Skip to main content

ThreatFox IOCs for 2025-01-01

Medium
Published: Wed Jan 01 2025 (01/01/2025, 00:00:00 UTC)
Source: ThreatFox MISP Feed
Vendor/Project: type
Product: osint

Description

ThreatFox IOCs for 2025-01-01

AI-Powered Analysis

AILast updated: 06/27/2025, 10:50:26 UTC

Technical Analysis

The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2025-01-01 by the ThreatFox MISP Feed, categorized under malware-related threat intelligence. The threat is classified primarily as OSINT (Open Source Intelligence) related, involving network activity and payload delivery. However, the details are sparse: there are no specific affected product versions, no known exploits in the wild, no patches available, and no concrete technical details beyond a low threat level (2 out of an unspecified scale), minimal analysis (1), and moderate distribution (3). The absence of CWEs (Common Weakness Enumerations) and indicators suggests this is a general intelligence update rather than a detailed vulnerability or active exploit. The threat appears to be informational, focusing on network activity patterns and payload delivery mechanisms, but without concrete evidence of active exploitation or direct impact. The medium severity tag likely reflects the potential for future exploitation or the presence of suspicious activity rather than an immediate critical risk. Overall, this appears to be a preparatory or monitoring stage threat intelligence update rather than a direct, active malware campaign or vulnerability exploitation.

Potential Impact

For European organizations, the impact of this threat as currently described is limited due to the lack of specific exploit details or active attacks. The medium severity suggests a moderate risk level, potentially indicating that the threat actors might be preparing payload delivery mechanisms or network-based attacks that could evolve. If these IOCs relate to malware delivery or network intrusion attempts, organizations could face risks including unauthorized access, data exfiltration, or disruption of services if the threat matures. However, without known exploits in the wild or specific affected software versions, the immediate operational impact is low. European entities with extensive network infrastructure and those relying on OSINT tools or open-source intelligence platforms might need to monitor for suspicious network activity and payload delivery attempts. The lack of patches or fixes implies that mitigation will rely on detection and network defense rather than software updates.

Mitigation Recommendations

Given the nature of this threat intelligence update, European organizations should focus on enhancing their detection and monitoring capabilities. Specific recommendations include: 1) Integrate the latest ThreatFox IOCs into existing Security Information and Event Management (SIEM) systems and Intrusion Detection/Prevention Systems (IDS/IPS) to improve detection of suspicious network activity and payload delivery attempts. 2) Conduct network traffic analysis to identify anomalous patterns consistent with the described threat level and distribution. 3) Employ threat hunting exercises focused on the identified TLP:white tagged indicators, even if none are currently provided, to proactively identify potential compromises. 4) Maintain strict network segmentation and enforce least privilege access to limit potential lateral movement if payload delivery occurs. 5) Ensure endpoint protection platforms are updated and configured to detect and block known malware behaviors associated with payload delivery. 6) Educate security teams on the evolving nature of OSINT-related threats to improve response readiness. Since no patches are available, reliance on detection, network hygiene, and incident response preparedness is critical.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
1
Distribution
3
Uuid
ed5fff99-4c23-4da4-813b-320c1bf4eb97
Original Timestamp
1735776186

Indicators of Compromise

File

ValueDescriptionCopy
file208.115.220.58
AsyncRAT botnet C2 server (confidence level: 100%)
file5.39.43.50
NjRAT botnet C2 server (confidence level: 75%)
file45.137.201.181
NjRAT botnet C2 server (confidence level: 75%)
file154.37.215.204
Cobalt Strike botnet C2 server (confidence level: 100%)
file107.151.240.142
Cobalt Strike botnet C2 server (confidence level: 100%)
file154.37.215.204
Unknown malware botnet C2 server (confidence level: 100%)
file209.38.217.87
Unknown malware botnet C2 server (confidence level: 100%)
file210.89.45.122
Unknown malware botnet C2 server (confidence level: 100%)
file134.175.121.153
Meterpreter botnet C2 server (confidence level: 100%)
file34.208.255.157
Cobalt Strike botnet C2 server (confidence level: 100%)
file1.94.19.136
Cobalt Strike botnet C2 server (confidence level: 100%)
file46.246.84.7
Remcos botnet C2 server (confidence level: 100%)
file1.14.104.62
Unknown malware botnet C2 server (confidence level: 100%)
file88.201.69.136
AsyncRAT botnet C2 server (confidence level: 100%)
file198.23.227.175
AsyncRAT botnet C2 server (confidence level: 100%)
file86.124.168.255
FAKEUPDATES botnet C2 server (confidence level: 100%)
file185.243.114.91
Meduza Stealer botnet C2 server (confidence level: 100%)
file209.151.153.81
MimiKatz botnet C2 server (confidence level: 100%)
file193.31.28.181
Quasar RAT botnet C2 server (confidence level: 100%)
file101.201.54.74
Cobalt Strike botnet C2 server (confidence level: 100%)
file38.242.146.249
AsyncRAT botnet C2 server (confidence level: 100%)
file94.158.245.27
MooBot botnet C2 server (confidence level: 100%)
file124.221.38.163
Unknown malware botnet C2 server (confidence level: 100%)
file20.52.4.154
Unknown malware botnet C2 server (confidence level: 100%)
file18.144.21.154
Unknown malware botnet C2 server (confidence level: 100%)
file94.154.33.140
Unknown malware botnet C2 server (confidence level: 100%)
file89.250.65.37
Unknown malware botnet C2 server (confidence level: 100%)
file31.7.35.14
Unknown malware botnet C2 server (confidence level: 100%)
file191.101.241.240
Unknown malware botnet C2 server (confidence level: 100%)
file154.53.39.85
Unknown malware botnet C2 server (confidence level: 100%)
file88.99.170.132
Unknown malware botnet C2 server (confidence level: 100%)
file18.135.30.45
Unknown malware botnet C2 server (confidence level: 100%)
file45.76.176.78
Cobalt Strike botnet C2 server (confidence level: 100%)
file206.72.197.102
Remcos botnet C2 server (confidence level: 100%)
file117.72.92.74
Cobalt Strike botnet C2 server (confidence level: 100%)
file110.41.4.69
Cobalt Strike botnet C2 server (confidence level: 100%)
file146.190.91.121
Unknown malware botnet C2 server (confidence level: 100%)
file134.175.248.97
Cobalt Strike botnet C2 server (confidence level: 100%)
file150.158.89.168
Cobalt Strike botnet C2 server (confidence level: 100%)
file49.232.133.108
Cobalt Strike botnet C2 server (confidence level: 100%)
file8.147.234.137
Cobalt Strike botnet C2 server (confidence level: 100%)
file34.132.16.207
Unknown malware botnet C2 server (confidence level: 100%)
file186.32.225.34
MimiKatz botnet C2 server (confidence level: 100%)
file45.141.26.234
XWorm botnet C2 server (confidence level: 100%)
file185.222.57.76
RedLine Stealer botnet C2 server (confidence level: 100%)
file147.185.221.24
XenoRAT botnet C2 server (confidence level: 100%)
file150.158.121.15
Cobalt Strike botnet C2 server (confidence level: 100%)
file43.134.58.195
Cobalt Strike botnet C2 server (confidence level: 100%)
file46.246.86.16
Remcos botnet C2 server (confidence level: 100%)
file101.99.75.173
Remcos botnet C2 server (confidence level: 100%)
file91.107.146.68
Hook botnet C2 server (confidence level: 100%)
file91.107.146.68
Hook botnet C2 server (confidence level: 100%)
file91.107.146.68
Hook botnet C2 server (confidence level: 100%)
file188.79.46.203
Havoc botnet C2 server (confidence level: 100%)
file195.133.51.144
Havoc botnet C2 server (confidence level: 100%)
file142.93.234.59
BianLian botnet C2 server (confidence level: 100%)
file45.93.20.67
Meduza Stealer payload delivery server (confidence level: 100%)
file147.45.44.42
Rhadamanthys botnet C2 server (confidence level: 50%)
file147.45.44.42
Rhadamanthys botnet C2 server (confidence level: 50%)
file154.216.19.63
Rhadamanthys botnet C2 server (confidence level: 50%)
file154.216.19.63
Rhadamanthys botnet C2 server (confidence level: 50%)
file63.32.99.39
NetSupportManager RAT botnet C2 server (confidence level: 50%)
file157.20.182.8
AsyncRAT botnet C2 server (confidence level: 50%)
file198.23.227.140
AsyncRAT botnet C2 server (confidence level: 50%)
file154.91.34.250
RedLine Stealer botnet C2 server (confidence level: 100%)
file23.94.37.42
Mirai botnet C2 server (confidence level: 75%)
file154.39.239.95
ValleyRAT botnet C2 server (confidence level: 100%)
file3.22.61.147
Cobalt Strike botnet C2 server (confidence level: 100%)
file192.121.163.53
Sliver botnet C2 server (confidence level: 100%)
file5.253.59.167
Sliver botnet C2 server (confidence level: 100%)
file5.175.237.184
Sliver botnet C2 server (confidence level: 100%)
file45.147.26.131
Unknown malware botnet C2 server (confidence level: 100%)
file20.93.23.234
Unknown malware botnet C2 server (confidence level: 100%)
file165.232.65.107
Unknown malware botnet C2 server (confidence level: 100%)
file185.177.239.131
Hook botnet C2 server (confidence level: 100%)
file13.231.139.33
NetSupportManager RAT botnet C2 server (confidence level: 100%)
file173.199.70.18
Unknown malware botnet C2 server (confidence level: 100%)
file23.94.247.46
Unknown malware botnet C2 server (confidence level: 100%)
file14.241.100.39
Chaos botnet C2 server (confidence level: 100%)
file154.216.17.241
BianLian botnet C2 server (confidence level: 100%)
file83.136.208.202
Remcos botnet C2 server (confidence level: 100%)
file170.205.31.90
Remcos botnet C2 server (confidence level: 100%)
file69.166.230.200
AsyncRAT botnet C2 server (confidence level: 100%)
file187.209.210.95
Quasar RAT botnet C2 server (confidence level: 100%)
file207.32.218.35
AsyncRAT botnet C2 server (confidence level: 100%)

Hash

ValueDescriptionCopy
hash4449
AsyncRAT botnet C2 server (confidence level: 100%)
hash5234
NjRAT botnet C2 server (confidence level: 75%)
hash511
NjRAT botnet C2 server (confidence level: 75%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash5555
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8888
Unknown malware botnet C2 server (confidence level: 100%)
hash443
Unknown malware botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash5045
Meterpreter botnet C2 server (confidence level: 100%)
hash1443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash65533
Cobalt Strike botnet C2 server (confidence level: 100%)
hash2404
Remcos botnet C2 server (confidence level: 100%)
hash8888
Unknown malware botnet C2 server (confidence level: 100%)
hash443
AsyncRAT botnet C2 server (confidence level: 100%)
hash7710
AsyncRAT botnet C2 server (confidence level: 100%)
hash443
FAKEUPDATES botnet C2 server (confidence level: 100%)
hash80
Meduza Stealer botnet C2 server (confidence level: 100%)
hash8080
MimiKatz botnet C2 server (confidence level: 100%)
hash4004
Quasar RAT botnet C2 server (confidence level: 100%)
hash2222
Cobalt Strike botnet C2 server (confidence level: 100%)
hash90
AsyncRAT botnet C2 server (confidence level: 100%)
hash80
MooBot botnet C2 server (confidence level: 100%)
hash60000
Unknown malware botnet C2 server (confidence level: 100%)
hash3331
Unknown malware botnet C2 server (confidence level: 100%)
hash587
Unknown malware botnet C2 server (confidence level: 100%)
hash3333
Unknown malware botnet C2 server (confidence level: 100%)
hash3333
Unknown malware botnet C2 server (confidence level: 100%)
hash443
Unknown malware botnet C2 server (confidence level: 100%)
hash3333
Unknown malware botnet C2 server (confidence level: 100%)
hash3333
Unknown malware botnet C2 server (confidence level: 100%)
hash1920
Unknown malware botnet C2 server (confidence level: 100%)
hash4204
Unknown malware botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash30486
Remcos botnet C2 server (confidence level: 100%)
hash5555
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8081
Cobalt Strike botnet C2 server (confidence level: 100%)
hash46901
Unknown malware botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash55443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash50050
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8999
Cobalt Strike botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash8080
MimiKatz botnet C2 server (confidence level: 100%)
hash443
XWorm botnet C2 server (confidence level: 100%)
hash55615
RedLine Stealer botnet C2 server (confidence level: 100%)
hash47517
XenoRAT botnet C2 server (confidence level: 100%)
hash62000
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8080
Cobalt Strike botnet C2 server (confidence level: 100%)
hash2404
Remcos botnet C2 server (confidence level: 100%)
hash80
Remcos botnet C2 server (confidence level: 100%)
hash8089
Hook botnet C2 server (confidence level: 100%)
hash80
Hook botnet C2 server (confidence level: 100%)
hash8082
Hook botnet C2 server (confidence level: 100%)
hash443
Havoc botnet C2 server (confidence level: 100%)
hash80
Havoc botnet C2 server (confidence level: 100%)
hash443
BianLian botnet C2 server (confidence level: 100%)
hash80
Meduza Stealer payload delivery server (confidence level: 100%)
hash1488
Rhadamanthys botnet C2 server (confidence level: 50%)
hash2001
Rhadamanthys botnet C2 server (confidence level: 50%)
hash7290
Rhadamanthys botnet C2 server (confidence level: 50%)
hash443
Rhadamanthys botnet C2 server (confidence level: 50%)
hash32764
NetSupportManager RAT botnet C2 server (confidence level: 50%)
hash1337
AsyncRAT botnet C2 server (confidence level: 50%)
hash8181
AsyncRAT botnet C2 server (confidence level: 50%)
hash14555
RedLine Stealer botnet C2 server (confidence level: 100%)
hash2601
Mirai botnet C2 server (confidence level: 75%)
hash1445
ValleyRAT botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash31337
Sliver botnet C2 server (confidence level: 100%)
hash443
Sliver botnet C2 server (confidence level: 100%)
hash443
Sliver botnet C2 server (confidence level: 100%)
hash8888
Unknown malware botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash8082
Hook botnet C2 server (confidence level: 100%)
hash9301
NetSupportManager RAT botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash80
Unknown malware botnet C2 server (confidence level: 100%)
hash8080
Chaos botnet C2 server (confidence level: 100%)
hash443
BianLian botnet C2 server (confidence level: 100%)
hash4057
Remcos botnet C2 server (confidence level: 100%)
hash3333
Remcos botnet C2 server (confidence level: 100%)
hash6606
AsyncRAT botnet C2 server (confidence level: 100%)
hash4782
Quasar RAT botnet C2 server (confidence level: 100%)
hash7707
AsyncRAT botnet C2 server (confidence level: 100%)

Url

ValueDescriptionCopy
urlhttp://jholo.duckdns.org:8181/upload.php
DarkVision RAT botnet C2 (confidence level: 100%)
urlhttp://124.70.193.76:8888/supershell/login/
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://113.44.78.183:8888/supershell/login/
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://47.120.37.153:8888/supershell/login/
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://221.14.60.132:53880/mozi.m
Mozi payload delivery URL (confidence level: 50%)
urlhttp://185.239.51.56/externalvmpacketlongpollsqldbfloweruniversalcentral.php
DCRat botnet C2 (confidence level: 100%)
urlhttp://891781cm.renyash.ru/processorserverdefaultsqltrafficuniversalwpprivate.php
DCRat botnet C2 (confidence level: 100%)
urlhttp://23.94.247.46/pages/login.php
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://recessfriction.sbs/lod.php
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://recessfriction.sbs/dol.php
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://dogdecision.cfd/bar.php
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://487997cm.renyash.top/videoflowergeneratortestpublic.php
DCRat botnet C2 (confidence level: 100%)
urlhttps://awake-weaves.cyou/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://brendon-sharjen.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://covery-mover.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://dare-curbys.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://dwell-exclaim.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://fadehairucw.store/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://formy-spill.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://impend-differ.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://ingreem-eilish.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://outlookyn.cyou/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://presticitpo.store/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://print-vexer.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://scriptyprefej.store/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://se-blurry.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://sordid-snaked.cyou/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://thumbystriw.store/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://wisdom-echoes.shop/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://wrathful-jammy.cyou/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://zinc-sneark.biz/api
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttp://94.103.84.173/pages/login.php
Unknown malware botnet C2 (confidence level: 100%)
urlhttp://101349cm.renyash.ru/videovmgamedefaulttestuniversalwp.php
DCRat botnet C2 (confidence level: 100%)
urlhttp://42.231.223.147:60259/mozi.m
Mozi payload delivery URL (confidence level: 50%)
urlhttp://126987cm.renyash.ru/vmpipejavascript_httpauthlongpollmultiwordpressdle.php
DCRat botnet C2 (confidence level: 100%)

Domain

ValueDescriptionCopy
domainraw.cloudboats.vip
Mirai botnet C2 domain (confidence level: 75%)
domains4.serv00.com
Agent Tesla botnet C2 domain (confidence level: 50%)
domainvmi2323701.contaboserver.net
AsyncRAT botnet C2 domain (confidence level: 100%)
domaincpcalendars.pd.194-59-30-152.cprapid.com
Hook botnet C2 domain (confidence level: 100%)
domainavina.cloud
Havoc botnet C2 domain (confidence level: 100%)
domainecs-110-41-4-69.compute.hwclouds-dns.com
Cobalt Strike botnet C2 domain (confidence level: 100%)
domainocqztwhhfipaggkyloea.infinitum.space
Cobalt Strike botnet C2 domain (confidence level: 100%)
domainip66-179-240-177.pbiaas.com
AsyncRAT botnet C2 domain (confidence level: 100%)
domainwww.103-152-255-69.cprapid.com
Havoc botnet C2 domain (confidence level: 100%)
domainawake-weaves.cyou
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainbrendon-sharjen.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domaincovery-mover.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domaindare-curbys.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domaindwell-exclaim.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainformy-spill.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainimpend-differ.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainingreem-eilish.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainoutlookyn.cyou
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainprint-vexer.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainse-blurry.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainsordid-snaked.cyou
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainwisdom-echoes.shop
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainwrathful-jammy.cyou
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainzinc-sneark.biz
Lumma Stealer botnet C2 domain (confidence level: 100%)
domainusps-mydeliver.com
Meduza Stealer botnet C2 domain (confidence level: 100%)
domainusps-mypackage.com
Meduza Stealer botnet C2 domain (confidence level: 100%)
domainchatapi.edureel.ai
Unknown malware botnet C2 domain (confidence level: 100%)

Threat ID: 68367c99182aa0cae2321cec

Added to database: 5/28/2025, 3:01:45 AM

Last enriched: 6/27/2025, 10:50:26 AM

Last updated: 7/28/2025, 11:18:39 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats