ThreatFox IOCs for 2025-01-03
ThreatFox IOCs for 2025-01-03
AI Analysis
Technical Summary
The provided threat intelligence pertains to a malware-related report titled 'ThreatFox IOCs for 2025-01-03,' sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The report is categorized under 'type:osint' and 'tlp:white,' indicating it is open-source intelligence with no restrictions on sharing. The technical details specify a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, suggesting moderate dissemination or reach. However, there are no specific affected product versions listed, no Common Weakness Enumerations (CWEs), no patch links, and no known exploits in the wild at the time of publication. The absence of detailed technical indicators, such as malware behavior, attack vectors, or payload specifics, limits the depth of technical analysis. The report appears to be a collection or update of IOCs related to malware activity as of January 3, 2025, but without concrete exploit data or targeted vulnerabilities. Given the 'medium' severity rating assigned by the source, the threat likely represents a moderate risk, potentially involving malware samples or campaigns that are emerging or under observation but not yet widely exploited or causing significant impact. The lack of authentication or user interaction details further constrains the assessment of exploitation complexity. Overall, this intelligence serves as an early warning or situational awareness input rather than a detailed incident report or vulnerability advisory.
Potential Impact
For European organizations, the potential impact of this threat is currently moderate due to the absence of known active exploits and specific affected products. However, as the threat involves malware IOCs, there is a risk of infection leading to typical malware consequences such as data exfiltration, system compromise, or disruption of services if the malware is deployed successfully. Organizations relying on OSINT tools or platforms similar to ThreatFox might be indirectly affected if these tools are leveraged by attackers for reconnaissance or distribution. The medium severity suggests that while immediate widespread damage is unlikely, targeted attacks could result in confidentiality breaches or operational disruptions. The lack of detailed indicators means organizations may face challenges in detection and response, potentially increasing dwell time if infections occur. European sectors with high-value data or critical infrastructure could be at risk if threat actors evolve these IOCs into active campaigns. Therefore, vigilance and proactive monitoring are essential to mitigate potential escalation.
Mitigation Recommendations
1. Integrate ThreatFox IOCs into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities for emerging malware indicators. 2. Conduct regular threat hunting exercises focusing on the latest OSINT-derived IOCs to identify potential infections early. 3. Maintain up-to-date backups and implement strict access controls to limit malware propagation and data loss. 4. Educate security teams on interpreting and operationalizing OSINT feeds to improve response times. 5. Collaborate with national Computer Emergency Response Teams (CERTs) and information sharing organizations to receive timely updates and contextual threat intelligence. 6. Since no patches are available, emphasize network segmentation and application whitelisting to reduce attack surface. 7. Monitor network traffic for unusual patterns or connections to known malicious infrastructure associated with the IOCs once they become available. 8. Prepare incident response playbooks tailored to malware infections that may arise from these IOCs, ensuring readiness for containment and eradication.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
Indicators of Compromise
- file: 52.90.131.119
- hash: 1912
- file: 171.113.136.127
- hash: 10134
- file: 103.97.179.27
- hash: 80
- file: 147.50.253.155
- hash: 1177
- file: 154.197.69.21
- hash: 1177
- file: 205.234.144.157
- hash: 1177
- file: 147.50.253.241
- hash: 1177
- file: 128.140.113.250
- hash: 31337
- file: 190.14.37.116
- hash: 31337
- file: 134.122.176.216
- hash: 31337
- file: 146.190.221.100
- hash: 31337
- file: 194.59.30.140
- hash: 31337
- file: 89.169.168.121
- hash: 31337
- file: 45.126.125.144
- hash: 31337
- file: 212.81.47.77
- hash: 31337
- file: 149.28.157.236
- hash: 31337
- file: 185.10.68.122
- hash: 31337
- file: 192.71.166.235
- hash: 31337
- file: 74.48.194.9
- hash: 31337
- file: 185.106.123.104
- hash: 31337
- file: 20.205.107.249
- hash: 31337
- file: 146.185.159.140
- hash: 31337
- file: 54.206.68.125
- hash: 31337
- file: 142.202.190.162
- hash: 31337
- file: 188.166.147.93
- hash: 31337
- file: 66.70.202.84
- hash: 31337
- file: 49.7.54.74
- hash: 31337
- file: 31.220.80.82
- hash: 31337
- file: 134.122.48.158
- hash: 31337
- file: 76.74.127.146
- hash: 31337
- file: 159.89.181.135
- hash: 31337
- file: 87.106.230.64
- hash: 31337
- file: 194.233.73.173
- hash: 31337
- file: 138.68.170.98
- hash: 31337
- file: 85.217.170.231
- hash: 31337
- file: 5.230.39.211
- hash: 31337
- file: 103.107.181.73
- hash: 31337
- file: 51.91.99.21
- hash: 31337
- file: 172.235.135.120
- hash: 31337
- file: 212.50.251.18
- hash: 31337
- file: 121.40.40.246
- hash: 31337
- file: 5.253.59.167
- hash: 31337
- file: 206.189.147.187
- hash: 31337
- file: 141.94.104.181
- hash: 31337
- file: 87.251.79.242
- hash: 31337
- file: 5.252.176.3
- hash: 31337
- file: 23.168.152.32
- hash: 31337
- file: 36.212.254.213
- hash: 31337
- file: 86.107.168.58
- hash: 31337
- file: 64.95.10.95
- hash: 31337
- file: 76.74.127.191
- hash: 31337
- file: 5.161.59.216
- hash: 31337
- file: 154.31.219.201
- hash: 31337
- file: 191.232.182.0
- hash: 31337
- file: 46.30.190.240
- hash: 31337
- file: 64.226.101.105
- hash: 31337
- file: 45.155.54.221
- hash: 31337
- file: 87.120.112.141
- hash: 31337
- file: 80.240.26.166
- hash: 31337
- file: 103.147.22.155
- hash: 31337
- file: 120.78.91.8
- hash: 31337
- file: 209.38.31.142
- hash: 31337
- file: 5.252.176.78
- hash: 31337
- file: 80.78.27.76
- hash: 31337
- file: 185.209.20.85
- hash: 31337
- file: 94.136.189.145
- hash: 31337
- file: 103.96.128.40
- hash: 31337
- file: 137.184.175.3
- hash: 31337
- file: 8.217.245.162
- hash: 31337
- file: 61.28.233.21
- hash: 31337
- file: 8.217.145.90
- hash: 31337
- file: 49.13.163.25
- hash: 31337
- file: 209.38.96.84
- hash: 31337
- file: 174.137.57.240
- hash: 31337
- file: 45.141.86.123
- hash: 31337
- file: 172.235.37.27
- hash: 31337
- file: 3.85.112.235
- hash: 31337
- file: 154.64.252.183
- hash: 31337
- file: 5.175.237.184
- hash: 31337
- domain: cdn.withrental.com
- file: 51.178.81.137
- hash: 5000
- file: 103.199.16.91
- hash: 4430
- file: 45.152.67.128
- hash: 60000
- file: 15.237.248.221
- hash: 443
- file: 105.158.230.236
- hash: 995
- domain: mikhail-lermontov.com
- url: https://goatstuff.store/re5.mp4
- url: https://t2.awagama2.org/re5.mp4
- url: https://topofsuper.shop/re5.mp4
- domain: goaccredited.biz
- domain: patbunn.co
- domain: readytostartsomething.com
- domain: usps-mypackage.com
- domain: mypost-usps.com
- file: 185.198.234.154
- hash: 31337
- file: 154.38.172.243
- hash: 31337
- file: 195.74.86.236
- hash: 31337
- url: https://gacahyat75.top/owrmm2uzmtbinjg4/
- file: 103.163.208.252
- hash: 8888
- file: 154.216.18.93
- hash: 80
- file: 94.103.125.49
- hash: 80
- file: 94.103.125.49
- hash: 8089
- file: 185.249.198.173
- hash: 2
- url: http://188.113.74.78:58542/mozi.m
- domain: traversecityspringbreak.com
- domain: incomputersolutions.com
- file: 217.194.133.225
- hash: 9999
- url: http://onecable.ca/forum/viewtopic.php
- url: http://onlyidea.com/forum/viewtopic.php
- url: http://originalpizzaplus.ca/forum/viewtopic.php
- file: 216.9.227.143
- hash: 9168
- file: 34.200.62.190
- hash: 80
- file: 47.95.197.166
- hash: 80
- file: 110.41.43.248
- hash: 80
- domain: pentester03.gleeze.com
- file: 83.136.208.202
- hash: 4054
- file: 103.37.40.75
- hash: 56003
- file: 103.37.40.75
- hash: 56005
- file: 102.117.174.45
- hash: 7443
- file: 62.68.75.16
- hash: 7443
- file: 202.95.12.234
- hash: 8089
- file: 198.167.199.239
- hash: 19132
- file: 165.154.32.94
- hash: 8443
- file: 79.241.96.94
- hash: 82
- file: 160.30.137.63
- hash: 80
- file: 193.200.78.39
- hash: 23
- file: 45.141.26.234
- hash: 80
- url: http://94.156.177.41/alpha/five/fre.php
- file: 39.102.209.88
- hash: 80
- file: 45.32.121.197
- hash: 8080
- file: 154.83.16.8
- hash: 8082
- file: 86.124.24.8
- hash: 60000
- file: 86.124.24.8
- hash: 2706
- file: 86.124.24.8
- hash: 6362
- file: 86.124.24.8
- hash: 5671
- file: 86.124.24.8
- hash: 39132
- file: 86.124.24.8
- hash: 16
- file: 86.124.24.8
- hash: 15745
- file: 86.124.24.8
- hash: 64149
- file: 86.124.24.8
- hash: 13013
- file: 86.124.24.8
- hash: 49152
- file: 86.124.24.8
- hash: 53189
- file: 86.124.24.8
- hash: 9201
- file: 86.124.24.8
- hash: 1433
- file: 86.124.24.8
- hash: 39052
- file: 86.124.24.8
- hash: 42286
- file: 86.124.24.8
- hash: 10258
- file: 86.124.24.8
- hash: 18245
- file: 86.124.24.8
- hash: 1491
- file: 86.124.24.8
- hash: 19599
- file: 86.124.24.8
- hash: 29632
- file: 86.124.24.8
- hash: 51200
- file: 86.124.24.8
- hash: 34668
- file: 86.124.24.8
- hash: 43656
- file: 86.124.24.8
- hash: 50995
- file: 185.10.68.146
- hash: 443
- file: 93.113.180.243
- hash: 80
- file: 194.26.192.167
- hash: 2768
- file: 85.239.34.134
- hash: 31337
- url: http://86.110.194.28/test/authpython/eternaluniversal7/eternalrequesttest/testdatalife/processorwindowsdatalifepublic.php
- url: http://cb53940.tw1.ru/59e516a8.php
- url: http://193.58.121.137/privatedownloadsvideolocal/videowordpresspythonwindows/game/localtrackcpu/7game/servermariadbvideodownloads/imagevideorequestsecureprocesstrackwpcentral.php
- file: 43.156.63.124
- hash: 9090
- file: 81.71.127.160
- hash: 8080
- file: 110.42.53.18
- hash: 8080
- file: 139.224.254.69
- hash: 801
- file: 43.134.58.195
- hash: 443
- file: 124.221.199.60
- hash: 80
- file: 47.121.220.11
- hash: 80
- file: 111.229.63.190
- hash: 80
- file: 45.204.217.98
- hash: 2002
- file: 8.140.239.162
- hash: 80
- file: 124.221.35.96
- hash: 8080
- file: 101.201.247.232
- hash: 803
- file: 163.5.160.233
- hash: 2404
- file: 101.99.75.173
- hash: 3306
- file: 101.99.75.173
- hash: 5432
- file: 46.246.14.7
- hash: 2404
- file: 209.38.43.238
- hash: 443
- file: 123.4.33.218
- hash: 5873
- file: 185.49.126.47
- hash: 6606
- domain: webdisk.p2.194-59-31-47.cprapid.com
- file: 103.77.209.70
- hash: 8848
- file: 45.95.169.129
- hash: 80
- file: 47.57.0.220
- hash: 36123
- file: 134.122.135.95
- hash: 4433
- url: http://unasnetds.ru/eternalpython_requestupdateprocessauthsqltraffictemporary.php
- file: 86.124.25.57
- hash: 10911
- file: 86.124.25.57
- hash: 8099
- domain: maguagency.site
- url: https://solve.jrqr.org/awjxs.captcha
- file: 129.211.212.43
- hash: 8443
- file: 154.216.17.90
- hash: 7443
- file: 102.117.161.127
- hash: 7443
- domain: solve.jrqr.org
- file: 178.128.220.125
- hash: 80
- file: 158.58.207.165
- hash: 1604
- file: 80.5.244.130
- hash: 1604
- file: 185.196.9.29
- hash: 1604
- url: https://sos-ch-gva-2-exo-io.b-cdn.net/last-step-to-go-re5.html
- url: https://smartoffer-captcha-verification.b-cdn.net/last-step-to-go-solve.html
- url: https://treehoneyi.click/api
- file: 87.158.19.250
- hash: 80
- file: 149.210.56.153
- hash: 443
- file: 94.98.226.122
- hash: 3460
- domain: digitalarmor.cyou
- url: https://usbkits.com/0o9o.js
- domain: usbkits.com
- url: https://usbkits.com/js.php
- url: http://nfuvueibzi4.top/1.php
- file: 124.70.134.194
- hash: 80
- file: 158.247.240.102
- hash: 80
- file: 158.247.240.102
- hash: 443
- file: 158.58.207.165
- hash: 100
- file: 107.173.143.31
- hash: 2404
- file: 195.66.214.7
- hash: 8080
- domain: keramiccircle.net
- file: 139.84.221.245
- hash: 443
- file: 176.188.105.70
- hash: 8000
- file: 39.103.60.51
- hash: 8888
- file: 69.166.230.98
- hash: 6606
- file: 45.149.241.16
- hash: 1337
- file: 181.162.145.85
- hash: 8080
- file: 45.139.225.45
- hash: 443
- file: 13.245.198.21
- hash: 2443
- file: 15.188.76.53
- hash: 40922
- file: 94.156.167.30
- hash: 80
- file: 172.84.76.231
- hash: 80
- file: 172.84.76.231
- hash: 443
- file: 52.12.243.110
- hash: 8888
- file: 87.120.125.47
- hash: 7000
- hash: 3625fddc2687c086d6d4a4300b03d4a2492acf8e843697f57830bb40956f495a
- hash: 899c529454c4286185a9d3c039277ce28957590e7ed3e586ccf1487317159c22
- hash: 4a3341b1a681826f08bc9ec90ca24459826bb28f909030ba522d5ae2c92467d7
- hash: d49c2451497109ae9f2646d06aa6dcf51b0f6af825d07f516b8dd59c03602401
- hash: e1b6bd9876ca534e99b28403661e09b7a1ab7dac706df3962a0c975ba5b9e8ec
- hash: ef1967d9e33cbed9f12a504bdc642c9c12cfbac79a4421617f32e1aa2dc82c6f
- hash: 1bcdd9648584644da843486719f16b20250d3ca1015a6996085b43135d67615b
- hash: af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb
- hash: 03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d
- hash: 35ff79dd456fe3054a60fe0a16f38bf5fc3928e1e8439ca4d945573f8c48c0b8
- hash: fdefedd8f02446dd47723f4b1829f685f64e76b9d29002545dd4c5d5257eae29
- domain: a1070463.xsph.ru
- domain: a1060175.xsph.ru
- domain: gqcsmfau.beget.tech
- domain: f1070818.xsph.ru
- domain: a1070438.xsph.ru
- domain: cj94096.tw1.ru
- domain: acceptbaleeri.shop
- domain: pancakedipyps.click
- domain: stomachabonda.click
- domain: impoliterenei.click
- domain: dyewounderzn.click
- domain: fishbitteruz.click
- domain: wonderfulbelif.click
- domain: modernantsrer.click
- domain: connectionlongi.click
- domain: managerecetio.click
- domain: bootstringjl.click
- domain: implanthide.click
- domain: obtainablecloud.click
- domain: scirroscus.click
- domain: symptomaticdryu.click
- domain: throwupset.click
- domain: doubtermoderuz.click
- domain: chidesunnyso.click
- domain: territoryleaduo.click
- domain: cureprouderio.click
- domain: survivesuz.click
- domain: locketsashayz.click
- domain: schooltreeus.click
- domain: arisealert.click
- domain: abberanteusz.click
- domain: storyspaddr.click
- domain: crackerdolk.click
- domain: givepickyl.click
- domain: renewballoi.click
- domain: imbibernes.click
- domain: conserordersz.click
- domain: tongueforcie.click
- domain: berserkyfir.click
- domain: aliveindu.click
- domain: windowthing.click
- domain: pleadragger.click
- domain: scrawnyinte.click
- file: 36.137.91.198
- hash: 18444
- url: https://scrawnyinte.click/api
- url: https://pleadragger.click/api
- url: https://windowthing.click/api
- url: https://aliveindu.click/api
- url: https://berserkyfir.click/api
- url: https://tongueforcie.click/api
- url: https://conserordersz.click/api
- url: https://imbibernes.click/api
- url: https://renewballoi.click/api
- url: https://givepickyl.click/api
- url: https://crackerdolk.click/api
- url: https://storyspaddr.click/api
- url: https://abberanteusz.click/api
- url: https://arisealert.click/api
- url: https://schooltreeus.click/api
- url: https://locketsashayz.click/api
- url: https://survivesuz.click/api
- url: https://cureprouderio.click/api
- url: https://territoryleaduo.click/api
- url: https://chidesunnyso.click/api
- url: https://doubtermoderuz.click/api
- url: https://throwupset.click/api
- url: https://symptomaticdryu.click/api
- url: https://scirroscus.click/api
- url: https://obtainablecloud.click/api
- url: https://implanthide.click/api
- url: https://bootstringjl.click/api
- url: https://managerecetio.click/api
- url: https://connectionlongi.click/api
- url: https://modernantsrer.click/api
- url: https://wonderfulbelif.click/api
- url: https://fishbitteruz.click/api
- url: https://dyewounderzn.click/api
- url: https://impoliterenei.click/api
- url: https://stomachabonda.click/api
- url: https://pancakedipyps.click/api
- file: 118.89.89.200
- hash: 443
- file: 133.18.213.214
- hash: 1177
- file: 13.60.89.232
- hash: 13
- file: 98.110.203.122
- hash: 12345
- file: 51.17.120.230
- hash: 7634
- file: 3.110.103.238
- hash: 666
- file: 52.32.212.78
- hash: 11
- file: 154.216.17.90
- hash: 80
- file: 216.244.95.18
- hash: 10001
- file: 60.204.222.79
- hash: 10001
- file: 157.245.82.125
- hash: 12345
- file: 190.160.37.243
- hash: 81
- file: 110.43.68.57
- hash: 10001
- file: 47.236.50.236
- hash: 10001
- file: 121.196.37.112
- hash: 10001
- file: 45.174.16.122
- hash: 53
- file: 178.255.24.28
- hash: 1099
- file: 111.68.8.194
- hash: 1218
- domain: dragon-rp.com
- domain: a1041198.xsph.ru
- domain: cf17360.tw1.ru
- domain: insurancebyh.cyou
- domain: currenycon.cyou
- domain: movementby.cyou
- domain: veilyveinj.cyou
- domain: revordirecut.cyou
- file: 43.154.153.84
- hash: 80
- file: 43.163.81.66
- hash: 8888
- domain: omitocenaj.buzz
- domain: enterwahsh.biz
- domain: classify-shed.biz
- domain: atten-supporse.biz
- domain: markydinnt.lat
- url: https://revordirecut.cyou/api
- url: https://veilyveinj.cyou/api
- url: https://movementby.cyou/api
- url: https://currenycon.cyou/api
- url: https://insurancebyh.cyou/api
- url: https://markydinnt.lat/api
- url: https://atten-supporse.biz/api
- url: https://classify-shed.biz/api
- url: https://omitocenaj.buzz/api
- url: https://trufai.website/
- domain: trufai.website
- url: http://52952cm.darkproducts.ru/l1nc0in.php
- file: 45.79.218.7
- hash: 8443
- file: 144.126.149.221
- hash: 7707
- file: 103.37.40.78
- hash: 56003
- file: 96.19.120.230
- hash: 7443
- domain: sso.microsoft.upgrade1.zip
- file: 3.27.150.236
- hash: 31199
- file: 178.124.176.209
- hash: 8088
- file: 51.250.76.242
- hash: 80
- file: 188.68.229.55
- hash: 8001
- url: http://206.188.197.24/process6cdn/3imagelongpolldump/geodefaultmultiprocess/lowline/processdumpmulti/linejsprocessauthflowertestlocal.php
- file: 27.124.4.60
- hash: 4433
- file: 147.124.212.125
- hash: 1244
- file: 5.135.5.48
- hash: 1244
- file: 67.203.7.200
- hash: 1244
- file: 206.238.220.50
- hash: 4433
- url: https://moeurolandbabisde.net/mmi1m2zimgrmodey/
- file: 69.16.230.165
- hash: 80
- url: http://a1069976.xsph.ru/bef5ef56.php
- file: 64.52.80.67
- hash: 4444
- url: http://sulimeo6.beget.tech/54bb1881.php
- file: 91.208.240.194
- hash: 4563
- file: 213.142.159.59
- hash: 1605
- file: 185.234.72.215
- hash: 4444
ThreatFox IOCs for 2025-01-03
Description
ThreatFox IOCs for 2025-01-03
AI-Powered Analysis
Technical Analysis
The provided threat intelligence pertains to a malware-related report titled 'ThreatFox IOCs for 2025-01-03,' sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The report is categorized under 'type:osint' and 'tlp:white,' indicating it is open-source intelligence with no restrictions on sharing. The technical details specify a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, suggesting moderate dissemination or reach. However, there are no specific affected product versions listed, no Common Weakness Enumerations (CWEs), no patch links, and no known exploits in the wild at the time of publication. The absence of detailed technical indicators, such as malware behavior, attack vectors, or payload specifics, limits the depth of technical analysis. The report appears to be a collection or update of IOCs related to malware activity as of January 3, 2025, but without concrete exploit data or targeted vulnerabilities. Given the 'medium' severity rating assigned by the source, the threat likely represents a moderate risk, potentially involving malware samples or campaigns that are emerging or under observation but not yet widely exploited or causing significant impact. The lack of authentication or user interaction details further constrains the assessment of exploitation complexity. Overall, this intelligence serves as an early warning or situational awareness input rather than a detailed incident report or vulnerability advisory.
Potential Impact
For European organizations, the potential impact of this threat is currently moderate due to the absence of known active exploits and specific affected products. However, as the threat involves malware IOCs, there is a risk of infection leading to typical malware consequences such as data exfiltration, system compromise, or disruption of services if the malware is deployed successfully. Organizations relying on OSINT tools or platforms similar to ThreatFox might be indirectly affected if these tools are leveraged by attackers for reconnaissance or distribution. The medium severity suggests that while immediate widespread damage is unlikely, targeted attacks could result in confidentiality breaches or operational disruptions. The lack of detailed indicators means organizations may face challenges in detection and response, potentially increasing dwell time if infections occur. European sectors with high-value data or critical infrastructure could be at risk if threat actors evolve these IOCs into active campaigns. Therefore, vigilance and proactive monitoring are essential to mitigate potential escalation.
Mitigation Recommendations
1. Integrate ThreatFox IOCs into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities for emerging malware indicators. 2. Conduct regular threat hunting exercises focusing on the latest OSINT-derived IOCs to identify potential infections early. 3. Maintain up-to-date backups and implement strict access controls to limit malware propagation and data loss. 4. Educate security teams on interpreting and operationalizing OSINT feeds to improve response times. 5. Collaborate with national Computer Emergency Response Teams (CERTs) and information sharing organizations to receive timely updates and contextual threat intelligence. 6. Since no patches are available, emphasize network segmentation and application whitelisting to reduce attack surface. 7. Monitor network traffic for unusual patterns or connections to known malicious infrastructure associated with the IOCs once they become available. 8. Prepare incident response playbooks tailored to malware infections that may arise from these IOCs, ensuring readiness for containment and eradication.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 6a4919a2-6f36-435c-a91b-38d96e0c5837
- Original Timestamp
- 1735948985
Indicators of Compromise
File
Value | Description | Copy |
---|---|---|
file52.90.131.119 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file171.113.136.127 | Orcus RAT botnet C2 server (confidence level: 50%) | |
file103.97.179.27 | NjRAT botnet C2 server (confidence level: 50%) | |
file147.50.253.155 | NjRAT botnet C2 server (confidence level: 50%) | |
file154.197.69.21 | NjRAT botnet C2 server (confidence level: 50%) | |
file205.234.144.157 | NjRAT botnet C2 server (confidence level: 50%) | |
file147.50.253.241 | NjRAT botnet C2 server (confidence level: 50%) | |
file128.140.113.250 | Sliver botnet C2 server (confidence level: 50%) | |
file190.14.37.116 | Sliver botnet C2 server (confidence level: 50%) | |
file134.122.176.216 | Sliver botnet C2 server (confidence level: 50%) | |
file146.190.221.100 | Sliver botnet C2 server (confidence level: 50%) | |
file194.59.30.140 | Sliver botnet C2 server (confidence level: 50%) | |
file89.169.168.121 | Sliver botnet C2 server (confidence level: 50%) | |
file45.126.125.144 | Sliver botnet C2 server (confidence level: 50%) | |
file212.81.47.77 | Sliver botnet C2 server (confidence level: 50%) | |
file149.28.157.236 | Sliver botnet C2 server (confidence level: 50%) | |
file185.10.68.122 | Sliver botnet C2 server (confidence level: 50%) | |
file192.71.166.235 | Sliver botnet C2 server (confidence level: 50%) | |
file74.48.194.9 | Sliver botnet C2 server (confidence level: 50%) | |
file185.106.123.104 | Sliver botnet C2 server (confidence level: 50%) | |
file20.205.107.249 | Sliver botnet C2 server (confidence level: 50%) | |
file146.185.159.140 | Sliver botnet C2 server (confidence level: 50%) | |
file54.206.68.125 | Sliver botnet C2 server (confidence level: 50%) | |
file142.202.190.162 | Sliver botnet C2 server (confidence level: 50%) | |
file188.166.147.93 | Sliver botnet C2 server (confidence level: 50%) | |
file66.70.202.84 | Sliver botnet C2 server (confidence level: 50%) | |
file49.7.54.74 | Sliver botnet C2 server (confidence level: 50%) | |
file31.220.80.82 | Sliver botnet C2 server (confidence level: 50%) | |
file134.122.48.158 | Sliver botnet C2 server (confidence level: 50%) | |
file76.74.127.146 | Sliver botnet C2 server (confidence level: 50%) | |
file159.89.181.135 | Sliver botnet C2 server (confidence level: 50%) | |
file87.106.230.64 | Sliver botnet C2 server (confidence level: 50%) | |
file194.233.73.173 | Sliver botnet C2 server (confidence level: 50%) | |
file138.68.170.98 | Sliver botnet C2 server (confidence level: 50%) | |
file85.217.170.231 | Sliver botnet C2 server (confidence level: 50%) | |
file5.230.39.211 | Sliver botnet C2 server (confidence level: 50%) | |
file103.107.181.73 | Sliver botnet C2 server (confidence level: 50%) | |
file51.91.99.21 | Sliver botnet C2 server (confidence level: 50%) | |
file172.235.135.120 | Sliver botnet C2 server (confidence level: 50%) | |
file212.50.251.18 | Sliver botnet C2 server (confidence level: 50%) | |
file121.40.40.246 | Sliver botnet C2 server (confidence level: 50%) | |
file5.253.59.167 | Sliver botnet C2 server (confidence level: 50%) | |
file206.189.147.187 | Sliver botnet C2 server (confidence level: 50%) | |
file141.94.104.181 | Sliver botnet C2 server (confidence level: 50%) | |
file87.251.79.242 | Sliver botnet C2 server (confidence level: 50%) | |
file5.252.176.3 | Sliver botnet C2 server (confidence level: 50%) | |
file23.168.152.32 | Sliver botnet C2 server (confidence level: 50%) | |
file36.212.254.213 | Sliver botnet C2 server (confidence level: 50%) | |
file86.107.168.58 | Sliver botnet C2 server (confidence level: 50%) | |
file64.95.10.95 | Sliver botnet C2 server (confidence level: 50%) | |
file76.74.127.191 | Sliver botnet C2 server (confidence level: 50%) | |
file5.161.59.216 | Sliver botnet C2 server (confidence level: 50%) | |
file154.31.219.201 | Sliver botnet C2 server (confidence level: 50%) | |
file191.232.182.0 | Sliver botnet C2 server (confidence level: 50%) | |
file46.30.190.240 | Sliver botnet C2 server (confidence level: 50%) | |
file64.226.101.105 | Sliver botnet C2 server (confidence level: 50%) | |
file45.155.54.221 | Sliver botnet C2 server (confidence level: 50%) | |
file87.120.112.141 | Sliver botnet C2 server (confidence level: 50%) | |
file80.240.26.166 | Sliver botnet C2 server (confidence level: 50%) | |
file103.147.22.155 | Sliver botnet C2 server (confidence level: 50%) | |
file120.78.91.8 | Sliver botnet C2 server (confidence level: 50%) | |
file209.38.31.142 | Sliver botnet C2 server (confidence level: 50%) | |
file5.252.176.78 | Sliver botnet C2 server (confidence level: 50%) | |
file80.78.27.76 | Sliver botnet C2 server (confidence level: 50%) | |
file185.209.20.85 | Sliver botnet C2 server (confidence level: 50%) | |
file94.136.189.145 | Sliver botnet C2 server (confidence level: 50%) | |
file103.96.128.40 | Sliver botnet C2 server (confidence level: 50%) | |
file137.184.175.3 | Sliver botnet C2 server (confidence level: 50%) | |
file8.217.245.162 | Sliver botnet C2 server (confidence level: 50%) | |
file61.28.233.21 | Sliver botnet C2 server (confidence level: 50%) | |
file8.217.145.90 | Sliver botnet C2 server (confidence level: 50%) | |
file49.13.163.25 | Sliver botnet C2 server (confidence level: 50%) | |
file209.38.96.84 | Sliver botnet C2 server (confidence level: 50%) | |
file174.137.57.240 | Sliver botnet C2 server (confidence level: 50%) | |
file45.141.86.123 | Sliver botnet C2 server (confidence level: 50%) | |
file172.235.37.27 | Sliver botnet C2 server (confidence level: 50%) | |
file3.85.112.235 | Sliver botnet C2 server (confidence level: 50%) | |
file154.64.252.183 | Sliver botnet C2 server (confidence level: 50%) | |
file5.175.237.184 | Sliver botnet C2 server (confidence level: 50%) | |
file51.178.81.137 | Unknown malware botnet C2 server (confidence level: 100%) | |
file103.199.16.91 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.152.67.128 | Unknown malware botnet C2 server (confidence level: 100%) | |
file15.237.248.221 | Unknown malware botnet C2 server (confidence level: 100%) | |
file105.158.230.236 | QakBot botnet C2 server (confidence level: 100%) | |
file185.198.234.154 | Sliver botnet C2 server (confidence level: 75%) | |
file154.38.172.243 | Sliver botnet C2 server (confidence level: 75%) | |
file195.74.86.236 | Sliver botnet C2 server (confidence level: 75%) | |
file103.163.208.252 | Unknown malware botnet C2 server (confidence level: 100%) | |
file154.216.18.93 | Hook botnet C2 server (confidence level: 100%) | |
file94.103.125.49 | Hook botnet C2 server (confidence level: 100%) | |
file94.103.125.49 | Hook botnet C2 server (confidence level: 100%) | |
file185.249.198.173 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file217.194.133.225 | Cobalt Strike payload delivery server (confidence level: 75%) | |
file216.9.227.143 | Bashlite botnet C2 server (confidence level: 75%) | |
file34.200.62.190 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.95.197.166 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file110.41.43.248 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file83.136.208.202 | Remcos botnet C2 server (confidence level: 100%) | |
file103.37.40.75 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file103.37.40.75 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file102.117.174.45 | Unknown malware botnet C2 server (confidence level: 100%) | |
file62.68.75.16 | Unknown malware botnet C2 server (confidence level: 100%) | |
file202.95.12.234 | Hook botnet C2 server (confidence level: 100%) | |
file198.167.199.239 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file165.154.32.94 | Havoc botnet C2 server (confidence level: 100%) | |
file79.241.96.94 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file160.30.137.63 | MooBot botnet C2 server (confidence level: 100%) | |
file193.200.78.39 | Bashlite botnet C2 server (confidence level: 100%) | |
file45.141.26.234 | XWorm botnet C2 server (confidence level: 100%) | |
file39.102.209.88 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.32.121.197 | ShadowPad botnet C2 server (confidence level: 90%) | |
file154.83.16.8 | Hook botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file86.124.24.8 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file185.10.68.146 | Havoc botnet C2 server (confidence level: 100%) | |
file93.113.180.243 | MooBot botnet C2 server (confidence level: 100%) | |
file194.26.192.167 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file85.239.34.134 | Bashlite botnet C2 server (confidence level: 100%) | |
file43.156.63.124 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file81.71.127.160 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file110.42.53.18 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file139.224.254.69 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.134.58.195 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.221.199.60 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.121.220.11 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file111.229.63.190 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.204.217.98 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.140.239.162 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.221.35.96 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file101.201.247.232 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file163.5.160.233 | Remcos botnet C2 server (confidence level: 100%) | |
file101.99.75.173 | Remcos botnet C2 server (confidence level: 100%) | |
file101.99.75.173 | Remcos botnet C2 server (confidence level: 100%) | |
file46.246.14.7 | Remcos botnet C2 server (confidence level: 100%) | |
file209.38.43.238 | Sliver botnet C2 server (confidence level: 100%) | |
file123.4.33.218 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.49.126.47 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file103.77.209.70 | DCRat botnet C2 server (confidence level: 100%) | |
file45.95.169.129 | MooBot botnet C2 server (confidence level: 100%) | |
file47.57.0.220 | Unknown malware botnet C2 server (confidence level: 100%) | |
file134.122.135.95 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file86.124.25.57 | Quasar RAT botnet C2 server (confidence level: 50%) | |
file86.124.25.57 | Quasar RAT botnet C2 server (confidence level: 50%) | |
file129.211.212.43 | Unknown malware botnet C2 server (confidence level: 50%) | |
file154.216.17.90 | Unknown malware botnet C2 server (confidence level: 50%) | |
file102.117.161.127 | Unknown malware botnet C2 server (confidence level: 50%) | |
file178.128.220.125 | Empire Downloader botnet C2 server (confidence level: 50%) | |
file158.58.207.165 | DarkComet botnet C2 server (confidence level: 50%) | |
file80.5.244.130 | DarkComet botnet C2 server (confidence level: 50%) | |
file185.196.9.29 | DarkComet botnet C2 server (confidence level: 50%) | |
file87.158.19.250 | Ghost RAT botnet C2 server (confidence level: 50%) | |
file149.210.56.153 | Ghost RAT botnet C2 server (confidence level: 50%) | |
file94.98.226.122 | Poison Ivy botnet C2 server (confidence level: 50%) | |
file124.70.134.194 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file158.247.240.102 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file158.247.240.102 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file158.58.207.165 | DarkComet botnet C2 server (confidence level: 100%) | |
file107.173.143.31 | Remcos botnet C2 server (confidence level: 100%) | |
file195.66.214.7 | Remcos botnet C2 server (confidence level: 100%) | |
file139.84.221.245 | Sliver botnet C2 server (confidence level: 100%) | |
file176.188.105.70 | Sliver botnet C2 server (confidence level: 100%) | |
file39.103.60.51 | Unknown malware botnet C2 server (confidence level: 100%) | |
file69.166.230.98 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.149.241.16 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file181.162.145.85 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file45.139.225.45 | Havoc botnet C2 server (confidence level: 100%) | |
file13.245.198.21 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file15.188.76.53 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file94.156.167.30 | XWorm botnet C2 server (confidence level: 100%) | |
file172.84.76.231 | xmrig botnet C2 server (confidence level: 100%) | |
file172.84.76.231 | xmrig botnet C2 server (confidence level: 100%) | |
file52.12.243.110 | BianLian botnet C2 server (confidence level: 100%) | |
file87.120.125.47 | XWorm botnet C2 server (confidence level: 100%) | |
file36.137.91.198 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.89.89.200 | NjRAT botnet C2 server (confidence level: 50%) | |
file133.18.213.214 | NjRAT botnet C2 server (confidence level: 50%) | |
file13.60.89.232 | Unknown malware botnet C2 server (confidence level: 50%) | |
file98.110.203.122 | Unknown malware botnet C2 server (confidence level: 50%) | |
file51.17.120.230 | Unknown malware botnet C2 server (confidence level: 50%) | |
file3.110.103.238 | Unknown malware botnet C2 server (confidence level: 50%) | |
file52.32.212.78 | Unknown malware botnet C2 server (confidence level: 50%) | |
file154.216.17.90 | Stealc botnet C2 server (confidence level: 100%) | |
file216.244.95.18 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file60.204.222.79 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file157.245.82.125 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file190.160.37.243 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file110.43.68.57 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file47.236.50.236 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file121.196.37.112 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file45.174.16.122 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file178.255.24.28 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file111.68.8.194 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file43.154.153.84 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.163.81.66 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.79.218.7 | Sliver botnet C2 server (confidence level: 100%) | |
file144.126.149.221 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file103.37.40.78 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file96.19.120.230 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.27.150.236 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file178.124.176.209 | Unknown malware botnet C2 server (confidence level: 100%) | |
file51.250.76.242 | Bashlite botnet C2 server (confidence level: 100%) | |
file188.68.229.55 | Havoc botnet C2 server (confidence level: 50%) | |
file27.124.4.60 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file147.124.212.125 | InvisibleFerret payload delivery server (confidence level: 100%) | |
file5.135.5.48 | InvisibleFerret payload delivery server (confidence level: 100%) | |
file67.203.7.200 | InvisibleFerret payload delivery server (confidence level: 100%) | |
file206.238.220.50 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file69.16.230.165 | NjRAT botnet C2 server (confidence level: 75%) | |
file64.52.80.67 | XenoRAT botnet C2 server (confidence level: 100%) | |
file91.208.240.194 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file213.142.159.59 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file185.234.72.215 | Remcos botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash1912 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash10134 | Orcus RAT botnet C2 server (confidence level: 50%) | |
hash80 | NjRAT botnet C2 server (confidence level: 50%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 50%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 50%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 50%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash5000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4430 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 75%) | |
hash31337 | Sliver botnet C2 server (confidence level: 75%) | |
hash31337 | Sliver botnet C2 server (confidence level: 75%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash8089 | Hook botnet C2 server (confidence level: 100%) | |
hash2 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike payload delivery server (confidence level: 75%) | |
hash9168 | Bashlite botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4054 | Remcos botnet C2 server (confidence level: 100%) | |
hash56003 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash56005 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8089 | Hook botnet C2 server (confidence level: 100%) | |
hash19132 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8443 | Havoc botnet C2 server (confidence level: 100%) | |
hash82 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash23 | Bashlite botnet C2 server (confidence level: 100%) | |
hash80 | XWorm botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash8082 | Hook botnet C2 server (confidence level: 100%) | |
hash60000 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2706 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash6362 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash5671 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash39132 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash16 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash15745 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash64149 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash13013 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash49152 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash53189 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash9201 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash1433 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash39052 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash42286 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash10258 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash18245 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash1491 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash19599 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash29632 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash51200 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash34668 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash43656 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash50995 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash2768 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash31337 | Bashlite botnet C2 server (confidence level: 100%) | |
hash9090 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash801 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2002 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash803 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash3306 | Remcos botnet C2 server (confidence level: 100%) | |
hash5432 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash5873 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8848 | DCRat botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash36123 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4433 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash10911 | Quasar RAT botnet C2 server (confidence level: 50%) | |
hash8099 | Quasar RAT botnet C2 server (confidence level: 50%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Empire Downloader botnet C2 server (confidence level: 50%) | |
hash1604 | DarkComet botnet C2 server (confidence level: 50%) | |
hash1604 | DarkComet botnet C2 server (confidence level: 50%) | |
hash1604 | DarkComet botnet C2 server (confidence level: 50%) | |
hash80 | Ghost RAT botnet C2 server (confidence level: 50%) | |
hash443 | Ghost RAT botnet C2 server (confidence level: 50%) | |
hash3460 | Poison Ivy botnet C2 server (confidence level: 50%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash100 | DarkComet botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash8080 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8000 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash1337 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8080 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash2443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash40922 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | XWorm botnet C2 server (confidence level: 100%) | |
hash80 | xmrig botnet C2 server (confidence level: 100%) | |
hash443 | xmrig botnet C2 server (confidence level: 100%) | |
hash8888 | BianLian botnet C2 server (confidence level: 100%) | |
hash7000 | XWorm botnet C2 server (confidence level: 100%) | |
hash3625fddc2687c086d6d4a4300b03d4a2492acf8e843697f57830bb40956f495a | Cobalt Strike payload (confidence level: 100%) | |
hash899c529454c4286185a9d3c039277ce28957590e7ed3e586ccf1487317159c22 | Cobalt Strike payload (confidence level: 100%) | |
hash4a3341b1a681826f08bc9ec90ca24459826bb28f909030ba522d5ae2c92467d7 | Cobalt Strike payload (confidence level: 100%) | |
hashd49c2451497109ae9f2646d06aa6dcf51b0f6af825d07f516b8dd59c03602401 | Cobalt Strike payload (confidence level: 100%) | |
hashe1b6bd9876ca534e99b28403661e09b7a1ab7dac706df3962a0c975ba5b9e8ec | Cobalt Strike payload (confidence level: 100%) | |
hashef1967d9e33cbed9f12a504bdc642c9c12cfbac79a4421617f32e1aa2dc82c6f | Cobalt Strike payload (confidence level: 100%) | |
hash1bcdd9648584644da843486719f16b20250d3ca1015a6996085b43135d67615b | Cobalt Strike payload (confidence level: 100%) | |
hashaf9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb | Remcos payload (confidence level: 100%) | |
hash03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d | Mirai payload (confidence level: 100%) | |
hash35ff79dd456fe3054a60fe0a16f38bf5fc3928e1e8439ca4d945573f8c48c0b8 | Mirai payload (confidence level: 100%) | |
hashfdefedd8f02446dd47723f4b1829f685f64e76b9d29002545dd4c5d5257eae29 | AsyncRAT payload (confidence level: 100%) | |
hash18444 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | NjRAT botnet C2 server (confidence level: 50%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 50%) | |
hash13 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash12345 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash7634 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash666 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash11 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash12345 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash81 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash53 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash1099 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash1218 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8443 | Sliver botnet C2 server (confidence level: 100%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash56003 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash31199 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8088 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Bashlite botnet C2 server (confidence level: 100%) | |
hash8001 | Havoc botnet C2 server (confidence level: 50%) | |
hash4433 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash1244 | InvisibleFerret payload delivery server (confidence level: 100%) | |
hash1244 | InvisibleFerret payload delivery server (confidence level: 100%) | |
hash1244 | InvisibleFerret payload delivery server (confidence level: 100%) | |
hash4433 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash80 | NjRAT botnet C2 server (confidence level: 75%) | |
hash4444 | XenoRAT botnet C2 server (confidence level: 100%) | |
hash4563 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash1605 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash4444 | Remcos botnet C2 server (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domaincdn.withrental.com | ShadowPad botnet C2 domain (confidence level: 90%) | |
domainmikhail-lermontov.com | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaingoaccredited.biz | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainpatbunn.co | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainreadytostartsomething.com | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainusps-mypackage.com | Meduza Stealer botnet C2 domain (confidence level: 100%) | |
domainmypost-usps.com | Meduza Stealer botnet C2 domain (confidence level: 100%) | |
domaintraversecityspringbreak.com | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainincomputersolutions.com | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainpentester03.gleeze.com | Remcos botnet C2 domain (confidence level: 100%) | |
domainwebdisk.p2.194-59-31-47.cprapid.com | Hook botnet C2 domain (confidence level: 100%) | |
domainmaguagency.site | DUCKTAIL botnet C2 domain (confidence level: 100%) | |
domainsolve.jrqr.org | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaindigitalarmor.cyou | Lumma Stealer botnet C2 domain (confidence level: 75%) | |
domainusbkits.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainkeramiccircle.net | Remcos botnet C2 domain (confidence level: 100%) | |
domaina1070463.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domaina1060175.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domaingqcsmfau.beget.tech | DCRat botnet C2 domain (confidence level: 100%) | |
domainf1070818.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domaina1070438.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domaincj94096.tw1.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domainacceptbaleeri.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpancakedipyps.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainstomachabonda.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainimpoliterenei.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaindyewounderzn.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainfishbitteruz.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainwonderfulbelif.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmodernantsrer.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainconnectionlongi.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmanagerecetio.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainbootstringjl.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainimplanthide.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainobtainablecloud.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainscirroscus.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainsymptomaticdryu.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainthrowupset.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaindoubtermoderuz.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainchidesunnyso.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainterritoryleaduo.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincureprouderio.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainsurvivesuz.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlocketsashayz.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainschooltreeus.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainarisealert.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainabberanteusz.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainstoryspaddr.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincrackerdolk.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaingivepickyl.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainrenewballoi.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainimbibernes.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainconserordersz.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintongueforcie.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainberserkyfir.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainaliveindu.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainwindowthing.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpleadragger.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainscrawnyinte.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaindragon-rp.com | DCRat botnet C2 domain (confidence level: 100%) | |
domaina1041198.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domaincf17360.tw1.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domaininsurancebyh.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincurrenycon.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmovementby.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainveilyveinj.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainrevordirecut.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainomitocenaj.buzz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainenterwahsh.biz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainclassify-shed.biz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainatten-supporse.biz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmarkydinnt.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintrufai.website | Vidar botnet C2 domain (confidence level: 100%) | |
domainsso.microsoft.upgrade1.zip | Havoc botnet C2 domain (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttps://goatstuff.store/re5.mp4 | Lumma Stealer payload delivery URL (confidence level: 100%) | |
urlhttps://t2.awagama2.org/re5.mp4 | Lumma Stealer payload delivery URL (confidence level: 100%) | |
urlhttps://topofsuper.shop/re5.mp4 | Lumma Stealer payload delivery URL (confidence level: 100%) | |
urlhttps://gacahyat75.top/owrmm2uzmtbinjg4/ | Coper botnet C2 (confidence level: 100%) | |
urlhttp://188.113.74.78:58542/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://onecable.ca/forum/viewtopic.php | Pony botnet C2 (confidence level: 100%) | |
urlhttp://onlyidea.com/forum/viewtopic.php | Pony botnet C2 (confidence level: 100%) | |
urlhttp://originalpizzaplus.ca/forum/viewtopic.php | Pony botnet C2 (confidence level: 100%) | |
urlhttp://94.156.177.41/alpha/five/fre.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 100%) | |
urlhttp://86.110.194.28/test/authpython/eternaluniversal7/eternalrequesttest/testdatalife/processorwindowsdatalifepublic.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://cb53940.tw1.ru/59e516a8.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://193.58.121.137/privatedownloadsvideolocal/videowordpresspythonwindows/game/localtrackcpu/7game/servermariadbvideodownloads/imagevideorequestsecureprocesstrackwpcentral.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://unasnetds.ru/eternalpython_requestupdateprocessauthsqltraffictemporary.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://solve.jrqr.org/awjxs.captcha | Lumma Stealer payload delivery URL (confidence level: 100%) | |
urlhttps://sos-ch-gva-2-exo-io.b-cdn.net/last-step-to-go-re5.html | Lumma Stealer payload delivery URL (confidence level: 100%) | |
urlhttps://smartoffer-captcha-verification.b-cdn.net/last-step-to-go-solve.html | Lumma Stealer payload delivery URL (confidence level: 100%) | |
urlhttps://treehoneyi.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://usbkits.com/0o9o.js | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://usbkits.com/js.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://nfuvueibzi4.top/1.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://scrawnyinte.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://pleadragger.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://windowthing.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://aliveindu.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://berserkyfir.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://tongueforcie.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://conserordersz.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://imbibernes.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://renewballoi.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://givepickyl.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://crackerdolk.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://storyspaddr.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://abberanteusz.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://arisealert.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://schooltreeus.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://locketsashayz.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://survivesuz.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://cureprouderio.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://territoryleaduo.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://chidesunnyso.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://doubtermoderuz.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://throwupset.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://symptomaticdryu.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://scirroscus.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://obtainablecloud.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://implanthide.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://bootstringjl.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://managerecetio.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://connectionlongi.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://modernantsrer.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://wonderfulbelif.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://fishbitteruz.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://dyewounderzn.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://impoliterenei.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://stomachabonda.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://pancakedipyps.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://revordirecut.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://veilyveinj.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://movementby.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://currenycon.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://insurancebyh.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://markydinnt.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://atten-supporse.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://classify-shed.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://omitocenaj.buzz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://trufai.website/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://52952cm.darkproducts.ru/l1nc0in.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://206.188.197.24/process6cdn/3imagelongpolldump/geodefaultmultiprocess/lowline/processdumpmulti/linejsprocessauthflowertestlocal.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://moeurolandbabisde.net/mmi1m2zimgrmodey/ | Coper botnet C2 (confidence level: 80%) | |
urlhttp://a1069976.xsph.ru/bef5ef56.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://sulimeo6.beget.tech/54bb1881.php | DCRat botnet C2 (confidence level: 100%) |
Threat ID: 682c7dc3e8347ec82d2e3984
Added to database: 5/20/2025, 1:04:03 PM
Last enriched: 6/19/2025, 4:04:42 PM
Last updated: 8/17/2025, 3:01:12 AM
Views: 9
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.