted vulnerabilities, the immediate risk to confidentiality, integrity, and availability is limited. However, the presence of malware-related IOCs in OSINT repositories could facilitate reconnaissance or preparatory steps for more targeted attacks in the future. Organizations relying heavily on open-source intelligence or those with exposure to malware campaigns may experience increased alert volumes or require enhanced monitoring. The threat does not appear to directly compromise critical infrastructure or sensitive data at this stage. Nevertheless, the moderate distribution level suggests that organizations should remain vigilant, as the threat could evolve or be leveraged by threat actors in more sophisticated attacks. The absence of known exploits in the wild reduces the urgency but does not eliminate the potential for future impact, especially if the malware is used as a foothold or delivery mechanism for secondary payloads.
Mitigation Recommendations
Given the limited technical details and absence of specific patches, European organizations should focus on proactive threat hunting and enhanced monitoring of OSINT sources for emerging indicators. Practical steps include integrating ThreatFox and similar OSINT feeds into existing Security Information and Event Management (SIEM) systems to detect any related IOCs promptly. Network segmentation and strict egress filtering can limit malware distribution and communication with potential C2 servers. Endpoint detection and response (EDR) solutions should be tuned to identify anomalous behaviors consistent with malware activity, even if specific signatures are unavailable. Regular employee training on recognizing phishing and social engineering attempts remains critical, as these are common malware delivery vectors. Organizations should also conduct periodic threat intelligence reviews to update detection rules and incident response playbooks accordingly. Finally, collaboration with national Computer Security Incident Response Teams (CSIRTs) and sharing of threat intelligence within industry sectors can enhance collective defense against evolving threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- file: 147.45.45.81
- hash: 30063
- file: 5.230.41.133
- hash: 443
- file: 45.129.199.23
- hash: 443
- file: 45.129.199.165
- hash: 443
- file: 45.155.120.130
- hash: 443
- file: 45.155.121.157
- hash: 443
- file: 45.155.121.203
- hash: 443
- file: 85.239.34.69
- hash: 443
- file: 151.236.9.226
- hash: 443
- file: 185.36.143.155
- hash: 443
- file: 185.123.53.208
- hash: 443
- file: 193.168.141.27
- hash: 443
- file: 193.168.141.104
- hash: 443
- file: 213.232.235.220
- hash: 443
- file: 5.230.42.207
- hash: 443
- file: 91.235.234.194
- hash: 443
- file: 185.123.53.150
- hash: 443
- file: 5.231.0.38
- hash: 443
- file: 194.110.247.73
- hash: 443
- file: 100.21.141.96
- hash: 80
- url: http://77.222.54.18/1/3secure/packet/gameflowerflowerpacket/local/generatoruniversal/asynclinesqlwindows/7javascripthttp/db57/track1python1/requestdatalifeexternal/packet4dbproton/providervm/testwindowstest/5javascriptwindows/pipe02public/processor/1securejavascript9/packetwp.php
- url: http://182.124.119.149:37662/mozi.m
- file: 147.45.40.196
- hash: 80
- file: 94.156.68.158
- hash: 9931
- file: 185.243.115.50
- hash: 3790
- file: 66.23.205.170
- hash: 80
- file: 54.94.248.37
- hash: 11264
- file: 18.228.115.60
- hash: 11264
- file: 18.231.93.153
- hash: 11264
- url: http://185.87.199.107/temporary/sql6js8/wordpress3/7sqlasync/8/publicmariadb/central/to_serverasyncpublictemp.php
- file: 47.115.225.184
- hash: 443
- file: 103.86.131.79
- hash: 443
- file: 31.210.173.10
- hash: 443
- file: 129.159.134.19
- hash: 8080
- file: 20.56.70.245
- hash: 443
- file: 84.201.141.119
- hash: 7443
- file: 43.198.97.99
- hash: 443
- file: 5.161.225.160
- hash: 80
- file: 38.62.230.181
- hash: 80
- file: 38.62.230.181
- hash: 443
- file: 47.76.61.241
- hash: 443
- file: 54.199.117.47
- hash: 80
- file: 192.52.166.9
- hash: 443
- file: 172.105.62.186
- hash: 443
- file: 80.79.7.197
- hash: 6606
- file: 80.79.7.197
- hash: 7707
- file: 80.79.7.197
- hash: 8808
- url: http://139.155.90.81/push
- file: 139.155.90.81
- hash: 80
- file: 94.156.67.11
- hash: 65517
- file: 45.129.199.136
- hash: 3790
- file: 54.227.145.71
- hash: 3790
- file: 158.160.124.3
- hash: 80
- url: http://20.196.198.116:53/ca
- url: http://cs.xcb.one:53/ie9compatviewlist.xml
- url: https://20.196.198.116/ga.js
- file: 103.86.131.102
- hash: 443
- url: https://20.196.198.116/j.ad
- url: http://43.142.170.25:6677/push
- url: http://34.143.208.146:9999/ga.js
- url: http://service-2kefhgzl-1316598603.bj.tencentapigw.com.cn/api/x
- domain: service-2kefhgzl-1316598603.bj.tencentapigw.com.cn
- file: 121.41.4.196
- hash: 80
- url: https://20.56.70.245/fwlink
- url: https://cdns.casacam.net/api/v1/login
- domain: cdns.casacam.net
- file: 104.168.158.242
- hash: 443
- url: http://www.okled.cc/api/3
- domain: www.okled.cc
- url: http://okled.cc/api/3
- domain: okled.cc
- file: 42.193.248.127
- hash: 50050
- url: https://3.22.66.152/en-us/silentauth
- url: http://121.43.62.136:5000/g.pixel
- file: 43.143.130.124
- hash: 7777
- url: https://103.239.247.51:8443/pixel
- url: http://85.208.109.15:9966/jquery-3.3.1.min.js
- url: http://8.134.165.196/dpixel
- url: https://38.46.13.114:10443/jquery-3.3.1.min.js
- file: 38.46.13.115
- hash: 10443
- url: http://101.34.251.178:9999/metro91/admin/1/ppptp.jpg
- file: 38.46.13.118
- hash: 10443
- file: 89.149.23.88
- hash: 20427
- domain: technoblade.ddns.net
- file: 39.32.193.156
- hash: 54984
- file: 121.41.4.196
- hash: 443
- file: 8.137.118.200
- hash: 9999
- domain: ec2-54-89-165-37.compute-1.amazonaws.com
- file: 172.233.25.65
- hash: 443
- file: 91.92.243.77
- hash: 80
- file: 1.94.11.140
- hash: 39443
- file: 34.143.208.146
- hash: 9999
- file: 154.9.252.97
- hash: 2053
- file: 195.85.250.96
- hash: 80
- file: 74.48.84.59
- hash: 23
- file: 91.92.249.233
- hash: 443
- file: 185.91.127.221
- hash: 8089
- file: 123.57.174.3
- hash: 80
- file: 207.180.224.247
- hash: 2222
- file: 134.122.164.200
- hash: 5566
- file: 201.68.220.236
- hash: 8081
- file: 154.221.17.44
- hash: 2999
- file: 23.26.137.225
- hash: 8081
- file: 91.92.242.143
- hash: 8088
- file: 91.92.249.234
- hash: 443
- file: 91.92.242.62
- hash: 8082
- file: 91.92.242.62
- hash: 8083
- file: 91.92.242.62
- hash: 8088
- file: 93.80.47.229
- hash: 81
- file: 187.135.240.152
- hash: 1801
- file: 187.135.240.152
- hash: 2095
- file: 187.135.240.152
- hash: 2222
- file: 187.135.149.169
- hash: 2079
- file: 20.241.197.233
- hash: 8444
- file: 170.64.194.84
- hash: 443
- file: 163.197.211.60
- hash: 8888
- file: 39.105.213.32
- hash: 8888
- file: 179.61.251.93
- hash: 8888
- file: 186.112.194.124
- hash: 2404
- file: 18.134.234.207
- hash: 443
- file: 46.246.84.15
- hash: 2000
- file: 91.92.240.147
- hash: 7000
- domain: ec2-3-140-197-75.us-east-2.compute.amazonaws.com
- file: 64.225.100.2
- hash: 443
- file: 64.226.104.86
- hash: 443
- file: 165.232.64.60
- hash: 443
- file: 20.236.74.148
- hash: 80
- domain: nickbaseev4.fvds.ru
- file: 91.92.244.215
- hash: 80
- domain: omgs.asia
- file: 45.87.153.107
- hash: 81
- domain: nickbaseev1.fvds.ru
- file: 88.210.9.117
- hash: 8081
- file: 181.162.151.66
- hash: 8080
- file: 94.156.68.145
- hash: 7639
- file: 193.168.141.92
- hash: 443
- file: 193.169.245.86
- hash: 4449
- file: 115.79.230.192
- hash: 8000
- file: 115.79.230.192
- hash: 9999
- file: 20.14.88.85
- hash: 8447
- file: 37.60.235.110
- hash: 80
- file: 114.29.236.137
- hash: 80
- file: 79.137.197.6
- hash: 80
- file: 51.195.83.136
- hash: 8888
- file: 93.123.85.79
- hash: 80
- file: 45.139.104.69
- hash: 80
- file: 68.233.120.219
- hash: 80
- domain: panelbar.ct8.pl
- domain: www.panitor.xyz
- domain: mywestpac.com
- file: 142.171.229.78
- hash: 2096
- file: 23.105.197.219
- hash: 443
- file: 47.108.233.40
- hash: 60000
- file: 8.137.106.49
- hash: 60000
- file: 47.113.218.12
- hash: 60000
- file: 120.55.85.239
- hash: 60000
- file: 123.249.83.178
- hash: 60000
- domain: ec2-15-206-174-2.ap-south-1.compute.amazonaws.com
- file: 34.125.18.85
- hash: 3333
- file: 40.67.208.154
- hash: 3333
- file: 34.226.155.20
- hash: 443
- file: 54.174.138.45
- hash: 8080
- file: 40.76.178.37
- hash: 443
- file: 20.195.169.69
- hash: 3333
- file: 34.29.171.229
- hash: 3333
- file: 63.35.217.229
- hash: 8443
- file: 64.226.108.52
- hash: 17240
- file: 141.94.244.50
- hash: 444
- file: 70.34.252.126
- hash: 5333
- file: 18.198.146.182
- hash: 80
- file: 18.191.227.114
- hash: 443
- file: 113.37.87.82
- hash: 443
- file: 3.219.110.4
- hash: 443
- file: 189.112.212.12
- hash: 443
- file: 152.203.66.173
- hash: 443
- file: 38.62.236.152
- hash: 443
- file: 77.1.170.194
- hash: 443
- file: 3.69.115.178
- hash: 11080
- file: 18.197.239.109
- hash: 11080
- file: 3.69.157.220
- hash: 11080
- file: 20.106.168.188
- hash: 5050
- file: 35.228.7.192
- hash: 2376
- file: 52.28.247.255
- hash: 11080
- file: 159.69.86.27
- hash: 50500
- url: http://104.245.33.157/99210de056092a58.php
- url: http://193.233.132.73/gjvjls3jd2v/index.php
- file: 3.125.209.94
- hash: 11544
- file: 3.124.142.205
- hash: 11544
- file: 193.233.132.73
- hash: 80
- file: 84.32.44.210
- hash: 64543
- file: 144.76.97.203
- hash: 443
- file: 91.92.253.138
- hash: 6075
- file: 138.197.134.200
- hash: 8443
- file: 92.223.160.132
- hash: 443
- file: 154.247.198.92
- hash: 2078
- file: 90.42.9.121
- hash: 2222
- file: 201.137.204.103
- hash: 443
- file: 41.96.88.102
- hash: 443
- file: 79.130.53.226
- hash: 2222
- file: 8.130.17.64
- hash: 8888
- file: 18.192.31.165
- hash: 11544
- file: 3.125.102.39
- hash: 11544
- file: 95.217.65.174
- hash: 11130
- url: http://109.107.182.163/b0f62e5c.php
- file: 45.150.79.56
- hash: 3790
- file: 41.97.220.8
- hash: 1177
- url: http://91.92.242.62:8082/c/msdownload/update/others/2020/10/29136388_
- file: 91.92.242.143
- hash: 8082
- url: http://39.105.51.11:28101/ptj
- url: https://comewithme.info/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
- domain: comewithme.info
- file: 84.45.122.150
- hash: 443
- url: https://service-jnajkkdg-1318687485.gz.apigw.tencentcs.com/forge/static/hulnwcwi
- domain: service-jnajkkdg-1318687485.gz.apigw.tencentcs.com
- file: 157.245.222.152
- hash: 443
- url: http://101.133.156.69:7001/j.ad
- file: 116.205.190.164
- hash: 80
- file: 206.166.251.32
- hash: 18443
- file: 144.202.25.198
- hash: 443
- file: 91.236.116.26
- hash: 443
- file: 43.139.189.26
- hash: 8888
- file: 45.141.215.222
- hash: 8808
- file: 34.29.228.84
- hash: 2000
- file: 193.233.255.105
- hash: 80
- domain: taobao7737.com
- file: 193.233.132.64
- hash: 8081
- file: 73.3.46.163
- hash: 4855
- domain: ec2-52-3-173-99.compute-1.amazonaws.com
- domain: www.controlpanel29.com
- file: 62.204.41.197
- hash: 443
- file: 58.59.222.51
- hash: 60000
- domain: content.deenpel.com
- domain: www2.deenpel.com
- file: 37.60.239.240
- hash: 443
- file: 3.95.67.254
- hash: 3333
- file: 18.158.35.237
- hash: 80
- file: 18.158.35.237
- hash: 443
ThreatFox IOCs for 2024-02-02
Description
ThreatFox IOCs for 2024-02-02
AI-Powered Analysis
Technical Analysis
The provided threat intelligence pertains to a set of Indicators of Compromise (IOCs) published on February 2, 2024, by ThreatFox, a platform specializing in sharing threat intelligence data. The threat is categorized as malware-related, specifically linked to OSINT (Open Source Intelligence) activities. However, no specific malware family, variant, or affected software versions are identified. The absence of detailed technical indicators such as file hashes, command and control (C2) infrastructure, or attack vectors limits the granularity of analysis. The threat level is rated as 2 on an unspecified scale, with a medium severity classification. There are no known exploits in the wild associated with this threat at the time of publication, and no patches or mitigations have been linked directly to it. The technical details indicate moderate distribution (level 3) but low analysis (level 1), suggesting that while the threat may be somewhat widespread or recognized, it has not been deeply analyzed or understood. The lack of CWEs (Common Weakness Enumerations) and absence of user interaction or authentication requirements further imply that this threat may be passive or reconnaissance-oriented rather than an active exploitation campaign. Overall, this appears to be an early-stage or low-impact malware-related threat primarily disseminated through OSINT channels, with limited actionable technical data currently available.
Potential Impact
For European organizations, the impact of this threat is currently assessed as moderate due to the medium severity rating and lack of known active exploitation. Since the threat is related to OSINT and malware but lacks specific exploit details or targeted vulnerabilities, the immediate risk to confidentiality, integrity, and availability is limited. However, the presence of malware-related IOCs in OSINT repositories could facilitate reconnaissance or preparatory steps for more targeted attacks in the future. Organizations relying heavily on open-source intelligence or those with exposure to malware campaigns may experience increased alert volumes or require enhanced monitoring. The threat does not appear to directly compromise critical infrastructure or sensitive data at this stage. Nevertheless, the moderate distribution level suggests that organizations should remain vigilant, as the threat could evolve or be leveraged by threat actors in more sophisticated attacks. The absence of known exploits in the wild reduces the urgency but does not eliminate the potential for future impact, especially if the malware is used as a foothold or delivery mechanism for secondary payloads.
Mitigation Recommendations
Given the limited technical details and absence of specific patches, European organizations should focus on proactive threat hunting and enhanced monitoring of OSINT sources for emerging indicators. Practical steps include integrating ThreatFox and similar OSINT feeds into existing Security Information and Event Management (SIEM) systems to detect any related IOCs promptly. Network segmentation and strict egress filtering can limit malware distribution and communication with potential C2 servers. Endpoint detection and response (EDR) solutions should be tuned to identify anomalous behaviors consistent with malware activity, even if specific signatures are unavailable. Regular employee training on recognizing phishing and social engineering attempts remains critical, as these are common malware delivery vectors. Organizations should also conduct periodic threat intelligence reviews to update detection rules and incident response playbooks accordingly. Finally, collaboration with national Computer Security Incident Response Teams (CSIRTs) and sharing of threat intelligence within industry sectors can enhance collective defense against evolving threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 0aa00e57-f9b4-4759-82aa-4d7864cec0ac
- Original Timestamp
- 1706918588
Indicators of Compromise
File
Value | Description | Copy |
---|---|---|
file147.45.45.81 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file5.230.41.133 | Unknown malware botnet C2 server (confidence level: 95%) | |
file45.129.199.23 | Unknown malware botnet C2 server (confidence level: 95%) | |
file45.129.199.165 | Unknown malware botnet C2 server (confidence level: 95%) | |
file45.155.120.130 | Unknown malware botnet C2 server (confidence level: 95%) | |
file45.155.121.157 | Unknown malware botnet C2 server (confidence level: 95%) | |
file45.155.121.203 | Unknown malware botnet C2 server (confidence level: 95%) | |
file85.239.34.69 | Unknown malware botnet C2 server (confidence level: 95%) | |
file151.236.9.226 | Unknown malware botnet C2 server (confidence level: 95%) | |
file185.36.143.155 | Unknown malware botnet C2 server (confidence level: 95%) | |
file185.123.53.208 | Unknown malware botnet C2 server (confidence level: 95%) | |
file193.168.141.27 | Unknown malware botnet C2 server (confidence level: 95%) | |
file193.168.141.104 | Unknown malware botnet C2 server (confidence level: 95%) | |
file213.232.235.220 | Unknown malware botnet C2 server (confidence level: 95%) | |
file5.230.42.207 | Unknown malware botnet C2 server (confidence level: 80%) | |
file91.235.234.194 | Unknown malware botnet C2 server (confidence level: 80%) | |
file185.123.53.150 | Unknown malware botnet C2 server (confidence level: 80%) | |
file5.231.0.38 | Unknown malware botnet C2 server (confidence level: 95%) | |
file194.110.247.73 | Unknown malware botnet C2 server (confidence level: 95%) | |
file100.21.141.96 | Unknown malware botnet C2 server (confidence level: 80%) | |
file147.45.40.196 | Meduza Stealer botnet C2 server (confidence level: 50%) | |
file94.156.68.158 | Mirai botnet C2 server (confidence level: 75%) | |
file185.243.115.50 | Meterpreter botnet C2 server (confidence level: 80%) | |
file66.23.205.170 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file54.94.248.37 | NjRAT botnet C2 server (confidence level: 75%) | |
file18.228.115.60 | NjRAT botnet C2 server (confidence level: 75%) | |
file18.231.93.153 | NjRAT botnet C2 server (confidence level: 75%) | |
file47.115.225.184 | Cobalt Strike botnet C2 server (confidence level: 80%) | |
file103.86.131.79 | Get2 botnet C2 server (confidence level: 80%) | |
file31.210.173.10 | QakBot botnet C2 server (confidence level: 80%) | |
file129.159.134.19 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
file20.56.70.245 | Cobalt Strike botnet C2 server (confidence level: 80%) | |
file84.201.141.119 | Unknown malware botnet C2 server (confidence level: 50%) | |
file43.198.97.99 | Deimos botnet C2 server (confidence level: 50%) | |
file5.161.225.160 | Deimos botnet C2 server (confidence level: 50%) | |
file38.62.230.181 | BianLian botnet C2 server (confidence level: 50%) | |
file38.62.230.181 | BianLian botnet C2 server (confidence level: 50%) | |
file47.76.61.241 | Havoc botnet C2 server (confidence level: 50%) | |
file54.199.117.47 | Havoc botnet C2 server (confidence level: 50%) | |
file192.52.166.9 | Havoc botnet C2 server (confidence level: 50%) | |
file172.105.62.186 | Havoc botnet C2 server (confidence level: 50%) | |
file80.79.7.197 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file80.79.7.197 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file80.79.7.197 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file139.155.90.81 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file94.156.67.11 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file45.129.199.136 | Meterpreter botnet C2 server (confidence level: 80%) | |
file54.227.145.71 | Meterpreter botnet C2 server (confidence level: 80%) | |
file158.160.124.3 | Responder botnet C2 server (confidence level: 80%) | |
file103.86.131.102 | Get2 botnet C2 server (confidence level: 80%) | |
file121.41.4.196 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file104.168.158.242 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file42.193.248.127 | Cobalt Strike botnet C2 server (confidence level: 80%) | |
file43.143.130.124 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file38.46.13.115 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file38.46.13.118 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file89.149.23.88 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file39.32.193.156 | Nanocore RAT botnet C2 server (confidence level: 80%) | |
file121.41.4.196 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.137.118.200 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file172.233.25.65 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.92.243.77 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file1.94.11.140 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file34.143.208.146 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.9.252.97 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file195.85.250.96 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file74.48.84.59 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.92.249.233 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.91.127.221 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file123.57.174.3 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file207.180.224.247 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file134.122.164.200 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file201.68.220.236 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.221.17.44 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file23.26.137.225 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.92.242.143 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.92.249.234 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.92.242.62 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.92.242.62 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.92.242.62 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file93.80.47.229 | DarkComet botnet C2 server (confidence level: 100%) | |
file187.135.240.152 | DarkComet botnet C2 server (confidence level: 100%) | |
file187.135.240.152 | DarkComet botnet C2 server (confidence level: 100%) | |
file187.135.240.152 | DarkComet botnet C2 server (confidence level: 100%) | |
file187.135.149.169 | DarkComet botnet C2 server (confidence level: 100%) | |
file20.241.197.233 | Sliver botnet C2 server (confidence level: 90%) | |
file170.64.194.84 | Sliver botnet C2 server (confidence level: 90%) | |
file163.197.211.60 | Unknown malware botnet C2 server (confidence level: 100%) | |
file39.105.213.32 | Unknown malware botnet C2 server (confidence level: 100%) | |
file179.61.251.93 | Unknown malware botnet C2 server (confidence level: 100%) | |
file186.112.194.124 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file18.134.234.207 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file46.246.84.15 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file91.92.240.147 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file64.225.100.2 | Unknown malware botnet C2 server (confidence level: 100%) | |
file64.226.104.86 | Unknown malware botnet C2 server (confidence level: 100%) | |
file165.232.64.60 | Unknown malware botnet C2 server (confidence level: 100%) | |
file20.236.74.148 | Hook botnet C2 server (confidence level: 100%) | |
file91.92.244.215 | Hook botnet C2 server (confidence level: 100%) | |
file45.87.153.107 | Hook botnet C2 server (confidence level: 100%) | |
file88.210.9.117 | RisePro botnet C2 server (confidence level: 100%) | |
file181.162.151.66 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file94.156.68.145 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file193.168.141.92 | Havoc botnet C2 server (confidence level: 100%) | |
file193.169.245.86 | Venom RAT botnet C2 server (confidence level: 100%) | |
file115.79.230.192 | Venom RAT botnet C2 server (confidence level: 100%) | |
file115.79.230.192 | Venom RAT botnet C2 server (confidence level: 100%) | |
file20.14.88.85 | DCRat botnet C2 server (confidence level: 100%) | |
file37.60.235.110 | ERMAC botnet C2 server (confidence level: 100%) | |
file114.29.236.137 | ERMAC botnet C2 server (confidence level: 100%) | |
file79.137.197.6 | Meduza Stealer botnet C2 server (confidence level: 100%) | |
file51.195.83.136 | Unknown malware botnet C2 server (confidence level: 100%) | |
file93.123.85.79 | MooBot botnet C2 server (confidence level: 100%) | |
file45.139.104.69 | MooBot botnet C2 server (confidence level: 100%) | |
file68.233.120.219 | Unknown malware botnet C2 server (confidence level: 100%) | |
file142.171.229.78 | Unknown malware botnet C2 server (confidence level: 100%) | |
file23.105.197.219 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.108.233.40 | Unknown malware botnet C2 server (confidence level: 100%) | |
file8.137.106.49 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.113.218.12 | Unknown malware botnet C2 server (confidence level: 100%) | |
file120.55.85.239 | Unknown malware botnet C2 server (confidence level: 100%) | |
file123.249.83.178 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.125.18.85 | Unknown malware botnet C2 server (confidence level: 100%) | |
file40.67.208.154 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.226.155.20 | Unknown malware botnet C2 server (confidence level: 100%) | |
file54.174.138.45 | Unknown malware botnet C2 server (confidence level: 100%) | |
file40.76.178.37 | Unknown malware botnet C2 server (confidence level: 100%) | |
file20.195.169.69 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.29.171.229 | Unknown malware botnet C2 server (confidence level: 100%) | |
file63.35.217.229 | Unknown malware botnet C2 server (confidence level: 100%) | |
file64.226.108.52 | Unknown malware botnet C2 server (confidence level: 100%) | |
file141.94.244.50 | Unknown malware botnet C2 server (confidence level: 100%) | |
file70.34.252.126 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.198.146.182 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.191.227.114 | Unknown malware botnet C2 server (confidence level: 100%) | |
file113.37.87.82 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.219.110.4 | Unknown malware botnet C2 server (confidence level: 100%) | |
file189.112.212.12 | Unknown malware botnet C2 server (confidence level: 100%) | |
file152.203.66.173 | Unknown malware botnet C2 server (confidence level: 100%) | |
file38.62.236.152 | BianLian botnet C2 server (confidence level: 100%) | |
file77.1.170.194 | QakBot botnet C2 server (confidence level: 100%) | |
file3.69.115.178 | NjRAT botnet C2 server (confidence level: 100%) | |
file18.197.239.109 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.69.157.220 | NjRAT botnet C2 server (confidence level: 100%) | |
file20.106.168.188 | NjRAT botnet C2 server (confidence level: 100%) | |
file35.228.7.192 | Sliver botnet C2 server (confidence level: 80%) | |
file52.28.247.255 | NjRAT botnet C2 server (confidence level: 75%) | |
file159.69.86.27 | RisePro botnet C2 server (confidence level: 100%) | |
file3.125.209.94 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.124.142.205 | NjRAT botnet C2 server (confidence level: 100%) | |
file193.233.132.73 | Amadey botnet C2 server (confidence level: 50%) | |
file84.32.44.210 | Sliver botnet C2 server (confidence level: 50%) | |
file144.76.97.203 | Deimos botnet C2 server (confidence level: 50%) | |
file91.92.253.138 | Havoc botnet C2 server (confidence level: 50%) | |
file138.197.134.200 | Havoc botnet C2 server (confidence level: 50%) | |
file92.223.160.132 | Responder botnet C2 server (confidence level: 50%) | |
file154.247.198.92 | QakBot botnet C2 server (confidence level: 50%) | |
file90.42.9.121 | QakBot botnet C2 server (confidence level: 50%) | |
file201.137.204.103 | QakBot botnet C2 server (confidence level: 50%) | |
file41.96.88.102 | QakBot botnet C2 server (confidence level: 50%) | |
file79.130.53.226 | QakBot botnet C2 server (confidence level: 50%) | |
file8.130.17.64 | Unknown malware botnet C2 server (confidence level: 50%) | |
file18.192.31.165 | NjRAT botnet C2 server (confidence level: 75%) | |
file3.125.102.39 | NjRAT botnet C2 server (confidence level: 75%) | |
file95.217.65.174 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file45.150.79.56 | Meterpreter botnet C2 server (confidence level: 80%) | |
file41.97.220.8 | NjRAT botnet C2 server (confidence level: 80%) | |
file91.92.242.143 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file84.45.122.150 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file157.245.222.152 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file116.205.190.164 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file206.166.251.32 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file144.202.25.198 | Sliver botnet C2 server (confidence level: 90%) | |
file91.236.116.26 | Sliver botnet C2 server (confidence level: 90%) | |
file43.139.189.26 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.141.215.222 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file34.29.228.84 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file193.233.255.105 | Hook botnet C2 server (confidence level: 100%) | |
file193.233.132.64 | RisePro botnet C2 server (confidence level: 100%) | |
file73.3.46.163 | Orcus RAT botnet C2 server (confidence level: 100%) | |
file62.204.41.197 | Unknown malware botnet C2 server (confidence level: 100%) | |
file58.59.222.51 | Unknown malware botnet C2 server (confidence level: 100%) | |
file37.60.239.240 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.95.67.254 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.158.35.237 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.158.35.237 | Unknown malware botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash30063 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 80%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 80%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 80%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 95%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 80%) | |
hash80 | Meduza Stealer botnet C2 server (confidence level: 50%) | |
hash9931 | Mirai botnet C2 server (confidence level: 75%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 80%) | |
hash80 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash11264 | NjRAT botnet C2 server (confidence level: 75%) | |
hash11264 | NjRAT botnet C2 server (confidence level: 75%) | |
hash11264 | NjRAT botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 80%) | |
hash443 | Get2 botnet C2 server (confidence level: 80%) | |
hash443 | QakBot botnet C2 server (confidence level: 80%) | |
hash8080 | WhiteSnake Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 80%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash443 | Deimos botnet C2 server (confidence level: 50%) | |
hash80 | Deimos botnet C2 server (confidence level: 50%) | |
hash80 | BianLian botnet C2 server (confidence level: 50%) | |
hash443 | BianLian botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash80 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash65517 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 80%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 80%) | |
hash80 | Responder botnet C2 server (confidence level: 80%) | |
hash443 | Get2 botnet C2 server (confidence level: 80%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash50050 | Cobalt Strike botnet C2 server (confidence level: 80%) | |
hash7777 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash10443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash10443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash20427 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash54984 | Nanocore RAT botnet C2 server (confidence level: 80%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash39443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2053 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash23 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8089 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2222 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash5566 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8088 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8082 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8083 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8088 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash81 | DarkComet botnet C2 server (confidence level: 100%) | |
hash1801 | DarkComet botnet C2 server (confidence level: 100%) | |
hash2095 | DarkComet botnet C2 server (confidence level: 100%) | |
hash2222 | DarkComet botnet C2 server (confidence level: 100%) | |
hash2079 | DarkComet botnet C2 server (confidence level: 100%) | |
hash8444 | Sliver botnet C2 server (confidence level: 90%) | |
hash443 | Sliver botnet C2 server (confidence level: 90%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash2404 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash2000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash81 | Hook botnet C2 server (confidence level: 100%) | |
hash8081 | RisePro botnet C2 server (confidence level: 100%) | |
hash8080 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash7639 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash4449 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash8000 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash9999 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash8447 | DCRat botnet C2 server (confidence level: 100%) | |
hash80 | ERMAC botnet C2 server (confidence level: 100%) | |
hash80 | ERMAC botnet C2 server (confidence level: 100%) | |
hash80 | Meduza Stealer botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash2096 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash17240 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash444 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash5333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | BianLian botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash11080 | NjRAT botnet C2 server (confidence level: 100%) | |
hash11080 | NjRAT botnet C2 server (confidence level: 100%) | |
hash11080 | NjRAT botnet C2 server (confidence level: 100%) | |
hash5050 | NjRAT botnet C2 server (confidence level: 100%) | |
hash2376 | Sliver botnet C2 server (confidence level: 80%) | |
hash11080 | NjRAT botnet C2 server (confidence level: 75%) | |
hash50500 | RisePro botnet C2 server (confidence level: 100%) | |
hash11544 | NjRAT botnet C2 server (confidence level: 100%) | |
hash11544 | NjRAT botnet C2 server (confidence level: 100%) | |
hash80 | Amadey botnet C2 server (confidence level: 50%) | |
hash64543 | Sliver botnet C2 server (confidence level: 50%) | |
hash443 | Deimos botnet C2 server (confidence level: 50%) | |
hash6075 | Havoc botnet C2 server (confidence level: 50%) | |
hash8443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Responder botnet C2 server (confidence level: 50%) | |
hash2078 | QakBot botnet C2 server (confidence level: 50%) | |
hash2222 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash2222 | QakBot botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash11544 | NjRAT botnet C2 server (confidence level: 75%) | |
hash11544 | NjRAT botnet C2 server (confidence level: 75%) | |
hash11130 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 80%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 80%) | |
hash8082 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash18443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 90%) | |
hash443 | Sliver botnet C2 server (confidence level: 90%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash2000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash8081 | RisePro botnet C2 server (confidence level: 100%) | |
hash4855 | Orcus RAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttp://77.222.54.18/1/3secure/packet/gameflowerflowerpacket/local/generatoruniversal/asynclinesqlwindows/7javascripthttp/db57/track1python1/requestdatalifeexternal/packet4dbproton/providervm/testwindowstest/5javascriptwindows/pipe02public/processor/1securejavascript9/packetwp.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://182.124.119.149:37662/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://185.87.199.107/temporary/sql6js8/wordpress3/7sqlasync/8/publicmariadb/central/to_serverasyncpublictemp.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://139.155.90.81/push | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://20.196.198.116:53/ca | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://cs.xcb.one:53/ie9compatviewlist.xml | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://20.196.198.116/ga.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://20.196.198.116/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://43.142.170.25:6677/push | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://34.143.208.146:9999/ga.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://service-2kefhgzl-1316598603.bj.tencentapigw.com.cn/api/x | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://20.56.70.245/fwlink | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://cdns.casacam.net/api/v1/login | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://www.okled.cc/api/3 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://okled.cc/api/3 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://3.22.66.152/en-us/silentauth | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://121.43.62.136:5000/g.pixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://103.239.247.51:8443/pixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://85.208.109.15:9966/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://8.134.165.196/dpixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://38.46.13.114:10443/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://101.34.251.178:9999/metro91/admin/1/ppptp.jpg | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://104.245.33.157/99210de056092a58.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://193.233.132.73/gjvjls3jd2v/index.php | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://109.107.182.163/b0f62e5c.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://91.92.242.62:8082/c/msdownload/update/others/2020/10/29136388_ | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://39.105.51.11:28101/ptj | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://comewithme.info/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://service-jnajkkdg-1318687485.gz.apigw.tencentcs.com/forge/static/hulnwcwi | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://101.133.156.69:7001/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainservice-2kefhgzl-1316598603.bj.tencentapigw.com.cn | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domaincdns.casacam.net | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainwww.okled.cc | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainokled.cc | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domaintechnoblade.ddns.net | Nanocore RAT botnet C2 domain (confidence level: 100%) | |
domainec2-54-89-165-37.compute-1.amazonaws.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainec2-3-140-197-75.us-east-2.compute.amazonaws.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainnickbaseev4.fvds.ru | Hook botnet C2 domain (confidence level: 100%) | |
domainomgs.asia | Hook botnet C2 domain (confidence level: 100%) | |
domainnickbaseev1.fvds.ru | Hook botnet C2 domain (confidence level: 100%) | |
domainpanelbar.ct8.pl | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainwww.panitor.xyz | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainmywestpac.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainec2-15-206-174-2.ap-south-1.compute.amazonaws.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domaincomewithme.info | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainservice-jnajkkdg-1318687485.gz.apigw.tencentcs.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domaintaobao7737.com | Hook botnet C2 domain (confidence level: 100%) | |
domainec2-52-3-173-99.compute-1.amazonaws.com | Serpent Stealer botnet C2 domain (confidence level: 100%) | |
domainwww.controlpanel29.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domaincontent.deenpel.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainwww2.deenpel.com | Unknown malware botnet C2 domain (confidence level: 100%) |
Threat ID: 682b7b9cd3ddd8cef2e5424a
Added to database: 5/19/2025, 6:42:36 PM
Last enriched: 6/18/2025, 8:04:03 PM
Last updated: 8/1/2025, 4:02:14 PM
Views: 6
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.