ThreatFox IOCs for 2024-11-26
ThreatFox IOCs for 2024-11-26
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2024-11-26 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data appears to be a collection of threat intelligence artifacts rather than a description of a specific vulnerability or exploit. The threat level is indicated as medium, with no known exploits in the wild and no affected software versions or patches available. The absence of CWE identifiers and technical details suggests this is an intelligence feed entry summarizing observed malicious activity patterns or payload delivery mechanisms rather than a newly discovered vulnerability or active exploit campaign. The threat is tagged with TLP:WHITE, indicating it is intended for wide distribution and sharing. Overall, this entry serves as a situational awareness update for security teams to monitor relevant indicators and network behaviors associated with malware payload delivery, but it does not describe a direct exploitable vulnerability or active attack vector by itself.
Potential Impact
For European organizations, the impact of this threat intelligence update is primarily in enhancing detection and response capabilities rather than immediate risk from a new exploit. Since no specific affected products or vulnerabilities are identified, the direct operational impact is limited. However, the presence of payload delivery and network activity indicators could signal ongoing or emerging malware campaigns that may target European networks. Organizations relying on OSINT feeds like ThreatFox can leverage these IOCs to improve their threat hunting and incident response processes. The medium severity suggests a moderate risk level, emphasizing the importance of maintaining robust network monitoring and malware detection controls. Without concrete exploit details, the impact is more about preparedness and situational awareness than immediate compromise or data loss.
Mitigation Recommendations
To mitigate risks associated with the malware-related IOCs and payload delivery activities described, European organizations should: 1) Integrate ThreatFox and similar OSINT feeds into their Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to automate IOC matching and alerting. 2) Enhance network traffic monitoring to detect anomalous payload delivery patterns, including unusual outbound connections or command-and-control communications. 3) Conduct regular threat hunting exercises using the provided IOCs to identify potential infections early. 4) Maintain up-to-date endpoint protection solutions capable of detecting and blocking known malware payloads. 5) Train security teams to interpret OSINT feed updates and correlate them with internal telemetry for proactive defense. 6) Since no patches are available, focus on detection and containment rather than remediation of a specific vulnerability. 7) Implement strict network segmentation and least privilege principles to limit malware propagation if an infection occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: electrum-sol.org
- domain: www.electrum-sol.org
- domain: electrum-doge.org
- domain: www.electrum-sol.org
- hash: 220c13ed547eefe13afc446bbd84f5fe8790dd9d109905f583f5ffb97520a872
- hash: 2d36c1e2dbd05433e3fadb7bd6dca2e01e0ba895e161f07218197d9712d35648
- url: http://93.123.85.37/pages/login.php
- url: http://www.falamucci.com/hello_a.php
- file: 45.149.241.168
- hash: 5337
- domain: naturealmikaly.sytes.net
- file: 135.181.185.254
- hash: 4449
- url: http://192.210.141.106:8888/supershell/login/
- domain: crypto-way.pro
- domain: pozza.cyou
- domain: nastictac.com
- url: https://nastictac.com/365h.js
- url: https://peacefulmind.shop/api
- file: 39.107.136.241
- hash: 5555
- file: 3.253.95.83
- hash: 80
- file: 43.226.125.42
- hash: 10443
- file: 47.108.159.178
- hash: 8888
- file: 149.88.75.159
- hash: 80
- file: 180.184.34.123
- hash: 80
- file: 34.92.41.65
- hash: 8088
- file: 104.168.148.234
- hash: 80
- file: 106.53.16.31
- hash: 443
- file: 47.104.181.208
- hash: 8080
- file: 47.92.120.111
- hash: 443
- file: 1.94.52.236
- hash: 8080
- file: 124.220.103.17
- hash: 8080
- file: 47.94.199.241
- hash: 80
- file: 142.11.244.79
- hash: 80
- file: 149.88.75.131
- hash: 80
- file: 82.156.190.69
- hash: 80
- url: http://ct10906.tw1.ru/fe82f542.php
- file: 103.186.117.182
- hash: 7788
- url: https://blaekindustry.com/work/original.js
- domain: blaekindustry.com
- url: https://blaekindustry.com/work/index.php
- url: https://blaekindustry.com/work/fix2.php
- url: https://blaekindustry.com/work/xxx.zip
- url: https://blade-govern.sbs
- url: https://blade-govern.sbs/api
- url: https://disobey-curly.sbs
- url: https://disobey-curly.sbs/api
- url: https://frogs-severz.sbs
- url: https://leg-sate-boat.sbs
- url: https://motion-treesz.sbs
- url: https://motion-treesz.sbs/api
- url: https://occupy-blushi.sbs
- url: https://occupy-blushi.sbs/api
- url: https://powerful-avoids.sbs
- url: https://powerful-avoids.sbs/api
- url: https://property-imper.sbs
- url: https://story-tense-faz.sbs
- url: https://story-tense-faz.sbs/api
- url: https://www.syofi.com/work/original.js
- url: https://www.syofi.com/work/das.php
- url: https://www.syofi.com/work/xxx.zip
- url: https://www.syofi.com/work/fix2.php
- url: https://www.syofi.com/work/index.php
- domain: www.syofi.com
- domain: bsfchile.com
- domain: freeaccessclinic.com
- domain: mytlcjobs.com
- url: https://assetoutdoor.shop
- file: 35.157.111.131
- hash: 12891
- file: 3.68.56.232
- hash: 12891
- file: 208.64.33.69
- hash: 6720
- file: 45.125.66.215
- hash: 9999
- file: 45.125.66.215
- hash: 3333
- file: 103.253.43.208
- hash: 443
- file: 103.253.43.20
- hash: 443
ThreatFox IOCs for 2024-11-26
Description
ThreatFox IOCs for 2024-11-26
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2024-11-26 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data appears to be a collection of threat intelligence artifacts rather than a description of a specific vulnerability or exploit. The threat level is indicated as medium, with no known exploits in the wild and no affected software versions or patches available. The absence of CWE identifiers and technical details suggests this is an intelligence feed entry summarizing observed malicious activity patterns or payload delivery mechanisms rather than a newly discovered vulnerability or active exploit campaign. The threat is tagged with TLP:WHITE, indicating it is intended for wide distribution and sharing. Overall, this entry serves as a situational awareness update for security teams to monitor relevant indicators and network behaviors associated with malware payload delivery, but it does not describe a direct exploitable vulnerability or active attack vector by itself.
Potential Impact
For European organizations, the impact of this threat intelligence update is primarily in enhancing detection and response capabilities rather than immediate risk from a new exploit. Since no specific affected products or vulnerabilities are identified, the direct operational impact is limited. However, the presence of payload delivery and network activity indicators could signal ongoing or emerging malware campaigns that may target European networks. Organizations relying on OSINT feeds like ThreatFox can leverage these IOCs to improve their threat hunting and incident response processes. The medium severity suggests a moderate risk level, emphasizing the importance of maintaining robust network monitoring and malware detection controls. Without concrete exploit details, the impact is more about preparedness and situational awareness than immediate compromise or data loss.
Mitigation Recommendations
To mitigate risks associated with the malware-related IOCs and payload delivery activities described, European organizations should: 1) Integrate ThreatFox and similar OSINT feeds into their Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to automate IOC matching and alerting. 2) Enhance network traffic monitoring to detect anomalous payload delivery patterns, including unusual outbound connections or command-and-control communications. 3) Conduct regular threat hunting exercises using the provided IOCs to identify potential infections early. 4) Maintain up-to-date endpoint protection solutions capable of detecting and blocking known malware payloads. 5) Train security teams to interpret OSINT feed updates and correlate them with internal telemetry for proactive defense. 6) Since no patches are available, focus on detection and containment rather than remediation of a specific vulnerability. 7) Implement strict network segmentation and least privilege principles to limit malware propagation if an infection occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- ea98e1ec-5e67-4f74-a150-f4501e226951
- Original Timestamp
- 1732665789
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainelectrum-sol.org | Unknown malware payload delivery domain (confidence level: 100%) | |
domainwww.electrum-sol.org | Unknown malware payload delivery domain (confidence level: 100%) | |
domainelectrum-doge.org | Unknown malware payload delivery domain (confidence level: 100%) | |
domainwww.electrum-sol.org | Unknown malware payload delivery domain (confidence level: 100%) | |
domainnaturealmikaly.sytes.net | Loki Password Stealer (PWS) botnet C2 domain (confidence level: 75%) | |
domaincrypto-way.pro | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpozza.cyou | Vidar botnet C2 domain (confidence level: 100%) | |
domainnastictac.com | FAKEUPDATES payload delivery domain (confidence level: 75%) | |
domainblaekindustry.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainwww.syofi.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainbsfchile.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainfreeaccessclinic.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmytlcjobs.com | FAKEUPDATES payload delivery domain (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash220c13ed547eefe13afc446bbd84f5fe8790dd9d109905f583f5ffb97520a872 | Unknown malware payload (confidence level: 100%) | |
hash2d36c1e2dbd05433e3fadb7bd6dca2e01e0ba895e161f07218197d9712d35648 | Unknown malware payload (confidence level: 100%) | |
hash5337 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
hash4449 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash5555 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash10443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8088 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash7788 | NjRAT botnet C2 server (confidence level: 75%) | |
hash12891 | NjRAT botnet C2 server (confidence level: 75%) | |
hash12891 | NjRAT botnet C2 server (confidence level: 75%) | |
hash6720 | Remcos botnet C2 server (confidence level: 100%) | |
hash9999 | Mirai botnet C2 server (confidence level: 100%) | |
hash3333 | Mirai botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttp://93.123.85.37/pages/login.php | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://www.falamucci.com/hello_a.php | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://192.210.141.106:8888/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://nastictac.com/365h.js | FAKEUPDATES payload delivery URL (confidence level: 75%) | |
urlhttps://peacefulmind.shop/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://ct10906.tw1.ru/fe82f542.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://blaekindustry.com/work/original.js | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://blaekindustry.com/work/index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://blaekindustry.com/work/fix2.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://blaekindustry.com/work/xxx.zip | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://blade-govern.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://blade-govern.sbs/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://disobey-curly.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://disobey-curly.sbs/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://frogs-severz.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://leg-sate-boat.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://motion-treesz.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://motion-treesz.sbs/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://occupy-blushi.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://occupy-blushi.sbs/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://powerful-avoids.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://powerful-avoids.sbs/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://property-imper.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://story-tense-faz.sbs | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://story-tense-faz.sbs/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://www.syofi.com/work/original.js | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://www.syofi.com/work/das.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://www.syofi.com/work/xxx.zip | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://www.syofi.com/work/fix2.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://www.syofi.com/work/index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://assetoutdoor.shop | FAKEUPDATES payload delivery URL (confidence level: 75%) |
File
Value | Description | Copy |
---|---|---|
file45.149.241.168 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
file135.181.185.254 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file39.107.136.241 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file3.253.95.83 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.226.125.42 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.108.159.178 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file149.88.75.159 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file180.184.34.123 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file34.92.41.65 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file104.168.148.234 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file106.53.16.31 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.104.181.208 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.92.120.111 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file1.94.52.236 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.220.103.17 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.94.199.241 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file142.11.244.79 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file149.88.75.131 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file82.156.190.69 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.186.117.182 | NjRAT botnet C2 server (confidence level: 75%) | |
file35.157.111.131 | NjRAT botnet C2 server (confidence level: 75%) | |
file3.68.56.232 | NjRAT botnet C2 server (confidence level: 75%) | |
file208.64.33.69 | Remcos botnet C2 server (confidence level: 100%) | |
file45.125.66.215 | Mirai botnet C2 server (confidence level: 100%) | |
file45.125.66.215 | Mirai botnet C2 server (confidence level: 100%) | |
file103.253.43.208 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.253.43.20 | Cobalt Strike botnet C2 server (confidence level: 100%) |
Threat ID: 68367c99182aa0cae2323e5d
Added to database: 5/28/2025, 3:01:45 AM
Last enriched: 6/27/2025, 10:36:16 AM
Last updated: 8/14/2025, 7:19:20 AM
Views: 13
Related Threats
ThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumKawabunga, Dude, You've Been Ransomed!
MediumERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.