Skip to main content

ThreatFox IOCs for 2024-11-26

Medium
Published: Tue Nov 26 2024 (11/26/2024, 00:00:00 UTC)
Source: ThreatFox MISP Feed
Vendor/Project: type
Product: osint

Description

ThreatFox IOCs for 2024-11-26

AI-Powered Analysis

AILast updated: 06/27/2025, 10:36:16 UTC

Technical Analysis

The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2024-11-26 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data appears to be a collection of threat intelligence artifacts rather than a description of a specific vulnerability or exploit. The threat level is indicated as medium, with no known exploits in the wild and no affected software versions or patches available. The absence of CWE identifiers and technical details suggests this is an intelligence feed entry summarizing observed malicious activity patterns or payload delivery mechanisms rather than a newly discovered vulnerability or active exploit campaign. The threat is tagged with TLP:WHITE, indicating it is intended for wide distribution and sharing. Overall, this entry serves as a situational awareness update for security teams to monitor relevant indicators and network behaviors associated with malware payload delivery, but it does not describe a direct exploitable vulnerability or active attack vector by itself.

Potential Impact

For European organizations, the impact of this threat intelligence update is primarily in enhancing detection and response capabilities rather than immediate risk from a new exploit. Since no specific affected products or vulnerabilities are identified, the direct operational impact is limited. However, the presence of payload delivery and network activity indicators could signal ongoing or emerging malware campaigns that may target European networks. Organizations relying on OSINT feeds like ThreatFox can leverage these IOCs to improve their threat hunting and incident response processes. The medium severity suggests a moderate risk level, emphasizing the importance of maintaining robust network monitoring and malware detection controls. Without concrete exploit details, the impact is more about preparedness and situational awareness than immediate compromise or data loss.

Mitigation Recommendations

To mitigate risks associated with the malware-related IOCs and payload delivery activities described, European organizations should: 1) Integrate ThreatFox and similar OSINT feeds into their Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to automate IOC matching and alerting. 2) Enhance network traffic monitoring to detect anomalous payload delivery patterns, including unusual outbound connections or command-and-control communications. 3) Conduct regular threat hunting exercises using the provided IOCs to identify potential infections early. 4) Maintain up-to-date endpoint protection solutions capable of detecting and blocking known malware payloads. 5) Train security teams to interpret OSINT feed updates and correlate them with internal telemetry for proactive defense. 6) Since no patches are available, focus on detection and containment rather than remediation of a specific vulnerability. 7) Implement strict network segmentation and least privilege principles to limit malware propagation if an infection occurs.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
1
Distribution
3
Uuid
ea98e1ec-5e67-4f74-a150-f4501e226951
Original Timestamp
1732665789

Indicators of Compromise

Domain

ValueDescriptionCopy
domainelectrum-sol.org
Unknown malware payload delivery domain (confidence level: 100%)
domainwww.electrum-sol.org
Unknown malware payload delivery domain (confidence level: 100%)
domainelectrum-doge.org
Unknown malware payload delivery domain (confidence level: 100%)
domainwww.electrum-sol.org
Unknown malware payload delivery domain (confidence level: 100%)
domainnaturealmikaly.sytes.net
Loki Password Stealer (PWS) botnet C2 domain (confidence level: 75%)
domaincrypto-way.pro
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainpozza.cyou
Vidar botnet C2 domain (confidence level: 100%)
domainnastictac.com
FAKEUPDATES payload delivery domain (confidence level: 75%)
domainblaekindustry.com
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainwww.syofi.com
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainbsfchile.com
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainfreeaccessclinic.com
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainmytlcjobs.com
FAKEUPDATES payload delivery domain (confidence level: 100%)

Hash

ValueDescriptionCopy
hash220c13ed547eefe13afc446bbd84f5fe8790dd9d109905f583f5ffb97520a872
Unknown malware payload (confidence level: 100%)
hash2d36c1e2dbd05433e3fadb7bd6dca2e01e0ba895e161f07218197d9712d35648
Unknown malware payload (confidence level: 100%)
hash5337
Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%)
hash4449
AsyncRAT botnet C2 server (confidence level: 100%)
hash5555
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash10443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8888
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8088
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8080
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8080
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8080
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash7788
NjRAT botnet C2 server (confidence level: 75%)
hash12891
NjRAT botnet C2 server (confidence level: 75%)
hash12891
NjRAT botnet C2 server (confidence level: 75%)
hash6720
Remcos botnet C2 server (confidence level: 100%)
hash9999
Mirai botnet C2 server (confidence level: 100%)
hash3333
Mirai botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)

Url

ValueDescriptionCopy
urlhttp://93.123.85.37/pages/login.php
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://www.falamucci.com/hello_a.php
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://192.210.141.106:8888/supershell/login/
Unknown malware botnet C2 (confidence level: 100%)
urlhttps://nastictac.com/365h.js
FAKEUPDATES payload delivery URL (confidence level: 75%)
urlhttps://peacefulmind.shop/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttp://ct10906.tw1.ru/fe82f542.php
DCRat botnet C2 (confidence level: 100%)
urlhttps://blaekindustry.com/work/original.js
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://blaekindustry.com/work/index.php
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://blaekindustry.com/work/fix2.php
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://blaekindustry.com/work/xxx.zip
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://blade-govern.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://blade-govern.sbs/api
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://disobey-curly.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://disobey-curly.sbs/api
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://frogs-severz.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://leg-sate-boat.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://motion-treesz.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://motion-treesz.sbs/api
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://occupy-blushi.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://occupy-blushi.sbs/api
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://powerful-avoids.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://powerful-avoids.sbs/api
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://property-imper.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://story-tense-faz.sbs
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://story-tense-faz.sbs/api
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttps://www.syofi.com/work/original.js
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://www.syofi.com/work/das.php
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://www.syofi.com/work/xxx.zip
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://www.syofi.com/work/fix2.php
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://www.syofi.com/work/index.php
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://assetoutdoor.shop
FAKEUPDATES payload delivery URL (confidence level: 75%)

File

ValueDescriptionCopy
file45.149.241.168
Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%)
file135.181.185.254
AsyncRAT botnet C2 server (confidence level: 100%)
file39.107.136.241
Cobalt Strike botnet C2 server (confidence level: 100%)
file3.253.95.83
Cobalt Strike botnet C2 server (confidence level: 100%)
file43.226.125.42
Cobalt Strike botnet C2 server (confidence level: 100%)
file47.108.159.178
Cobalt Strike botnet C2 server (confidence level: 100%)
file149.88.75.159
Cobalt Strike botnet C2 server (confidence level: 100%)
file180.184.34.123
Cobalt Strike botnet C2 server (confidence level: 100%)
file34.92.41.65
Cobalt Strike botnet C2 server (confidence level: 100%)
file104.168.148.234
Cobalt Strike botnet C2 server (confidence level: 100%)
file106.53.16.31
Cobalt Strike botnet C2 server (confidence level: 100%)
file47.104.181.208
Cobalt Strike botnet C2 server (confidence level: 100%)
file47.92.120.111
Cobalt Strike botnet C2 server (confidence level: 100%)
file1.94.52.236
Cobalt Strike botnet C2 server (confidence level: 100%)
file124.220.103.17
Cobalt Strike botnet C2 server (confidence level: 100%)
file47.94.199.241
Cobalt Strike botnet C2 server (confidence level: 100%)
file142.11.244.79
Cobalt Strike botnet C2 server (confidence level: 100%)
file149.88.75.131
Cobalt Strike botnet C2 server (confidence level: 100%)
file82.156.190.69
Cobalt Strike botnet C2 server (confidence level: 100%)
file103.186.117.182
NjRAT botnet C2 server (confidence level: 75%)
file35.157.111.131
NjRAT botnet C2 server (confidence level: 75%)
file3.68.56.232
NjRAT botnet C2 server (confidence level: 75%)
file208.64.33.69
Remcos botnet C2 server (confidence level: 100%)
file45.125.66.215
Mirai botnet C2 server (confidence level: 100%)
file45.125.66.215
Mirai botnet C2 server (confidence level: 100%)
file103.253.43.208
Cobalt Strike botnet C2 server (confidence level: 100%)
file103.253.43.20
Cobalt Strike botnet C2 server (confidence level: 100%)

Threat ID: 68367c99182aa0cae2323e5d

Added to database: 5/28/2025, 3:01:45 AM

Last enriched: 6/27/2025, 10:36:16 AM

Last updated: 8/14/2025, 7:19:20 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats