ThreatFox IOCs for 2024-10-26
ThreatFox IOCs for 2024-10-26
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2024-10-26 via the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), network activity, and payload delivery. ThreatFox is a platform that aggregates and shares threat intelligence data, including IOCs related to malware campaigns and malicious network behavior. However, the details here are minimal, with no specific affected software versions, no known exploits in the wild, and no patches available. The threat level is indicated as medium, with a threatLevel score of 2 (on an unspecified scale), analysis score of 1, and distribution score of 3, suggesting moderate dissemination or detection frequency. The absence of concrete technical details such as malware family, attack vectors, or payload specifics limits the depth of analysis. The IOCs themselves are not listed, which restricts the ability to identify precise indicators for detection or response. The classification under OSINT and network activity implies that the threat involves network-based payload delivery mechanisms, potentially leveraging publicly available intelligence to target victims or distribute malicious payloads. Given the lack of known exploits and patches, this appears to be an intelligence-sharing update rather than an active zero-day or critical vulnerability. The medium severity rating suggests a moderate risk, possibly due to the potential for payload delivery and network activity that could lead to compromise if exploited. Overall, this entry represents a threat intelligence update highlighting certain malware-related IOCs without detailed exploitation or impact data.
Potential Impact
For European organizations, the impact of this threat is currently moderate and largely dependent on the nature of the payloads delivered and the network activity patterns associated with the IOCs. Since no specific affected software or systems are identified, the threat could manifest in various forms, such as phishing campaigns, malware infections, or network intrusions leveraging publicly available intelligence. The lack of known exploits in the wild reduces immediate risk, but the presence of payload delivery mechanisms indicates a potential for infection and subsequent compromise if defenses are insufficient. European organizations with extensive network exposure, especially those in critical infrastructure, finance, or government sectors, could face risks related to data exfiltration, service disruption, or unauthorized access if these IOCs correspond to active campaigns. The medium severity suggests that while the threat is not critical, vigilance is necessary to detect and mitigate any attempts to leverage these IOCs for malicious purposes. The absence of patches means organizations must rely on detection and prevention controls rather than remediation of a vulnerability.
Mitigation Recommendations
1. Integrate the provided IOCs from ThreatFox into existing security monitoring tools such as SIEMs, IDS/IPS, and endpoint detection platforms to enhance detection capabilities. 2. Conduct network traffic analysis focusing on unusual or suspicious payload delivery patterns, especially those matching the shared IOCs. 3. Employ threat hunting exercises using the IOCs to proactively identify potential compromises or reconnaissance activities within the network. 4. Strengthen email and web filtering solutions to block known malicious payload delivery vectors that may be associated with the IOCs. 5. Maintain up-to-date threat intelligence feeds and collaborate with information sharing groups to receive timely updates on any evolution of this threat. 6. Educate staff on recognizing social engineering tactics that could be used to initiate payload delivery. 7. Implement network segmentation and least privilege principles to limit the impact of any successful payload execution. 8. Since no patches are available, focus on hardening systems and applying security best practices to reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
Indicators of Compromise
- domain: explorationmsn.store
- domain: cemeteryun.cyou
- file: 62.204.41.150
- hash: 443
- file: 146.235.228.60
- hash: 11112
- file: 119.29.202.88
- hash: 80
- file: 106.14.127.122
- hash: 30217
- file: 89.213.51.15
- hash: 48563
- file: 185.104.195.215
- hash: 6666
- url: https://crisiwarny.store/api
- url: https://founpiuer.store/api
- url: https://navygenerayk.store/api
- url: https://necklacedmny.store/api
- url: http://rustpidc.beget.tech/l1nc0in.php
- file: 167.99.69.166
- hash: 8888
- file: 117.72.103.29
- hash: 8080
- file: 38.6.177.11
- hash: 2222
- file: 185.186.76.151
- hash: 443
- file: 111.90.140.83
- hash: 443
- file: 111.90.140.83
- hash: 80
- file: 172.233.177.224
- hash: 8000
- file: 51.195.219.100
- hash: 3000
- file: 51.195.219.100
- hash: 7443
- file: 23.143.168.16
- hash: 443
- file: 93.123.109.187
- hash: 443
- file: 76.204.56.154
- hash: 4443
- file: 72.18.215.108
- hash: 443
- file: 46.246.82.21
- hash: 8080
- file: 154.213.187.92
- hash: 1336
- file: 103.135.101.188
- hash: 10496
- domain: js.liveya.org
- file: 185.198.234.147
- hash: 800
- file: 110.40.167.191
- hash: 7777
- file: 198.98.57.26
- hash: 2096
- file: 117.72.103.29
- hash: 80
- file: 103.159.64.203
- hash: 8880
- file: 103.37.41.116
- hash: 8081
- file: 124.222.182.200
- hash: 8081
- file: 159.223.36.127
- hash: 80
- file: 82.157.180.53
- hash: 86
- file: 103.37.41.118
- hash: 8081
- file: 45.115.236.152
- hash: 1234
- file: 47.106.159.229
- hash: 84
- file: 39.100.93.1
- hash: 443
- url: http://20.25.126.96:443/bdds
- url: http://20.25.126.96:443/sp6d
- url: http://20.25.126.96:443/wu8y
- url: http://utahsadventurefamily.shop:443/voorraad/hyundai/ioniq-6
- file: 54.253.7.109
- hash: 4447
- file: 107.148.36.43
- hash: 8986
- file: 114.55.100.165
- hash: 19999
- file: 87.120.117.217
- hash: 443
- file: 185.106.92.43
- hash: 443
- file: 185.196.10.242
- hash: 7736
- file: 137.184.150.148
- hash: 31337
- file: 103.94.76.9
- hash: 8888
- file: 187.35.7.84
- hash: 5000
- file: 94.103.125.186
- hash: 8000
- file: 46.246.14.18
- hash: 5000
- file: 190.123.46.53
- hash: 80
- file: 103.77.246.171
- hash: 80
- file: 31.41.244.13
- hash: 25834
- url: https://thumbi.cfd/api
- url: http://rollsroys.top/externaljsapisql.php
- file: 43.246.208.193
- hash: 443
- file: 118.89.66.192
- hash: 8888
- file: 118.89.66.192
- hash: 9999
- file: 124.223.186.148
- hash: 60020
- file: 78.161.6.8
- hash: 222
- file: 78.161.6.8
- hash: 888
- file: 78.161.6.8
- hash: 2004
- file: 78.161.6.8
- hash: 8888
- file: 207.148.83.9
- hash: 7443
- file: 204.48.22.193
- hash: 7443
- file: 51.89.224.171
- hash: 3001
- file: 185.173.37.164
- hash: 80
- file: 193.233.113.179
- hash: 50555
- file: 64.176.199.40
- hash: 8088
- file: 45.95.169.122
- hash: 1337
- domain: cpcalendars.bmzbaumaschinen.com
- domain: js1.search-st1.com
- domain: search-dl1.com
- domain: webmail.mg-plant.com
- file: 185.150.24.68
- hash: 80
- file: 185.150.24.67
- hash: 80
- file: 88.119.175.247
- hash: 443
- file: 78.111.91.21
- hash: 443
- domain: timeless-tales.shop
- domain: dns.cdn-serveri68n-googleapis.org
- file: 91.240.118.89
- hash: 15647
- url: http://94.141.122.159/baf27292fb61e144.php
- file: 129.204.45.99
- hash: 443
- file: 107.174.39.159
- hash: 80
- file: 118.89.116.174
- hash: 443
- file: 185.198.234.147
- hash: 443
- file: 82.157.180.53
- hash: 80
- file: 118.89.124.190
- hash: 9999
- file: 116.205.237.158
- hash: 10012
- file: 45.11.180.200
- hash: 444
- file: 8.154.18.17
- hash: 8090
- file: 79.116.68.10
- hash: 2404
- file: 18.144.159.211
- hash: 443
- file: 149.28.159.61
- hash: 443
- file: 85.7.223.113
- hash: 9090
- file: 31.220.49.60
- hash: 80
- file: 165.227.158.213
- hash: 443
- file: 185.174.101.203
- hash: 443
- file: 167.71.160.223
- hash: 443
- file: 152.53.66.68
- hash: 80
- domain: search-jrd.com
- url: http://185.215.113.217/coreopt/index.php
- file: 185.215.113.217
- hash: 80
- file: 147.45.47.210
- hash: 15647
- url: http://79.124.78.148/inure.php
- file: 79.124.78.148
- hash: 80
- file: 141.11.218.13
- hash: 10481
- file: 5.230.77.102
- hash: 2404
- file: 67.217.240.33
- hash: 443
- file: 67.217.240.34
- hash: 443
- file: 78.161.6.8
- hash: 2003
- file: 78.161.6.8
- hash: 20000
- file: 38.180.242.26
- hash: 80
- file: 188.227.57.57
- hash: 8080
- file: 185.215.113.214
- hash: 80
- file: 190.123.46.52
- hash: 80
- file: 113.106.204.21
- hash: 8089
- domain: bmzbaumaschinen.com
- file: 3.78.28.71
- hash: 10698
- file: 52.57.120.10
- hash: 10698
- file: 18.153.198.123
- hash: 10698
ThreatFox IOCs for 2024-10-26
Description
ThreatFox IOCs for 2024-10-26
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2024-10-26 via the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), network activity, and payload delivery. ThreatFox is a platform that aggregates and shares threat intelligence data, including IOCs related to malware campaigns and malicious network behavior. However, the details here are minimal, with no specific affected software versions, no known exploits in the wild, and no patches available. The threat level is indicated as medium, with a threatLevel score of 2 (on an unspecified scale), analysis score of 1, and distribution score of 3, suggesting moderate dissemination or detection frequency. The absence of concrete technical details such as malware family, attack vectors, or payload specifics limits the depth of analysis. The IOCs themselves are not listed, which restricts the ability to identify precise indicators for detection or response. The classification under OSINT and network activity implies that the threat involves network-based payload delivery mechanisms, potentially leveraging publicly available intelligence to target victims or distribute malicious payloads. Given the lack of known exploits and patches, this appears to be an intelligence-sharing update rather than an active zero-day or critical vulnerability. The medium severity rating suggests a moderate risk, possibly due to the potential for payload delivery and network activity that could lead to compromise if exploited. Overall, this entry represents a threat intelligence update highlighting certain malware-related IOCs without detailed exploitation or impact data.
Potential Impact
For European organizations, the impact of this threat is currently moderate and largely dependent on the nature of the payloads delivered and the network activity patterns associated with the IOCs. Since no specific affected software or systems are identified, the threat could manifest in various forms, such as phishing campaigns, malware infections, or network intrusions leveraging publicly available intelligence. The lack of known exploits in the wild reduces immediate risk, but the presence of payload delivery mechanisms indicates a potential for infection and subsequent compromise if defenses are insufficient. European organizations with extensive network exposure, especially those in critical infrastructure, finance, or government sectors, could face risks related to data exfiltration, service disruption, or unauthorized access if these IOCs correspond to active campaigns. The medium severity suggests that while the threat is not critical, vigilance is necessary to detect and mitigate any attempts to leverage these IOCs for malicious purposes. The absence of patches means organizations must rely on detection and prevention controls rather than remediation of a vulnerability.
Mitigation Recommendations
1. Integrate the provided IOCs from ThreatFox into existing security monitoring tools such as SIEMs, IDS/IPS, and endpoint detection platforms to enhance detection capabilities. 2. Conduct network traffic analysis focusing on unusual or suspicious payload delivery patterns, especially those matching the shared IOCs. 3. Employ threat hunting exercises using the IOCs to proactively identify potential compromises or reconnaissance activities within the network. 4. Strengthen email and web filtering solutions to block known malicious payload delivery vectors that may be associated with the IOCs. 5. Maintain up-to-date threat intelligence feeds and collaborate with information sharing groups to receive timely updates on any evolution of this threat. 6. Educate staff on recognizing social engineering tactics that could be used to initiate payload delivery. 7. Implement network segmentation and least privilege principles to limit the impact of any successful payload execution. 8. Since no patches are available, focus on hardening systems and applying security best practices to reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- ebb82d36-e8c6-4ffe-9c92-e5520d2e16de
- Original Timestamp
- 1729987388
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainexplorationmsn.store | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincemeteryun.cyou | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainjs.liveya.org | MooBot botnet C2 domain (confidence level: 100%) | |
domaincpcalendars.bmzbaumaschinen.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainjs1.search-st1.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainsearch-dl1.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainwebmail.mg-plant.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domaintimeless-tales.shop | Amadey botnet C2 domain (confidence level: 100%) | |
domaindns.cdn-serveri68n-googleapis.org | Amadey botnet C2 domain (confidence level: 100%) | |
domainsearch-jrd.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainbmzbaumaschinen.com | Bashlite botnet C2 domain (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file62.204.41.150 | Stealc botnet C2 server (confidence level: 100%) | |
file146.235.228.60 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file119.29.202.88 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file106.14.127.122 | Sliver botnet C2 server (confidence level: 100%) | |
file89.213.51.15 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.104.195.215 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file167.99.69.166 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file117.72.103.29 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file38.6.177.11 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.186.76.151 | ShadowPad botnet C2 server (confidence level: 90%) | |
file111.90.140.83 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file111.90.140.83 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file172.233.177.224 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file51.195.219.100 | Unknown malware botnet C2 server (confidence level: 100%) | |
file51.195.219.100 | Unknown malware botnet C2 server (confidence level: 100%) | |
file23.143.168.16 | Unknown malware botnet C2 server (confidence level: 100%) | |
file93.123.109.187 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file76.204.56.154 | Havoc botnet C2 server (confidence level: 100%) | |
file72.18.215.108 | Havoc botnet C2 server (confidence level: 100%) | |
file46.246.82.21 | DCRat botnet C2 server (confidence level: 100%) | |
file154.213.187.92 | Stealc botnet C2 server (confidence level: 100%) | |
file103.135.101.188 | MooBot botnet C2 server (confidence level: 75%) | |
file185.198.234.147 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file110.40.167.191 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file198.98.57.26 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file117.72.103.29 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.159.64.203 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.37.41.116 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.222.182.200 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file159.223.36.127 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file82.157.180.53 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.37.41.118 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.115.236.152 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.106.159.229 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.100.93.1 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file54.253.7.109 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file107.148.36.43 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file114.55.100.165 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file87.120.117.217 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.106.92.43 | Latrodectus botnet C2 server (confidence level: 75%) | |
file185.196.10.242 | Remcos botnet C2 server (confidence level: 100%) | |
file137.184.150.148 | Sliver botnet C2 server (confidence level: 100%) | |
file103.94.76.9 | Unknown malware botnet C2 server (confidence level: 100%) | |
file187.35.7.84 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file94.103.125.186 | Venom RAT botnet C2 server (confidence level: 100%) | |
file46.246.14.18 | DCRat botnet C2 server (confidence level: 100%) | |
file190.123.46.53 | MooBot botnet C2 server (confidence level: 100%) | |
file103.77.246.171 | MooBot botnet C2 server (confidence level: 100%) | |
file31.41.244.13 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file43.246.208.193 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.89.66.192 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.89.66.192 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.223.186.148 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file78.161.6.8 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file78.161.6.8 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file78.161.6.8 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file78.161.6.8 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file207.148.83.9 | Unknown malware botnet C2 server (confidence level: 100%) | |
file204.48.22.193 | Unknown malware botnet C2 server (confidence level: 100%) | |
file51.89.224.171 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.173.37.164 | Hook botnet C2 server (confidence level: 100%) | |
file193.233.113.179 | Hook botnet C2 server (confidence level: 100%) | |
file64.176.199.40 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file45.95.169.122 | Bashlite botnet C2 server (confidence level: 100%) | |
file185.150.24.68 | Bashlite botnet C2 server (confidence level: 100%) | |
file185.150.24.67 | Bashlite botnet C2 server (confidence level: 100%) | |
file88.119.175.247 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
file78.111.91.21 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
file91.240.118.89 | Amadey botnet C2 server (confidence level: 100%) | |
file129.204.45.99 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file107.174.39.159 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.89.116.174 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.198.234.147 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file82.157.180.53 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.89.124.190 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file116.205.237.158 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.11.180.200 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.154.18.17 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file79.116.68.10 | Remcos botnet C2 server (confidence level: 100%) | |
file18.144.159.211 | Sliver botnet C2 server (confidence level: 100%) | |
file149.28.159.61 | ShadowPad botnet C2 server (confidence level: 90%) | |
file85.7.223.113 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file31.220.49.60 | Hook botnet C2 server (confidence level: 100%) | |
file165.227.158.213 | Havoc botnet C2 server (confidence level: 100%) | |
file185.174.101.203 | Havoc botnet C2 server (confidence level: 100%) | |
file167.71.160.223 | Havoc botnet C2 server (confidence level: 100%) | |
file152.53.66.68 | MooBot botnet C2 server (confidence level: 100%) | |
file185.215.113.217 | Amadey botnet C2 server (confidence level: 50%) | |
file147.45.47.210 | SectopRAT botnet C2 server (confidence level: 100%) | |
file79.124.78.148 | Koi Loader botnet C2 server (confidence level: 100%) | |
file141.11.218.13 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file5.230.77.102 | Remcos botnet C2 server (confidence level: 100%) | |
file67.217.240.33 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file67.217.240.34 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file78.161.6.8 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file78.161.6.8 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file38.180.242.26 | Poseidon Stealer botnet C2 server (confidence level: 100%) | |
file188.227.57.57 | ERMAC botnet C2 server (confidence level: 100%) | |
file185.215.113.214 | Stealc botnet C2 server (confidence level: 100%) | |
file190.123.46.52 | MooBot botnet C2 server (confidence level: 100%) | |
file113.106.204.21 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.78.28.71 | NjRAT botnet C2 server (confidence level: 100%) | |
file52.57.120.10 | NjRAT botnet C2 server (confidence level: 100%) | |
file18.153.198.123 | NjRAT botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash443 | Stealc botnet C2 server (confidence level: 100%) | |
hash11112 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash30217 | Sliver botnet C2 server (confidence level: 100%) | |
hash48563 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash6666 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2222 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash443 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash3000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash4443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash8080 | DCRat botnet C2 server (confidence level: 100%) | |
hash1336 | Stealc botnet C2 server (confidence level: 100%) | |
hash10496 | MooBot botnet C2 server (confidence level: 75%) | |
hash800 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash7777 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2096 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8880 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash86 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1234 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash84 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4447 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8986 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash19999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 75%) | |
hash7736 | Remcos botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash5000 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8000 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash5000 | DCRat botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash25834 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash60020 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash222 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash888 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash2004 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8888 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3001 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash50555 | Hook botnet C2 server (confidence level: 100%) | |
hash8088 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash1337 | Bashlite botnet C2 server (confidence level: 100%) | |
hash80 | Bashlite botnet C2 server (confidence level: 100%) | |
hash80 | Bashlite botnet C2 server (confidence level: 100%) | |
hash443 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
hash443 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
hash15647 | Amadey botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash10012 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash444 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8090 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash9090 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash80 | Amadey botnet C2 server (confidence level: 50%) | |
hash15647 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash80 | Koi Loader botnet C2 server (confidence level: 100%) | |
hash10481 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash2003 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash20000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Poseidon Stealer botnet C2 server (confidence level: 100%) | |
hash8080 | ERMAC botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash8089 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash10698 | NjRAT botnet C2 server (confidence level: 100%) | |
hash10698 | NjRAT botnet C2 server (confidence level: 100%) | |
hash10698 | NjRAT botnet C2 server (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttps://crisiwarny.store/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://founpiuer.store/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://navygenerayk.store/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://necklacedmny.store/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://rustpidc.beget.tech/l1nc0in.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://20.25.126.96:443/bdds | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttp://20.25.126.96:443/sp6d | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttp://20.25.126.96:443/wu8y | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttp://utahsadventurefamily.shop:443/voorraad/hyundai/ioniq-6 | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttps://thumbi.cfd/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://rollsroys.top/externaljsapisql.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://94.141.122.159/baf27292fb61e144.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://185.215.113.217/coreopt/index.php | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://79.124.78.148/inure.php | Koi Loader botnet C2 (confidence level: 100%) |
Threat ID: 68367c99182aa0cae232282c
Added to database: 5/28/2025, 3:01:45 AM
Last enriched: 6/27/2025, 10:36:37 AM
Last updated: 8/16/2025, 6:36:03 AM
Views: 10
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.