ThreatFox IOCs for 2024-03-31
ThreatFox IOCs for 2024-03-31
AI Analysis
Technical Summary
The provided threat intelligence pertains to a malware-related report titled 'ThreatFox IOCs for 2024-03-31,' sourced from ThreatFox, an OSINT (Open Source Intelligence) platform. The report is dated March 31, 2024, and is categorized under malware with a medium severity level. However, the technical details and indicators of compromise (IOCs) are minimal or absent, with no specific affected software versions, no CWE identifiers, and no patch links provided. The threat level is indicated as 2 on an unspecified scale, with analysis and distribution scores of 1 and 3 respectively, suggesting limited analytical depth but moderate distribution potential. There are no known exploits in the wild reported for this threat, and the tags classify it as OSINT with a TLP (Traffic Light Protocol) white designation, indicating the information is publicly shareable without restriction. Given the lack of detailed technical indicators, the threat appears to be a collection or dissemination of IOCs rather than a direct exploit or active malware campaign. This implies the threat intelligence is primarily informational, potentially useful for detection and monitoring rather than immediate incident response. The absence of authentication or user interaction requirements, combined with the lack of specific vulnerabilities or affected products, suggests the threat is more about awareness and preparedness than an active, exploitable vulnerability. Overall, this report serves as a situational awareness update rather than a direct alert of an ongoing or imminent attack vector.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the absence of active exploits and specific affected systems. Since the threat intelligence is primarily OSINT-based IOCs without concrete malware samples or exploit details, the immediate risk to confidentiality, integrity, or availability is low. However, the distribution score indicates that the IOCs might be moderately disseminated, which could aid threat actors in reconnaissance or preparatory stages of attacks if leveraged alongside other vulnerabilities. European entities relying on threat intelligence feeds should integrate these IOCs into their detection systems to enhance situational awareness. The medium severity rating suggests a moderate concern level, primarily for organizations with mature security operations centers (SOCs) that can utilize such intelligence for proactive defense. The lack of targeted product or version information reduces the likelihood of widespread impact but does not eliminate the risk of targeted reconnaissance or low-level malware campaigns that could evolve. Therefore, the impact is more strategic and preparatory rather than operationally disruptive at this stage.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities, even if the IOCs are currently unspecified, monitoring for updates from ThreatFox or related OSINT sources. 2. Maintain up-to-date threat intelligence feeds and automate the ingestion of new indicators to ensure timely awareness of emerging threats. 3. Conduct regular threat hunting exercises using OSINT-derived IOCs to identify any early signs of compromise or reconnaissance activities within the network. 4. Strengthen network segmentation and enforce the principle of least privilege to limit potential lateral movement should any related malware or exploits emerge. 5. Educate SOC analysts and incident responders on the nature of OSINT-based threat intelligence to improve contextual understanding and prioritization. 6. Monitor vendor advisories and patch releases closely, as the absence of current patches or affected versions may change if new information arises. 7. Collaborate with European cybersecurity information sharing organizations (e.g., ENISA, national CERTs) to share and receive updates on the evolution of these IOCs and related threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
Indicators of Compromise
- file: 42.192.36.31
- hash: 8888
- file: 42.194.251.253
- hash: 10080
- file: 43.138.0.70
- hash: 9999
- file: 40.66.40.211
- hash: 443
- url: https://cdn.discordapp.com/attachments/1076575623880921249/1223388963822375054/sky-beta-setup.rar?ex=6619acc2&is=660737c2&hm=9b3776042330a6a6200098d20ec1d51a34dfa3d3a00f57a6a63ae31a6f9304a9&
- hash: 905c274b72e944497a868117c31855a8b2452fe84719f50ecb843408a78a8b3b
- domain: www.nocapsrt.site
- domain: nocapsrt.site
- hash: 63b3dd980ac9a06fd167b0df8121c979
- hash: d45fc4a83fcd2a1fec421d55635d51bf02646d37
- hash: 3ffdada986edc6412a966b49b35d63b38d836252f77c4c6488b3b564653f3af7
- hash: 5ef4cf46165c932ee117830e7cd38ccf
- url: https://hitech-us.com/xmlrpc.php
- url: https://eatech.uk/xmlrpc.php
- url: https://topcoloringpages.net/xmlrpc.php
- url: https://seiji-folk.com/xmlrpc.php
- url: https://ww4.amazila.cz/xmlrpc.php
- file: 172.67.143.166
- hash: 443
- url: http://115.49.156.167:53874/mozi.m
- url: https://wielkopolskamagazyn.pl/xmlrpc.php
- url: https://tanya-tanya.com/xmlrpc.php
- url: https://baaghitv.com/xmlrpc.php
- url: https://192-168-1-1-admin-admin.ru/xmlrpc.php
- url: https://lasantaespina.cat/xmlrpc.php
- url: https://mepiu.it/xmlrpc.php
- url: https://vipaco.vn/xmlrpc.php
- url: https://www.beeldvorm.eu/xmlrpc.php
- file: 15.197.164.51
- hash: 443
- file: 5.181.20.63
- hash: 443
- file: 16.16.187.254
- hash: 80
- file: 165.232.68.248
- hash: 80
- file: 175.10.220.47
- hash: 4432
- file: 71.88.244.13
- hash: 443
- file: 38.45.126.178
- hash: 8888
- file: 38.45.126.182
- hash: 8888
- file: 45.207.36.50
- hash: 2086
- file: 38.45.126.181
- hash: 8888
- file: 43.132.193.188
- hash: 8888
- file: 134.209.34.122
- hash: 3333
- file: 142.11.236.34
- hash: 80
- file: 147.78.103.54
- hash: 80
- file: 94.228.169.68
- hash: 80
- file: 93.123.39.201
- hash: 80
- file: 86.38.247.37
- hash: 80
- file: 45.138.16.150
- hash: 80
- file: 45.152.86.86
- hash: 56789
- domain: a.iruko.top
- file: 185.196.10.233
- hash: 4782
- file: 185.196.10.233
- hash: 6606
- file: 185.196.10.233
- hash: 7707
- file: 185.196.10.233
- hash: 8808
- url: http://121.199.0.54/api/getit
- file: 121.199.0.54
- hash: 80
- file: 156.232.192.101
- hash: 808
- url: https://192.236.176.143/cm
- file: 192.236.176.143
- hash: 443
- file: 154.219.177.156
- hash: 808
- url: https://m.old.gxjczx.gov.cn/info
- domain: m.old.gxjczx.gov.cn
- url: https://3g.ali213.net/info
- domain: 3g.ali213.net
- file: 124.223.220.143
- hash: 443
- url: https://45.61.136.169/api/3
- file: 45.61.136.169
- hash: 443
- file: 103.35.190.238
- hash: 666
- file: 103.35.190.189
- hash: 666
- domain: giga.giganoob.xyz
- file: 193.141.60.143
- hash: 6789
- file: 193.141.60.143
- hash: 59432
- domain: giga.giganoob.ru
- domain: bnd-servers.komakhazine.com
- domain: huboftest.ir
- domain: plano-safra.online
- url: http://120.46.130.73:6666/pixel.gif
- url: http://service-43eyvs26-1312185610.gz.tencentapigw.com.cn/cx
- domain: service-43eyvs26-1312185610.gz.tencentapigw.com.cn
- file: 8.147.132.135
- hash: 80
- url: https://service-43eyvs26-1312185610.gz.tencentapigw.com.cn/dot.gif
- url: http://47.99.177.59:6666/pixel
- url: https://update.360safety.xyz:8443/push
- domain: update.360safety.xyz
- url: http://47.94.241.49:8090/__utm.gif
- url: http://93.185.166.60/common.css
- file: 93.185.166.60
- hash: 80
- domain: serenitytherapy.xyz
- domain: illitmagnetic.site
- url: https://hentaiworld.tv/xmlrpc.php
- url: https://www.8ktv-test.de/xmlrpc.php
- url: https://mlwmlw.org/xmlrpc.php
- url: https://seorongdaiduong.com/xmlrpc.php
- url: https://chniabank.com:2083/j.ad
- domain: chniabank.com
- file: 8.147.132.135
- hash: 2083
- url: http://45.93.20.242/visit.js
- file: 146.190.108.145
- hash: 31337
- file: 146.190.108.145
- hash: 443
- file: 3.111.169.215
- hash: 443
- file: 159.65.173.112
- hash: 9443
- file: 92.116.36.36
- hash: 443
- file: 172.233.120.154
- hash: 443
- file: 188.48.80.235
- hash: 443
- file: 18.166.113.24
- hash: 8888
- file: 137.184.228.202
- hash: 80
- file: 185.43.4.238
- hash: 80
- file: 193.26.115.181
- hash: 80
- file: 193.26.115.181
- hash: 443
- file: 194.67.193.67
- hash: 80
- url: http://172.121.5.230:81/match
- url: https://185.236.231.201/push
- file: 185.236.231.201
- hash: 443
- url: https://195.123.217.22/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
- file: 195.123.217.22
- hash: 443
ThreatFox IOCs for 2024-03-31
Description
ThreatFox IOCs for 2024-03-31
AI-Powered Analysis
Technical Analysis
The provided threat intelligence pertains to a malware-related report titled 'ThreatFox IOCs for 2024-03-31,' sourced from ThreatFox, an OSINT (Open Source Intelligence) platform. The report is dated March 31, 2024, and is categorized under malware with a medium severity level. However, the technical details and indicators of compromise (IOCs) are minimal or absent, with no specific affected software versions, no CWE identifiers, and no patch links provided. The threat level is indicated as 2 on an unspecified scale, with analysis and distribution scores of 1 and 3 respectively, suggesting limited analytical depth but moderate distribution potential. There are no known exploits in the wild reported for this threat, and the tags classify it as OSINT with a TLP (Traffic Light Protocol) white designation, indicating the information is publicly shareable without restriction. Given the lack of detailed technical indicators, the threat appears to be a collection or dissemination of IOCs rather than a direct exploit or active malware campaign. This implies the threat intelligence is primarily informational, potentially useful for detection and monitoring rather than immediate incident response. The absence of authentication or user interaction requirements, combined with the lack of specific vulnerabilities or affected products, suggests the threat is more about awareness and preparedness than an active, exploitable vulnerability. Overall, this report serves as a situational awareness update rather than a direct alert of an ongoing or imminent attack vector.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the absence of active exploits and specific affected systems. Since the threat intelligence is primarily OSINT-based IOCs without concrete malware samples or exploit details, the immediate risk to confidentiality, integrity, or availability is low. However, the distribution score indicates that the IOCs might be moderately disseminated, which could aid threat actors in reconnaissance or preparatory stages of attacks if leveraged alongside other vulnerabilities. European entities relying on threat intelligence feeds should integrate these IOCs into their detection systems to enhance situational awareness. The medium severity rating suggests a moderate concern level, primarily for organizations with mature security operations centers (SOCs) that can utilize such intelligence for proactive defense. The lack of targeted product or version information reduces the likelihood of widespread impact but does not eliminate the risk of targeted reconnaissance or low-level malware campaigns that could evolve. Therefore, the impact is more strategic and preparatory rather than operationally disruptive at this stage.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities, even if the IOCs are currently unspecified, monitoring for updates from ThreatFox or related OSINT sources. 2. Maintain up-to-date threat intelligence feeds and automate the ingestion of new indicators to ensure timely awareness of emerging threats. 3. Conduct regular threat hunting exercises using OSINT-derived IOCs to identify any early signs of compromise or reconnaissance activities within the network. 4. Strengthen network segmentation and enforce the principle of least privilege to limit potential lateral movement should any related malware or exploits emerge. 5. Educate SOC analysts and incident responders on the nature of OSINT-based threat intelligence to improve contextual understanding and prioritization. 6. Monitor vendor advisories and patch releases closely, as the absence of current patches or affected versions may change if new information arises. 7. Collaborate with European cybersecurity information sharing organizations (e.g., ENISA, national CERTs) to share and receive updates on the evolution of these IOCs and related threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- f5c0389d-05d5-4079-a86d-271b05ec656c
- Original Timestamp
- 1711929787
Indicators of Compromise
File
Value | Description | Copy |
---|---|---|
file42.192.36.31 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file42.194.251.253 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.138.0.70 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file40.66.40.211 | Unknown malware botnet C2 server (confidence level: 100%) | |
file172.67.143.166 | Agent Tesla botnet C2 server (confidence level: 80%) | |
file15.197.164.51 | Deimos botnet C2 server (confidence level: 50%) | |
file5.181.20.63 | Havoc botnet C2 server (confidence level: 50%) | |
file16.16.187.254 | Havoc botnet C2 server (confidence level: 50%) | |
file165.232.68.248 | Havoc botnet C2 server (confidence level: 50%) | |
file175.10.220.47 | QakBot botnet C2 server (confidence level: 50%) | |
file71.88.244.13 | QakBot botnet C2 server (confidence level: 50%) | |
file38.45.126.178 | Unknown malware botnet C2 server (confidence level: 50%) | |
file38.45.126.182 | Unknown malware botnet C2 server (confidence level: 50%) | |
file45.207.36.50 | Unknown malware botnet C2 server (confidence level: 50%) | |
file38.45.126.181 | Unknown malware botnet C2 server (confidence level: 50%) | |
file43.132.193.188 | Unknown malware botnet C2 server (confidence level: 50%) | |
file134.209.34.122 | Unknown malware botnet C2 server (confidence level: 50%) | |
file142.11.236.34 | Unknown malware botnet C2 server (confidence level: 50%) | |
file147.78.103.54 | Unknown malware botnet C2 server (confidence level: 50%) | |
file94.228.169.68 | Unknown malware botnet C2 server (confidence level: 50%) | |
file93.123.39.201 | Unknown malware botnet C2 server (confidence level: 50%) | |
file86.38.247.37 | Unknown malware botnet C2 server (confidence level: 50%) | |
file45.138.16.150 | Unknown malware botnet C2 server (confidence level: 50%) | |
file45.152.86.86 | MooBot botnet C2 server (confidence level: 75%) | |
file185.196.10.233 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file185.196.10.233 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file185.196.10.233 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file185.196.10.233 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file121.199.0.54 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.232.192.101 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file192.236.176.143 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.219.177.156 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.223.220.143 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.61.136.169 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.35.190.238 | Bashlite botnet C2 server (confidence level: 75%) | |
file103.35.190.189 | Bashlite botnet C2 server (confidence level: 75%) | |
file193.141.60.143 | Mirai botnet C2 server (confidence level: 75%) | |
file193.141.60.143 | Mirai botnet C2 server (confidence level: 75%) | |
file8.147.132.135 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file93.185.166.60 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.147.132.135 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file146.190.108.145 | Sliver botnet C2 server (confidence level: 50%) | |
file146.190.108.145 | Sliver botnet C2 server (confidence level: 50%) | |
file3.111.169.215 | Havoc botnet C2 server (confidence level: 50%) | |
file159.65.173.112 | Havoc botnet C2 server (confidence level: 50%) | |
file92.116.36.36 | Havoc botnet C2 server (confidence level: 50%) | |
file172.233.120.154 | Havoc botnet C2 server (confidence level: 50%) | |
file188.48.80.235 | QakBot botnet C2 server (confidence level: 50%) | |
file18.166.113.24 | Unknown malware botnet C2 server (confidence level: 50%) | |
file137.184.228.202 | Unknown malware botnet C2 server (confidence level: 50%) | |
file185.43.4.238 | Unknown malware botnet C2 server (confidence level: 50%) | |
file193.26.115.181 | FAKEUPDATES botnet C2 server (confidence level: 50%) | |
file193.26.115.181 | FAKEUPDATES botnet C2 server (confidence level: 50%) | |
file194.67.193.67 | Matanbuchus botnet C2 server (confidence level: 80%) | |
file185.236.231.201 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file195.123.217.22 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash10080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash905c274b72e944497a868117c31855a8b2452fe84719f50ecb843408a78a8b3b | Unknown malware payload (confidence level: 100%) | |
hash63b3dd980ac9a06fd167b0df8121c979 | XWorm payload (confidence level: 95%) | |
hashd45fc4a83fcd2a1fec421d55635d51bf02646d37 | GCleaner payload (confidence level: 95%) | |
hash3ffdada986edc6412a966b49b35d63b38d836252f77c4c6488b3b564653f3af7 | GCleaner payload (confidence level: 95%) | |
hash5ef4cf46165c932ee117830e7cd38ccf | GCleaner payload (confidence level: 95%) | |
hash443 | Agent Tesla botnet C2 server (confidence level: 80%) | |
hash443 | Deimos botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash80 | Havoc botnet C2 server (confidence level: 50%) | |
hash80 | Havoc botnet C2 server (confidence level: 50%) | |
hash4432 | QakBot botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash2086 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash56789 | MooBot botnet C2 server (confidence level: 75%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash808 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash808 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash666 | Bashlite botnet C2 server (confidence level: 75%) | |
hash666 | Bashlite botnet C2 server (confidence level: 75%) | |
hash6789 | Mirai botnet C2 server (confidence level: 75%) | |
hash59432 | Mirai botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2083 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash443 | Sliver botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash9443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | Havoc botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 50%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | FAKEUPDATES botnet C2 server (confidence level: 50%) | |
hash443 | FAKEUPDATES botnet C2 server (confidence level: 50%) | |
hash80 | Matanbuchus botnet C2 server (confidence level: 80%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttps://cdn.discordapp.com/attachments/1076575623880921249/1223388963822375054/sky-beta-setup.rar?ex=6619acc2&is=660737c2&hm=9b3776042330a6a6200098d20ec1d51a34dfa3d3a00f57a6a63ae31a6f9304a9& | Unknown malware payload delivery URL (confidence level: 100%) | |
urlhttps://hitech-us.com/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://eatech.uk/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://topcoloringpages.net/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://seiji-folk.com/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://ww4.amazila.cz/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttp://115.49.156.167:53874/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttps://wielkopolskamagazyn.pl/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://tanya-tanya.com/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://baaghitv.com/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://192-168-1-1-admin-admin.ru/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://lasantaespina.cat/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://mepiu.it/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://vipaco.vn/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://www.beeldvorm.eu/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttp://121.199.0.54/api/getit | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://192.236.176.143/cm | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://m.old.gxjczx.gov.cn/info | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://3g.ali213.net/info | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://45.61.136.169/api/3 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://120.46.130.73:6666/pixel.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://service-43eyvs26-1312185610.gz.tencentapigw.com.cn/cx | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://service-43eyvs26-1312185610.gz.tencentapigw.com.cn/dot.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://47.99.177.59:6666/pixel | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://update.360safety.xyz:8443/push | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://47.94.241.49:8090/__utm.gif | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://93.185.166.60/common.css | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://hentaiworld.tv/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://www.8ktv-test.de/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://mlwmlw.org/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://seorongdaiduong.com/xmlrpc.php | GootLoader payload delivery URL (confidence level: 80%) | |
urlhttps://chniabank.com:2083/j.ad | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://45.93.20.242/visit.js | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttp://172.121.5.230:81/match | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://185.236.231.201/push | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://195.123.217.22/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books | Cobalt Strike botnet C2 (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainwww.nocapsrt.site | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainnocapsrt.site | Unknown malware botnet C2 domain (confidence level: 100%) | |
domaina.iruko.top | MooBot botnet C2 domain (confidence level: 75%) | |
domainm.old.gxjczx.gov.cn | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domain3g.ali213.net | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domaingiga.giganoob.xyz | Mirai botnet C2 domain (confidence level: 100%) | |
domaingiga.giganoob.ru | Mirai botnet C2 domain (confidence level: 100%) | |
domainbnd-servers.komakhazine.com | Meduza Stealer botnet C2 domain (confidence level: 50%) | |
domainhuboftest.ir | Meduza Stealer botnet C2 domain (confidence level: 50%) | |
domainplano-safra.online | Meduza Stealer botnet C2 domain (confidence level: 50%) | |
domainservice-43eyvs26-1312185610.gz.tencentapigw.com.cn | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainupdate.360safety.xyz | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainserenitytherapy.xyz | Unknown malware payload delivery domain (confidence level: 100%) | |
domainillitmagnetic.site | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainchniabank.com | Cobalt Strike botnet C2 domain (confidence level: 100%) |
Threat ID: 682c7ab8e3e6de8ceb73da9a
Added to database: 5/20/2025, 12:51:04 PM
Last enriched: 6/19/2025, 2:02:29 PM
Last updated: 8/5/2025, 9:53:24 AM
Views: 15
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.