ThreatFox IOCs for 2024-03-20
ThreatFox IOCs for 2024-03-20
AI Analysis
Technical Summary
The provided threat information pertains to a malware-related intelligence report titled 'ThreatFox IOCs for 2024-03-20,' sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) related to various cyber threats. The report is categorized under 'type:osint,' indicating that the data primarily consists of open-source intelligence rather than detailed technical exploit information. No specific affected software versions or products are listed, and there are no associated Common Weakness Enumerations (CWEs) or patch links. The threat level is indicated as 2 on an unspecified scale, with a medium severity rating assigned. The technical details mention a distribution rating of 3, suggesting a moderate spread or prevalence of the malware, but no known exploits in the wild have been reported. The absence of concrete IOCs or detailed behavioral analysis limits the ability to precisely characterize the malware's capabilities, infection vectors, or payloads. Overall, this report appears to be an early-stage or summary intelligence update highlighting the presence of malware-related indicators without deep technical dissection or evidence of active exploitation campaigns.
Potential Impact
Given the limited technical details and the absence of known active exploitation, the immediate impact on European organizations is likely to be moderate. However, the presence of malware-related IOCs in open-source intelligence suggests a potential for reconnaissance or preparatory activities by threat actors. European organizations, particularly those involved in critical infrastructure, finance, or government sectors, could face risks if these IOCs correspond to emerging malware strains capable of data exfiltration, disruption, or espionage. The medium severity rating implies that while the threat is not currently critical, it warrants attention to prevent escalation. The moderate distribution rating indicates that the malware or its indicators might be circulating within certain networks or communities, increasing the risk of targeted attacks if left unmitigated. The lack of known exploits in the wild reduces the immediate threat level but does not eliminate the possibility of future exploitation, especially if threat actors develop or deploy new attack vectors based on these IOCs.
Mitigation Recommendations
1. Proactive IOC Integration: European organizations should integrate the latest ThreatFox IOCs into their Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities. 2. Enhanced Network Monitoring: Implement advanced network traffic analysis to identify anomalous behaviors that may correlate with the reported IOCs, focusing on unusual outbound connections or data flows. 3. Threat Hunting Exercises: Conduct targeted threat hunting activities using the provided IOCs and related OSINT to identify potential early-stage infections or reconnaissance activities within organizational networks. 4. Employee Awareness and Training: Since the threat details are limited, emphasize general malware hygiene, including phishing awareness and safe handling of unsolicited files or links, to reduce infection vectors. 5. Collaboration with CERTs and ISACs: Engage with European Computer Emergency Response Teams (CERTs) and Information Sharing and Analysis Centers (ISACs) to share intelligence and receive updates on any developments related to these IOCs. 6. Patch and Update Management: Although no specific patches are linked, maintaining up-to-date systems reduces the risk of exploitation by related or future malware variants. 7. Segmentation and Least Privilege: Enforce network segmentation and least privilege access controls to limit potential lateral movement if an infection occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: badbutperfect.com
- file: 165.22.16.55
- hash: 445
- file: 147.78.47.15
- hash: 61227
- file: 52.157.196.2
- hash: 443
- url: http://147.78.47.15/cx
- file: 24.42.99.89
- hash: 191
- domain: ameerpplus.ddns.net
- file: 3.127.138.57
- hash: 15449
- file: 18.156.13.209
- hash: 15449
- file: 18.197.239.5
- hash: 15449
- file: 18.192.93.86
- hash: 15449
- file: 18.157.68.73
- hash: 15449
- file: 45.120.177.167
- hash: 80
- file: 192.210.201.57
- hash: 52748
- file: 78.47.48.88
- hash: 8443
- file: 34.134.107.175
- hash: 7443
- file: 43.198.208.125
- hash: 443
- file: 18.162.142.16
- hash: 443
- file: 96.9.225.129
- hash: 37826
- file: 62.234.28.147
- hash: 443
- file: 95.179.171.52
- hash: 443
- file: 139.162.51.167
- hash: 443
- file: 155.138.229.25
- hash: 443
- file: 192.227.234.164
- hash: 443
- file: 23.227.193.238
- hash: 443
- file: 41.96.236.231
- hash: 443
- file: 72.27.209.148
- hash: 443
- file: 77.126.104.106
- hash: 443
- file: 175.13.35.49
- hash: 4432
- file: 78.169.186.24
- hash: 443
- file: 46.246.6.15
- hash: 6000
- file: 46.246.84.14
- hash: 5000
- file: 123.253.108.131
- hash: 8886
- file: 216.83.58.188
- hash: 9999
- file: 45.76.189.78
- hash: 8888
- file: 154.16.10.161
- hash: 8888
- file: 81.161.238.163
- hash: 8888
- file: 222.186.21.204
- hash: 80
- file: 84.32.214.66
- hash: 80
- file: 91.107.121.52
- hash: 80
- file: 93.123.39.238
- hash: 2023
- file: 194.147.140.141
- hash: 8100
- domain: nanomarch8100.duckdns.org
- file: 78.47.57.253
- hash: 443
- file: 5.75.216.188
- hash: 443
- file: 95.217.28.242
- hash: 8888
- file: 116.202.5.172
- hash: 443
- url: https://5.75.216.188/
- url: https://78.47.57.253/
- url: https://95.217.28.242:8888/
- url: https://116.202.5.172/
- url: http://785654cm.n9shteam3.top/vmuploadstemporary.php
- file: 103.211.56.154
- hash: 14782
- url: https://123.249.30.101/cm
- file: 123.249.30.101
- hash: 443
- file: 85.204.116.154
- hash: 839
- url: http://185.172.128.209/3cd2b41cbde8fc9c.php
- file: 3.66.38.117
- hash: 12377
- file: 3.68.171.119
- hash: 12377
- file: 18.197.239.109
- hash: 12377
- url: http://176.32.35.104:82/dot.gif
- url: http://8.222.147.15/cx
- url: http://123.20.56.214:7777/visit.js
- url: https://60.204.133.143/cx
- file: 43.129.31.231
- hash: 8848
- url: http://store4.ro/panel/panel/index.php
- file: 185.161.208.123
- hash: 6655
- url: http://176.32.35.104/j.ad
- file: 176.32.35.104
- hash: 80
- url: https://141.98.168.246/kj
- file: 141.98.168.246
- hash: 443
- url: https://21hjgt71f.sharedomain.top:8443/api/3
- domain: 21hjgt71f.sharedomain.top
- file: 142.171.229.46
- hash: 8443
- url: http://43.136.242.247:8001/ie9compatviewlist.xml
- url: http://185.196.9.234:8080/match
- url: http://210.79.134.20/explode/poll/ere9k18mnq
- file: 210.79.134.20
- hash: 80
- url: http://1.14.46.128:8888/dpixel
- url: https://94.156.67.192/pixel.gif
- file: 91.92.255.88
- hash: 8088
- file: 220.158.234.115
- hash: 1311
- file: 216.73.159.58
- hash: 1311
- file: 169.239.129.35
- hash: 1311
- file: 103.208.86.69
- hash: 1311
- file: 46.23.108.239
- hash: 1311
- file: 46.23.108.240
- hash: 1311
- file: 46.23.108.241
- hash: 1311
- file: 46.23.108.242
- hash: 1311
- file: 46.23.108.243
- hash: 1311
- file: 46.23.108.244
- hash: 1311
- file: 46.23.108.245
- hash: 1311
- file: 46.23.108.246
- hash: 1311
- file: 46.23.108.247
- hash: 1311
- file: 46.23.108.249
- hash: 1311
- file: 45.95.169.100
- hash: 1311
- file: 45.95.169.101
- hash: 1311
- file: 45.95.169.105
- hash: 1311
- file: 45.95.169.113
- hash: 1311
- file: 45.95.169.117
- hash: 1311
- file: 45.95.169.150
- hash: 1311
- file: 45.95.169.152
- hash: 1311
- file: 45.95.169.153
- hash: 1311
- file: 84.54.51.124
- hash: 1311
- file: 103.172.79.74
- hash: 2023
- domain: net-killer.work.gd
- domain: sky-beta.com
- domain: gamerforyou.com
- domain: hopefor.space
- domain: treimob.cfd
- file: 46.246.84.18
- hash: 3100
- domain: luisro2158.duckdns.org
- file: 193.233.132.5
- hash: 8081
- file: 193.233.132.11
- hash: 8081
- file: 193.233.132.59
- hash: 8081
- file: 193.233.132.71
- hash: 8081
- file: 193.233.132.173
- hash: 8081
- url: https://www.alabamacarhorns.com/wp-content/themes/twentytwentyfour/34uo7s.php?id=1
- url: https://13300.org/wp-content/themes/twentytwentythree/t51kkf.php?id=1
- url: https://alternativetracks.com/wp-content/themes/twentytwentyfour/c9wfar.php?id=1
- url: https://www.amysinger.com/wp-content/themes/twentyten/b9un4f.php?id=1
- url: https://lurdyvanafernandesmkd.com/wp-content/themes/twentytwentytwo/pam8oa.php?id=1
- url: https://www.yukon.de/wp-content/themes/twentytwentytwo/n2gd2t.php?id=1
- file: 109.120.184.220
- hash: 50500
- url: https://www.alabamacarhorns.com/wp-content/themes/twentytwentyfour/34uo7s.php?id=1
- url: https://13300.org/wp-content/themes/twentytwentythree/t51kkf.php?id=1
- url: https://alternativetracks.com/wp-content/themes/twentytwentyfour/c9wfar.php?id=1
- url: https://www.amysinger.com/wp-content/themes/twentyten/b9un4f.php?id=1
- url: https://lurdyvanafernandesmkd.com/wp-content/themes/twentytwentytwo/pam8oa.php?id=1
- url: https://www.yukon.de/wp-content/themes/twentytwentytwo/n2gd2t.php?id=1
- file: 5.255.108.187
- hash: 443
- file: 104.129.21.231
- hash: 443
- file: 176.123.1.221
- hash: 443
- file: 193.168.141.153
- hash: 443
- file: 193.222.96.86
- hash: 4449
- file: 94.156.67.106
- hash: 445
- file: 5.42.65.68
- hash: 29093
- file: 94.156.69.121
- hash: 443
- file: 95.183.54.20
- hash: 7443
- file: 172.172.152.168
- hash: 443
- file: 103.81.38.242
- hash: 443
- file: 188.170.152.11
- hash: 445
- file: 97.118.56.247
- hash: 993
- file: 91.254.253.44
- hash: 443
- file: 92.251.173.191
- hash: 995
- file: 5.163.180.48
- hash: 443
- file: 78.178.72.139
- hash: 443
- file: 46.246.12.4
- hash: 5000
- file: 38.59.124.61
- hash: 8848
- file: 121.36.105.186
- hash: 8080
- file: 88.179.240.135
- hash: 49158
- file: 128.199.71.62
- hash: 88
- file: 128.199.71.62
- hash: 888
- file: 128.199.71.62
- hash: 8880
- file: 65.21.119.55
- hash: 45110
- url: https://164.92.174.168/watch
- file: 164.92.174.168
- hash: 443
- url: http://80.66.75.53/functionalstatus/c6ui18im6abq8-el0qhxmang5bfkq
- url: http://124.71.5.199:6666/cm
- url: http://121.37.215.238/ca
- url: https://ns.b1ing.com:2087/dot.gif
- url: https://124.71.5.199/ptj
- file: 193.233.132.190
- hash: 50500
- file: 194.33.191.3
- hash: 7391
- file: 37.110.19.55
- hash: 80
- file: 193.233.132.59
- hash: 80
- file: 193.233.132.11
- hash: 80
- file: 101.99.92.169
- hash: 80
- file: 5.42.92.73
- hash: 80
- file: 5.42.65.117
- hash: 80
ThreatFox IOCs for 2024-03-20
Description
ThreatFox IOCs for 2024-03-20
AI-Powered Analysis
Technical Analysis
The provided threat information pertains to a malware-related intelligence report titled 'ThreatFox IOCs for 2024-03-20,' sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) related to various cyber threats. The report is categorized under 'type:osint,' indicating that the data primarily consists of open-source intelligence rather than detailed technical exploit information. No specific affected software versions or products are listed, and there are no associated Common Weakness Enumerations (CWEs) or patch links. The threat level is indicated as 2 on an unspecified scale, with a medium severity rating assigned. The technical details mention a distribution rating of 3, suggesting a moderate spread or prevalence of the malware, but no known exploits in the wild have been reported. The absence of concrete IOCs or detailed behavioral analysis limits the ability to precisely characterize the malware's capabilities, infection vectors, or payloads. Overall, this report appears to be an early-stage or summary intelligence update highlighting the presence of malware-related indicators without deep technical dissection or evidence of active exploitation campaigns.
Potential Impact
Given the limited technical details and the absence of known active exploitation, the immediate impact on European organizations is likely to be moderate. However, the presence of malware-related IOCs in open-source intelligence suggests a potential for reconnaissance or preparatory activities by threat actors. European organizations, particularly those involved in critical infrastructure, finance, or government sectors, could face risks if these IOCs correspond to emerging malware strains capable of data exfiltration, disruption, or espionage. The medium severity rating implies that while the threat is not currently critical, it warrants attention to prevent escalation. The moderate distribution rating indicates that the malware or its indicators might be circulating within certain networks or communities, increasing the risk of targeted attacks if left unmitigated. The lack of known exploits in the wild reduces the immediate threat level but does not eliminate the possibility of future exploitation, especially if threat actors develop or deploy new attack vectors based on these IOCs.
Mitigation Recommendations
1. Proactive IOC Integration: European organizations should integrate the latest ThreatFox IOCs into their Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities. 2. Enhanced Network Monitoring: Implement advanced network traffic analysis to identify anomalous behaviors that may correlate with the reported IOCs, focusing on unusual outbound connections or data flows. 3. Threat Hunting Exercises: Conduct targeted threat hunting activities using the provided IOCs and related OSINT to identify potential early-stage infections or reconnaissance activities within organizational networks. 4. Employee Awareness and Training: Since the threat details are limited, emphasize general malware hygiene, including phishing awareness and safe handling of unsolicited files or links, to reduce infection vectors. 5. Collaboration with CERTs and ISACs: Engage with European Computer Emergency Response Teams (CERTs) and Information Sharing and Analysis Centers (ISACs) to share intelligence and receive updates on any developments related to these IOCs. 6. Patch and Update Management: Although no specific patches are linked, maintaining up-to-date systems reduces the risk of exploitation by related or future malware variants. 7. Segmentation and Least Privilege: Enforce network segmentation and least privilege access controls to limit potential lateral movement if an infection occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- e7823eb9-65e6-4f85-9972-d225bf238ef3
- Original Timestamp
- 1710979386
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainbadbutperfect.com | DarkGate botnet C2 domain (confidence level: 100%) | |
domainameerpplus.ddns.net | NjRAT botnet C2 domain (confidence level: 75%) | |
domainnanomarch8100.duckdns.org | Nanocore RAT botnet C2 domain (confidence level: 100%) | |
domain21hjgt71f.sharedomain.top | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainnet-killer.work.gd | MooBot botnet C2 domain (confidence level: 75%) | |
domainsky-beta.com | Unknown malware botnet C2 domain (confidence level: 75%) | |
domaingamerforyou.com | Unknown malware botnet C2 domain (confidence level: 75%) | |
domainhopefor.space | magecart credit card skimming domain (confidence level: 50%) | |
domaintreimob.cfd | magecart credit card skimming domain (confidence level: 50%) | |
domainluisro2158.duckdns.org | NjRAT botnet C2 domain (confidence level: 75%) |
File
Value | Description | Copy |
---|---|---|
file165.22.16.55 | DarkGate payload delivery server (confidence level: 100%) | |
file147.78.47.15 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file52.157.196.2 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file24.42.99.89 | NjRAT botnet C2 server (confidence level: 75%) | |
file3.127.138.57 | NjRAT botnet C2 server (confidence level: 100%) | |
file18.156.13.209 | NjRAT botnet C2 server (confidence level: 100%) | |
file18.197.239.5 | NjRAT botnet C2 server (confidence level: 100%) | |
file18.192.93.86 | NjRAT botnet C2 server (confidence level: 100%) | |
file18.157.68.73 | NjRAT botnet C2 server (confidence level: 100%) | |
file45.120.177.167 | Meduza Stealer botnet C2 server (confidence level: 50%) | |
file192.210.201.57 | Remcos botnet C2 server (confidence level: 100%) | |
file78.47.48.88 | Unknown malware botnet C2 server (confidence level: 50%) | |
file34.134.107.175 | Unknown malware botnet C2 server (confidence level: 50%) | |
file43.198.208.125 | Deimos botnet C2 server (confidence level: 50%) | |
file18.162.142.16 | Deimos botnet C2 server (confidence level: 50%) | |
file96.9.225.129 | BianLian botnet C2 server (confidence level: 50%) | |
file62.234.28.147 | Havoc botnet C2 server (confidence level: 50%) | |
file95.179.171.52 | Havoc botnet C2 server (confidence level: 50%) | |
file139.162.51.167 | Havoc botnet C2 server (confidence level: 50%) | |
file155.138.229.25 | Havoc botnet C2 server (confidence level: 50%) | |
file192.227.234.164 | Havoc botnet C2 server (confidence level: 50%) | |
file23.227.193.238 | Havoc botnet C2 server (confidence level: 50%) | |
file41.96.236.231 | QakBot botnet C2 server (confidence level: 50%) | |
file72.27.209.148 | QakBot botnet C2 server (confidence level: 50%) | |
file77.126.104.106 | QakBot botnet C2 server (confidence level: 50%) | |
file175.13.35.49 | QakBot botnet C2 server (confidence level: 50%) | |
file78.169.186.24 | QakBot botnet C2 server (confidence level: 50%) | |
file46.246.6.15 | DCRat botnet C2 server (confidence level: 50%) | |
file46.246.84.14 | DCRat botnet C2 server (confidence level: 50%) | |
file123.253.108.131 | Unknown malware botnet C2 server (confidence level: 50%) | |
file216.83.58.188 | Unknown malware botnet C2 server (confidence level: 50%) | |
file45.76.189.78 | Unknown malware botnet C2 server (confidence level: 50%) | |
file154.16.10.161 | Unknown malware botnet C2 server (confidence level: 50%) | |
file81.161.238.163 | Unknown malware botnet C2 server (confidence level: 50%) | |
file222.186.21.204 | Unknown malware botnet C2 server (confidence level: 50%) | |
file84.32.214.66 | Unknown malware botnet C2 server (confidence level: 50%) | |
file91.107.121.52 | Unknown malware botnet C2 server (confidence level: 50%) | |
file93.123.39.238 | Socks5 Systemz botnet C2 server (confidence level: 50%) | |
file194.147.140.141 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file78.47.57.253 | Vidar botnet C2 server (confidence level: 100%) | |
file5.75.216.188 | Vidar botnet C2 server (confidence level: 100%) | |
file95.217.28.242 | Vidar botnet C2 server (confidence level: 100%) | |
file116.202.5.172 | Vidar botnet C2 server (confidence level: 100%) | |
file103.211.56.154 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file123.249.30.101 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file85.204.116.154 | Bashlite botnet C2 server (confidence level: 75%) | |
file3.66.38.117 | NjRAT botnet C2 server (confidence level: 100%) | |
file3.68.171.119 | NjRAT botnet C2 server (confidence level: 100%) | |
file18.197.239.109 | NjRAT botnet C2 server (confidence level: 100%) | |
file43.129.31.231 | DCRat botnet C2 server (confidence level: 80%) | |
file185.161.208.123 | Remcos botnet C2 server (confidence level: 75%) | |
file176.32.35.104 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file141.98.168.246 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file142.171.229.46 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file210.79.134.20 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.92.255.88 | STRRAT botnet C2 server (confidence level: 100%) | |
file220.158.234.115 | Unknown malware botnet C2 server (confidence level: 100%) | |
file216.73.159.58 | Unknown malware botnet C2 server (confidence level: 100%) | |
file169.239.129.35 | Unknown malware botnet C2 server (confidence level: 100%) | |
file103.208.86.69 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.239 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.240 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.241 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.242 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.243 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.244 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.245 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.246 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.247 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.23.108.249 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.95.169.100 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.95.169.101 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.95.169.105 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.95.169.113 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.95.169.117 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.95.169.150 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.95.169.152 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.95.169.153 | Unknown malware botnet C2 server (confidence level: 100%) | |
file84.54.51.124 | Mirai botnet C2 server (confidence level: 100%) | |
file103.172.79.74 | MooBot botnet C2 server (confidence level: 75%) | |
file46.246.84.18 | NjRAT botnet C2 server (confidence level: 75%) | |
file193.233.132.5 | RisePro botnet C2 server (confidence level: 100%) | |
file193.233.132.11 | RisePro botnet C2 server (confidence level: 100%) | |
file193.233.132.59 | RisePro botnet C2 server (confidence level: 100%) | |
file193.233.132.71 | RisePro botnet C2 server (confidence level: 100%) | |
file193.233.132.173 | RisePro botnet C2 server (confidence level: 100%) | |
file109.120.184.220 | RisePro botnet C2 server (confidence level: 100%) | |
file5.255.108.187 | Unidentified 111 (Latrodectus) botnet C2 server (confidence level: 85%) | |
file104.129.21.231 | Unidentified 111 (Latrodectus) botnet C2 server (confidence level: 85%) | |
file176.123.1.221 | Unidentified 111 (Latrodectus) botnet C2 server (confidence level: 85%) | |
file193.168.141.153 | Unidentified 111 (Latrodectus) botnet C2 server (confidence level: 85%) | |
file193.222.96.86 | Venom RAT botnet C2 server (confidence level: 100%) | |
file94.156.67.106 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file5.42.65.68 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file94.156.69.121 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file95.183.54.20 | Unknown malware botnet C2 server (confidence level: 50%) | |
file172.172.152.168 | Havoc botnet C2 server (confidence level: 50%) | |
file103.81.38.242 | Havoc botnet C2 server (confidence level: 50%) | |
file188.170.152.11 | Responder botnet C2 server (confidence level: 50%) | |
file97.118.56.247 | QakBot botnet C2 server (confidence level: 50%) | |
file91.254.253.44 | QakBot botnet C2 server (confidence level: 50%) | |
file92.251.173.191 | QakBot botnet C2 server (confidence level: 50%) | |
file5.163.180.48 | QakBot botnet C2 server (confidence level: 50%) | |
file78.178.72.139 | QakBot botnet C2 server (confidence level: 50%) | |
file46.246.12.4 | DCRat botnet C2 server (confidence level: 50%) | |
file38.59.124.61 | DCRat botnet C2 server (confidence level: 50%) | |
file121.36.105.186 | Unknown malware botnet C2 server (confidence level: 50%) | |
file88.179.240.135 | DarkComet botnet C2 server (confidence level: 100%) | |
file128.199.71.62 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file128.199.71.62 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file128.199.71.62 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file65.21.119.55 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file164.92.174.168 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file193.233.132.190 | RisePro botnet C2 server (confidence level: 100%) | |
file194.33.191.3 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file37.110.19.55 | Meduza Stealer botnet C2 server (confidence level: 80%) | |
file193.233.132.59 | RisePro botnet C2 server (confidence level: 80%) | |
file193.233.132.11 | RisePro botnet C2 server (confidence level: 80%) | |
file101.99.92.169 | RisePro botnet C2 server (confidence level: 80%) | |
file5.42.92.73 | RisePro botnet C2 server (confidence level: 80%) | |
file5.42.65.117 | RisePro botnet C2 server (confidence level: 80%) |
Hash
Value | Description | Copy |
---|---|---|
hash445 | DarkGate payload delivery server (confidence level: 100%) | |
hash61227 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash191 | NjRAT botnet C2 server (confidence level: 75%) | |
hash15449 | NjRAT botnet C2 server (confidence level: 100%) | |
hash15449 | NjRAT botnet C2 server (confidence level: 100%) | |
hash15449 | NjRAT botnet C2 server (confidence level: 100%) | |
hash15449 | NjRAT botnet C2 server (confidence level: 100%) | |
hash15449 | NjRAT botnet C2 server (confidence level: 100%) | |
hash80 | Meduza Stealer botnet C2 server (confidence level: 50%) | |
hash52748 | Remcos botnet C2 server (confidence level: 100%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash443 | Deimos botnet C2 server (confidence level: 50%) | |
hash443 | Deimos botnet C2 server (confidence level: 50%) | |
hash37826 | BianLian botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash4432 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash6000 | DCRat botnet C2 server (confidence level: 50%) | |
hash5000 | DCRat botnet C2 server (confidence level: 50%) | |
hash8886 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash9999 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash2023 | Socks5 Systemz botnet C2 server (confidence level: 50%) | |
hash8100 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash8888 | Vidar botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash14782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash839 | Bashlite botnet C2 server (confidence level: 75%) | |
hash12377 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12377 | NjRAT botnet C2 server (confidence level: 100%) | |
hash12377 | NjRAT botnet C2 server (confidence level: 100%) | |
hash8848 | DCRat botnet C2 server (confidence level: 80%) | |
hash6655 | Remcos botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8088 | STRRAT botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1311 | Mirai botnet C2 server (confidence level: 100%) | |
hash2023 | MooBot botnet C2 server (confidence level: 75%) | |
hash3100 | NjRAT botnet C2 server (confidence level: 75%) | |
hash8081 | RisePro botnet C2 server (confidence level: 100%) | |
hash8081 | RisePro botnet C2 server (confidence level: 100%) | |
hash8081 | RisePro botnet C2 server (confidence level: 100%) | |
hash8081 | RisePro botnet C2 server (confidence level: 100%) | |
hash8081 | RisePro botnet C2 server (confidence level: 100%) | |
hash50500 | RisePro botnet C2 server (confidence level: 100%) | |
hash443 | Unidentified 111 (Latrodectus) botnet C2 server (confidence level: 85%) | |
hash443 | Unidentified 111 (Latrodectus) botnet C2 server (confidence level: 85%) | |
hash443 | Unidentified 111 (Latrodectus) botnet C2 server (confidence level: 85%) | |
hash443 | Unidentified 111 (Latrodectus) botnet C2 server (confidence level: 85%) | |
hash4449 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash445 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash29093 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash445 | Responder botnet C2 server (confidence level: 50%) | |
hash993 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash995 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash5000 | DCRat botnet C2 server (confidence level: 50%) | |
hash8848 | DCRat botnet C2 server (confidence level: 50%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash49158 | DarkComet botnet C2 server (confidence level: 100%) | |
hash88 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8880 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash45110 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash50500 | RisePro botnet C2 server (confidence level: 100%) | |
hash7391 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Meduza Stealer botnet C2 server (confidence level: 80%) | |
hash80 | RisePro botnet C2 server (confidence level: 80%) | |
hash80 | RisePro botnet C2 server (confidence level: 80%) | |
hash80 | RisePro botnet C2 server (confidence level: 80%) | |
hash80 | RisePro botnet C2 server (confidence level: 80%) | |
hash80 | RisePro botnet C2 server (confidence level: 80%) |
Url
Value | Description | Copy |
---|---|---|
urlhttp://147.78.47.15/cx | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://5.75.216.188/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://78.47.57.253/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://95.217.28.242:8888/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://116.202.5.172/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://785654cm.n9shteam3.top/vmuploadstemporary.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://123.249.30.101/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://185.172.128.209/3cd2b41cbde8fc9c.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://176.32.35.104:82/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://8.222.147.15/cx | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://123.20.56.214:7777/visit.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://60.204.133.143/cx | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://store4.ro/panel/panel/index.php | Azorult botnet C2 (confidence level: 100%) | |
urlhttp://176.32.35.104/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://141.98.168.246/kj | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://21hjgt71f.sharedomain.top:8443/api/3 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://43.136.242.247:8001/ie9compatviewlist.xml | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://185.196.9.234:8080/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://210.79.134.20/explode/poll/ere9k18mnq | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://1.14.46.128:8888/dpixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://94.156.67.192/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://www.alabamacarhorns.com/wp-content/themes/twentytwentyfour/34uo7s.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://13300.org/wp-content/themes/twentytwentythree/t51kkf.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://alternativetracks.com/wp-content/themes/twentytwentyfour/c9wfar.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://www.amysinger.com/wp-content/themes/twentyten/b9un4f.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://lurdyvanafernandesmkd.com/wp-content/themes/twentytwentytwo/pam8oa.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://www.yukon.de/wp-content/themes/twentytwentytwo/n2gd2t.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://www.alabamacarhorns.com/wp-content/themes/twentytwentyfour/34uo7s.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://13300.org/wp-content/themes/twentytwentythree/t51kkf.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://alternativetracks.com/wp-content/themes/twentytwentyfour/c9wfar.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://www.amysinger.com/wp-content/themes/twentyten/b9un4f.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://lurdyvanafernandesmkd.com/wp-content/themes/twentytwentytwo/pam8oa.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://www.yukon.de/wp-content/themes/twentytwentytwo/n2gd2t.php?id=1 | WikiLoader botnet C2 (confidence level: 100%) | |
urlhttps://164.92.174.168/watch | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://80.66.75.53/functionalstatus/c6ui18im6abq8-el0qhxmang5bfkq | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://124.71.5.199:6666/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://121.37.215.238/ca | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://ns.b1ing.com:2087/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://124.71.5.199/ptj | Cobalt Strike botnet C2 (confidence level: 100%) |
Threat ID: 682c7ac2e3e6de8ceb76be1f
Added to database: 5/20/2025, 12:51:14 PM
Last enriched: 6/19/2025, 1:46:42 PM
Last updated: 8/5/2025, 9:01:21 PM
Views: 13
Related Threats
ThreatFox IOCs for 2025-08-11
MediumFrom ClickFix to Command: A Full PowerShell Attack Chain
MediumNorth Korean Group ScarCruft Expands From Spying to Ransomware Attacks
MediumMedusaLocker ransomware group is looking for pentesters
MediumThreatFox IOCs for 2025-08-10
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.