ThreatFox IOCs for 2024-10-31
ThreatFox IOCs for 2024-10-31
AI Analysis
Technical Summary
The provided threat intelligence relates to a set of Indicators of Compromise (IOCs) published on October 31, 2024, by ThreatFox, a platform specializing in sharing threat intelligence data. The threat is categorized as malware-related, specifically within the domain of OSINT (Open Source Intelligence), suggesting that the information primarily involves data collected from publicly available sources rather than a direct vulnerability or exploit in a specific software product. No specific affected versions or products are identified, indicating that the IOCs may pertain to malware campaigns or infrastructure rather than a software flaw. The technical details indicate a moderate threat level (threatLevel: 2) with limited analysis (analysis: 1) but a relatively higher distribution score (distribution: 3), implying that the malware or associated indicators are somewhat widespread or have a notable presence in threat intelligence feeds. There are no known exploits in the wild linked to this threat at the time of publication, and no patch links or CWE identifiers are provided, which further supports the notion that this is an intelligence report on malware activity rather than a newly discovered vulnerability. The absence of specific indicators in the provided data limits the ability to detail the malware’s behavior, infection vectors, or payload specifics. However, the classification as OSINT malware suggests the threat may involve data collection, reconnaissance, or information gathering activities that could be leveraged in broader cyberattack campaigns. The TLP:white tag indicates that the information is intended for wide distribution and sharing within the cybersecurity community. Overall, this threat intelligence entry serves as a situational awareness update rather than an immediate actionable vulnerability alert.
Potential Impact
For European organizations, the impact of this malware-related threat primarily revolves around potential reconnaissance and information gathering activities that could precede more targeted attacks. Since the threat is OSINT-related malware, it may be used to collect sensitive information, such as network configurations, employee details, or other organizational data, which could facilitate subsequent intrusion attempts or social engineering campaigns. The medium severity rating suggests a moderate risk level; while direct exploitation or system compromise is not indicated, the presence of such malware could degrade confidentiality by exposing sensitive data. Integrity and availability impacts appear limited based on the available information. European organizations in sectors with high-value data or strategic importance—such as finance, critical infrastructure, government, and technology—could be more attractive targets for adversaries leveraging this malware for intelligence purposes. The lack of known exploits in the wild reduces the immediate threat of widespread damage but does not eliminate the risk of targeted reconnaissance leading to future attacks. Additionally, the distribution score implies that the malware or its indicators are somewhat prevalent, which could increase the likelihood of encountering related threats in European networks.
Mitigation Recommendations
Given the nature of this threat as OSINT-related malware with no specific vulnerabilities or exploits identified, mitigation should focus on enhancing detection and prevention of reconnaissance and data collection activities. European organizations should: 1) Implement advanced network monitoring and anomaly detection systems to identify unusual outbound traffic patterns indicative of data exfiltration or command-and-control communications. 2) Employ threat intelligence platforms that integrate ThreatFox and similar OSINT feeds to stay updated on emerging IOCs and malware infrastructure, enabling proactive blocking and alerting. 3) Harden endpoint security by ensuring up-to-date anti-malware solutions capable of detecting known malware signatures and behavioral indicators associated with reconnaissance tools. 4) Conduct regular security awareness training to help employees recognize social engineering attempts that may be facilitated by information gathered through OSINT malware. 5) Apply strict access controls and network segmentation to limit the exposure of sensitive information and reduce the attack surface for reconnaissance activities. 6) Perform periodic threat hunting exercises focused on identifying stealthy malware or suspicious OSINT-related activities within the network. These steps go beyond generic advice by emphasizing integration of specific threat intelligence feeds, behavioral detection, and proactive hunting tailored to OSINT malware characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
Indicators of Compromise
- url: https://rottot.shop/mx2/pws/pvqdq929bsx_a_d_m1n_a.php
- url: https://patsgeldisadgg353.com/nmzim2vlnwi2odnh/
- domain: api.xxdync.com
- domain: utku.vps.webdock.cloud
- file: 15.223.1.140
- hash: 443
- domain: redcap.work
- url: http://45.88.105.105/e88e05dfd1bdeeb9.php
- file: 101.34.62.232
- hash: 4433
- file: 107.148.35.41
- hash: 8000
- file: 35.222.205.55
- hash: 443
- file: 47.242.0.122
- hash: 443
- file: 179.13.10.157
- hash: 8081
- file: 165.140.85.87
- hash: 12184
- file: 5.255.110.93
- hash: 2249
- file: 123.57.209.214
- hash: 80
- file: 93.179.115.130
- hash: 80
- file: 38.180.25.238
- hash: 80
- file: 123.57.75.233
- hash: 2222
- file: 190.211.254.75
- hash: 443
- file: 34.131.20.34
- hash: 443
- file: 8.210.30.189
- hash: 443
- file: 181.162.143.114
- hash: 8080
- file: 144.76.9.134
- hash: 222
- file: 198.167.199.133
- hash: 19132
- file: 65.38.121.151
- hash: 443
- file: 52.69.75.103
- hash: 80
- file: 83.217.209.11
- hash: 80
- domain: smldatacenter.com
- file: 149.104.2.160
- hash: 443
- file: 87.120.113.125
- hash: 443
- file: 158.247.242.115
- hash: 80
- file: 47.92.140.190
- hash: 443
- file: 39.105.204.209
- hash: 80
- file: 101.42.53.79
- hash: 80
- file: 47.94.80.183
- hash: 80
- file: 103.96.72.98
- hash: 8888
- file: 209.145.56.0
- hash: 6699
- file: 212.56.32.90
- hash: 80
- file: 194.87.140.165
- hash: 443
- file: 8.152.1.99
- hash: 81
- file: 47.121.204.224
- hash: 8888
- file: 49.7.54.171
- hash: 8080
- file: 60.205.234.107
- hash: 8081
- file: 39.102.209.166
- hash: 8001
- domain: sost.duckdns.org
- domain: parapetos1.duckdns.org
- file: 62.113.102.85
- hash: 443
- file: 167.172.58.134
- hash: 8080
- domain: doladowanie.app-tools.info
- file: 128.199.62.182
- hash: 4449
- file: 38.6.216.155
- hash: 80
- file: 118.25.147.206
- hash: 443
- file: 47.238.103.180
- hash: 8080
- file: 198.46.178.148
- hash: 2404
- file: 104.168.7.10
- hash: 5031
- file: 35.176.207.29
- hash: 443
- file: 89.23.100.155
- hash: 1337
- file: 103.107.105.253
- hash: 443
- domain: lifeyomi.com
- domain: xxmodkiufnsw.shop
- domain: fivejo5vt.top
- domain: onejo1vt.top
- domain: tventjo20vt.top
- domain: twojo2vt.top
- domain: threjo3vt.top
- domain: sivjo6sr.top
- domain: eightjo8sr.top
- file: 4.251.123.83
- hash: 6677
- file: 193.26.115.220
- hash: 443
- file: 47.94.80.183
- hash: 4444
- file: 195.231.58.19
- hash: 31337
- file: 8.210.6.230
- hash: 443
- file: 23.27.12.214
- hash: 8888
- file: 185.14.45.232
- hash: 443
- file: 38.242.197.33
- hash: 80
- url: http://178.215.224.252
- url: http://178.215.224.74
- url: http://178.215.224.161
- url: http://178.215.224.251
- url: http://178.215.224.65
- file: 172.67.183.250
- hash: 80
- file: 84.252.133.126
- hash: 443
- file: 118.25.147.206
- hash: 80
- file: 60.204.210.63
- hash: 80
- file: 39.100.108.16
- hash: 443
- file: 117.72.10.22
- hash: 443
- file: 118.25.142.205
- hash: 443
- file: 87.120.116.49
- hash: 80
- file: 98.66.183.110
- hash: 443
- file: 98.66.183.110
- hash: 7443
- file: 42.117.205.205
- hash: 4444
- url: https://becreativemind.com/work/original.js
- domain: becreativemind.com
- url: https://becreativemind.com/work/index.php
- url: https://becreativemind.com/work/fix.php
- url: https://becreativemind.com/work/das.php
- file: 94.141.120.6
- hash: 55123
- file: 47.113.96.6
- hash: 80
- file: 1.94.122.9
- hash: 80
- file: 192.210.228.122
- hash: 80
- file: 47.236.50.137
- hash: 80
- file: 179.60.149.4
- hash: 3333
- file: 154.44.25.189
- hash: 8888
- url: http://185.235.128.16/562c1eb14955c897.php
- file: 148.113.165.11
- hash: 4090
- file: 193.26.115.220
- hash: 80
- file: 43.135.183.120
- hash: 80
- file: 212.171.18.177
- hash: 2404
- file: 92.118.112.116
- hash: 2404
- file: 87.247.158.106
- hash: 443
- file: 192.3.95.164
- hash: 8080
- file: 181.235.132.44
- hash: 8887
- file: 193.181.35.205
- hash: 7443
- file: 190.231.88.140
- hash: 5604
- file: 84.201.158.123
- hash: 57523
- url: http://117.197.174.237:52042/mozi.m
- file: 116.196.92.13
- hash: 6667
- file: 185.141.35.22
- hash: 2955
- file: 111.90.140.65
- hash: 2404
- file: 217.195.153.118
- hash: 51000
- file: 46.246.82.11
- hash: 8080
- file: 185.222.58.240
- hash: 55615
- file: 80.76.51.190
- hash: 16465
- domain: tventjo20sr.top
- domain: tweljo12sr.top
- domain: forjo14vt.top
- domain: eightjo18sr.top
- domain: fiftjp15sr.top
- domain: forjo14sr.top
- domain: sevjoi17vt.top
- domain: sixjo16sr.top
- domain: ninjo19vt.top
- domain: sixjo16vt.top
- domain: eightjo18vt.top
- domain: tenjo10ht.top
- domain: sivjo6ht.top
- domain: tenjo10sr.top
- domain: elejoi11vt.top
- domain: fiftjp15vt.top
- domain: thirtjo13vs.top
- url: http://213.159.79.103/c619c3a3bc843eb0.php
ThreatFox IOCs for 2024-10-31
Description
ThreatFox IOCs for 2024-10-31
AI-Powered Analysis
Technical Analysis
The provided threat intelligence relates to a set of Indicators of Compromise (IOCs) published on October 31, 2024, by ThreatFox, a platform specializing in sharing threat intelligence data. The threat is categorized as malware-related, specifically within the domain of OSINT (Open Source Intelligence), suggesting that the information primarily involves data collected from publicly available sources rather than a direct vulnerability or exploit in a specific software product. No specific affected versions or products are identified, indicating that the IOCs may pertain to malware campaigns or infrastructure rather than a software flaw. The technical details indicate a moderate threat level (threatLevel: 2) with limited analysis (analysis: 1) but a relatively higher distribution score (distribution: 3), implying that the malware or associated indicators are somewhat widespread or have a notable presence in threat intelligence feeds. There are no known exploits in the wild linked to this threat at the time of publication, and no patch links or CWE identifiers are provided, which further supports the notion that this is an intelligence report on malware activity rather than a newly discovered vulnerability. The absence of specific indicators in the provided data limits the ability to detail the malware’s behavior, infection vectors, or payload specifics. However, the classification as OSINT malware suggests the threat may involve data collection, reconnaissance, or information gathering activities that could be leveraged in broader cyberattack campaigns. The TLP:white tag indicates that the information is intended for wide distribution and sharing within the cybersecurity community. Overall, this threat intelligence entry serves as a situational awareness update rather than an immediate actionable vulnerability alert.
Potential Impact
For European organizations, the impact of this malware-related threat primarily revolves around potential reconnaissance and information gathering activities that could precede more targeted attacks. Since the threat is OSINT-related malware, it may be used to collect sensitive information, such as network configurations, employee details, or other organizational data, which could facilitate subsequent intrusion attempts or social engineering campaigns. The medium severity rating suggests a moderate risk level; while direct exploitation or system compromise is not indicated, the presence of such malware could degrade confidentiality by exposing sensitive data. Integrity and availability impacts appear limited based on the available information. European organizations in sectors with high-value data or strategic importance—such as finance, critical infrastructure, government, and technology—could be more attractive targets for adversaries leveraging this malware for intelligence purposes. The lack of known exploits in the wild reduces the immediate threat of widespread damage but does not eliminate the risk of targeted reconnaissance leading to future attacks. Additionally, the distribution score implies that the malware or its indicators are somewhat prevalent, which could increase the likelihood of encountering related threats in European networks.
Mitigation Recommendations
Given the nature of this threat as OSINT-related malware with no specific vulnerabilities or exploits identified, mitigation should focus on enhancing detection and prevention of reconnaissance and data collection activities. European organizations should: 1) Implement advanced network monitoring and anomaly detection systems to identify unusual outbound traffic patterns indicative of data exfiltration or command-and-control communications. 2) Employ threat intelligence platforms that integrate ThreatFox and similar OSINT feeds to stay updated on emerging IOCs and malware infrastructure, enabling proactive blocking and alerting. 3) Harden endpoint security by ensuring up-to-date anti-malware solutions capable of detecting known malware signatures and behavioral indicators associated with reconnaissance tools. 4) Conduct regular security awareness training to help employees recognize social engineering attempts that may be facilitated by information gathered through OSINT malware. 5) Apply strict access controls and network segmentation to limit the exposure of sensitive information and reduce the attack surface for reconnaissance activities. 6) Perform periodic threat hunting exercises focused on identifying stealthy malware or suspicious OSINT-related activities within the network. These steps go beyond generic advice by emphasizing integration of specific threat intelligence feeds, behavioral detection, and proactive hunting tailored to OSINT malware characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 00c3b07f-28a0-4ba9-bde0-c1986b8ba850
- Original Timestamp
- 1730419388
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttps://rottot.shop/mx2/pws/pvqdq929bsx_a_d_m1n_a.php | LokiBot botnet C2 (confidence level: 100%) | |
urlhttps://patsgeldisadgg353.com/nmzim2vlnwi2odnh/ | Coper botnet C2 (confidence level: 100%) | |
urlhttp://45.88.105.105/e88e05dfd1bdeeb9.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://178.215.224.252 | Unknown malware botnet C2 (confidence level: 75%) | |
urlhttp://178.215.224.74 | Unknown malware botnet C2 (confidence level: 75%) | |
urlhttp://178.215.224.161 | Unknown malware botnet C2 (confidence level: 75%) | |
urlhttp://178.215.224.251 | Unknown malware botnet C2 (confidence level: 75%) | |
urlhttp://178.215.224.65 | Unknown malware botnet C2 (confidence level: 75%) | |
urlhttps://becreativemind.com/work/original.js | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://becreativemind.com/work/index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://becreativemind.com/work/fix.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://becreativemind.com/work/das.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://185.235.128.16/562c1eb14955c897.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://117.197.174.237:52042/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://213.159.79.103/c619c3a3bc843eb0.php | Stealc botnet C2 (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainapi.xxdync.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainutku.vps.webdock.cloud | Hook botnet C2 domain (confidence level: 100%) | |
domainredcap.work | MimiKatz botnet C2 domain (confidence level: 100%) | |
domainsmldatacenter.com | PlugX botnet C2 domain (confidence level: 75%) | |
domainsost.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainparapetos1.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaindoladowanie.app-tools.info | Poseidon Stealer botnet C2 domain (confidence level: 100%) | |
domainlifeyomi.com | PlugX botnet C2 domain (confidence level: 75%) | |
domainxxmodkiufnsw.shop | PlugX botnet C2 domain (confidence level: 75%) | |
domainfivejo5vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainonejo1vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintventjo20vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintwojo2vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainthrejo3vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainsivjo6sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaineightjo8sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainbecreativemind.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaintventjo20sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintweljo12sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainforjo14vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaineightjo18sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainfiftjp15sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainforjo14sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainsevjoi17vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainsixjo16sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainninjo19vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainsixjo16vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaineightjo18vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintenjo10ht.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainsivjo6ht.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintenjo10sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainelejoi11vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainfiftjp15vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainthirtjo13vs.top | CryptBot botnet C2 domain (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file15.223.1.140 | Havoc botnet C2 server (confidence level: 100%) | |
file101.34.62.232 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file107.148.35.41 | Remcos botnet C2 server (confidence level: 100%) | |
file35.222.205.55 | Sliver botnet C2 server (confidence level: 100%) | |
file47.242.0.122 | ShadowPad botnet C2 server (confidence level: 90%) | |
file179.13.10.157 | DCRat botnet C2 server (confidence level: 100%) | |
file165.140.85.87 | Crimson RAT botnet C2 server (confidence level: 100%) | |
file5.255.110.93 | BianLian botnet C2 server (confidence level: 100%) | |
file123.57.209.214 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file93.179.115.130 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file38.180.25.238 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file123.57.75.233 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file190.211.254.75 | Latrodectus botnet C2 server (confidence level: 75%) | |
file34.131.20.34 | Sliver botnet C2 server (confidence level: 100%) | |
file8.210.30.189 | ShadowPad botnet C2 server (confidence level: 90%) | |
file181.162.143.114 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file144.76.9.134 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file198.167.199.133 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file65.38.121.151 | Havoc botnet C2 server (confidence level: 100%) | |
file52.69.75.103 | Brute Ratel C4 botnet C2 server (confidence level: 100%) | |
file83.217.209.11 | Stealc botnet C2 server (confidence level: 100%) | |
file149.104.2.160 | PlugX botnet C2 server (confidence level: 90%) | |
file87.120.113.125 | Havoc botnet C2 server (confidence level: 100%) | |
file158.247.242.115 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.92.140.190 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.105.204.209 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file101.42.53.79 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.94.80.183 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.96.72.98 | Unknown malware botnet C2 server (confidence level: 100%) | |
file209.145.56.0 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file212.56.32.90 | Havoc botnet C2 server (confidence level: 100%) | |
file194.87.140.165 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.152.1.99 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.121.204.224 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file49.7.54.171 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file60.205.234.107 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.102.209.166 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file62.113.102.85 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file167.172.58.134 | Sliver botnet C2 server (confidence level: 100%) | |
file128.199.62.182 | Venom RAT botnet C2 server (confidence level: 100%) | |
file38.6.216.155 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.25.147.206 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.238.103.180 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file198.46.178.148 | Remcos botnet C2 server (confidence level: 100%) | |
file104.168.7.10 | Remcos botnet C2 server (confidence level: 100%) | |
file35.176.207.29 | Sliver botnet C2 server (confidence level: 100%) | |
file89.23.100.155 | Orcus RAT botnet C2 server (confidence level: 100%) | |
file103.107.105.253 | PlugX botnet C2 server (confidence level: 100%) | |
file4.251.123.83 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file193.26.115.220 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.94.80.183 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file195.231.58.19 | Sliver botnet C2 server (confidence level: 100%) | |
file8.210.6.230 | ShadowPad botnet C2 server (confidence level: 90%) | |
file23.27.12.214 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.14.45.232 | Unknown malware botnet C2 server (confidence level: 100%) | |
file38.242.197.33 | MooBot botnet C2 server (confidence level: 100%) | |
file172.67.183.250 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
file84.252.133.126 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.25.147.206 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file60.204.210.63 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.100.108.16 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file117.72.10.22 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.25.142.205 | Sliver botnet C2 server (confidence level: 100%) | |
file87.120.116.49 | Hook botnet C2 server (confidence level: 100%) | |
file98.66.183.110 | Havoc botnet C2 server (confidence level: 100%) | |
file98.66.183.110 | Havoc botnet C2 server (confidence level: 100%) | |
file42.117.205.205 | Orcus RAT botnet C2 server (confidence level: 100%) | |
file94.141.120.6 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file47.113.96.6 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file1.94.122.9 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file192.210.228.122 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.236.50.137 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file179.60.149.4 | Sliver botnet C2 server (confidence level: 100%) | |
file154.44.25.189 | Unknown malware botnet C2 server (confidence level: 100%) | |
file148.113.165.11 | Remcos botnet C2 server (confidence level: 75%) | |
file193.26.115.220 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.135.183.120 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file212.171.18.177 | Remcos botnet C2 server (confidence level: 100%) | |
file92.118.112.116 | Remcos botnet C2 server (confidence level: 100%) | |
file87.247.158.106 | Remcos botnet C2 server (confidence level: 100%) | |
file192.3.95.164 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file181.235.132.44 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file193.181.35.205 | Unknown malware botnet C2 server (confidence level: 100%) | |
file190.231.88.140 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file84.201.158.123 | BianLian botnet C2 server (confidence level: 100%) | |
file116.196.92.13 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.141.35.22 | DarkComet botnet C2 server (confidence level: 100%) | |
file111.90.140.65 | Remcos botnet C2 server (confidence level: 100%) | |
file217.195.153.118 | Sliver botnet C2 server (confidence level: 100%) | |
file46.246.82.11 | DCRat botnet C2 server (confidence level: 100%) | |
file185.222.58.240 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file80.76.51.190 | Remcos botnet C2 server (confidence level: 75%) |
Hash
Value | Description | Copy |
---|---|---|
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash4433 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8000 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash8081 | DCRat botnet C2 server (confidence level: 100%) | |
hash12184 | Crimson RAT botnet C2 server (confidence level: 100%) | |
hash2249 | BianLian botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2222 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 75%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash8080 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash222 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash19132 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | Brute Ratel C4 botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash443 | PlugX botnet C2 server (confidence level: 90%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash6699 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash81 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8001 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Sliver botnet C2 server (confidence level: 100%) | |
hash4449 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash5031 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash1337 | Orcus RAT botnet C2 server (confidence level: 100%) | |
hash443 | PlugX botnet C2 server (confidence level: 100%) | |
hash6677 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4444 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash80 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash7443 | Havoc botnet C2 server (confidence level: 100%) | |
hash4444 | Orcus RAT botnet C2 server (confidence level: 100%) | |
hash55123 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash3333 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4090 | Remcos botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Remcos botnet C2 server (confidence level: 100%) | |
hash8080 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8887 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash5604 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash57523 | BianLian botnet C2 server (confidence level: 100%) | |
hash6667 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2955 | DarkComet botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash51000 | Sliver botnet C2 server (confidence level: 100%) | |
hash8080 | DCRat botnet C2 server (confidence level: 100%) | |
hash55615 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash16465 | Remcos botnet C2 server (confidence level: 75%) |
Threat ID: 682b7baad3ddd8cef2ea6b0c
Added to database: 5/19/2025, 6:42:50 PM
Last enriched: 6/18/2025, 7:04:53 PM
Last updated: 7/25/2025, 10:46:55 PM
Views: 9
Related Threats
From ClickFix to Command: A Full PowerShell Attack Chain
MediumNorth Korean Group ScarCruft Expands From Spying to Ransomware Attacks
MediumMedusaLocker ransomware group is looking for pentesters
MediumThreatFox IOCs for 2025-08-10
MediumThreatFox IOCs for 2025-08-09
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.