ThreatFox IOCs for 2025-01-13
ThreatFox IOCs for 2025-01-13
AI Analysis
Technical Summary
The provided threat intelligence pertains to a malware-related report titled 'ThreatFox IOCs for 2025-01-13,' sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The threat is categorized under 'malware' with a medium severity rating and is tagged as 'type:osint' and 'tlp:white,' indicating that the information is openly shareable without restrictions. The technical details include a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, suggesting moderate dissemination potential. However, there are no specific affected product versions, CWE identifiers, patch links, or known exploits in the wild associated with this threat. Additionally, no concrete indicators such as file hashes, IP addresses, or domain names are provided, limiting the ability to perform targeted detection or response. The absence of detailed technical indicators and exploit information implies that this report is more of a preparatory or informational nature, possibly aggregating IOCs for future reference rather than describing an active or imminent threat. The 'osint' product tag suggests that this intelligence is derived from open-source intelligence gathering rather than proprietary or closed-source detection methods. Overall, this threat intelligence entry appears to be a general update or collection of IOCs related to malware activity without immediate actionable exploitation details.
Potential Impact
Given the lack of specific technical indicators, affected software versions, or known active exploits, the immediate impact on European organizations is likely limited. However, the medium severity rating and moderate distribution score indicate that the malware or associated IOCs could be part of a broader campaign or emerging threat that may evolve. European organizations, especially those relying on open-source intelligence tools or platforms that aggregate such data, might face risks if these IOCs correspond to malware variants targeting their environments. Potential impacts include unauthorized access, data exfiltration, or disruption if the malware is deployed successfully. The absence of known exploits in the wild reduces the likelihood of immediate compromise but does not eliminate future risk. Organizations involved in cybersecurity monitoring, threat hunting, or incident response could benefit from integrating these IOCs into their detection frameworks to enhance situational awareness. The impact is more pronounced for sectors with high exposure to malware threats, such as finance, critical infrastructure, and government entities within Europe.
Mitigation Recommendations
1. Integrate the provided IOCs from ThreatFox into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities, even though specific indicators are not listed here, organizations should monitor ThreatFox for updates. 2. Maintain up-to-date threat intelligence feeds and subscribe to platforms like ThreatFox to receive timely IOC updates and contextual information. 3. Conduct regular threat hunting exercises focusing on malware behaviors and patterns that align with the medium severity threat level indicated. 4. Ensure robust endpoint protection solutions are deployed and configured to detect and block malware activities, including heuristic and behavioral analysis capabilities. 5. Implement network segmentation and strict access controls to limit malware propagation in case of infection. 6. Educate security teams on the importance of open-source intelligence and how to leverage TLP:white tagged information responsibly. 7. Since no patches or CVEs are associated, focus on proactive monitoring and anomaly detection rather than patch management for this specific threat. 8. Collaborate with European cybersecurity information sharing organizations (e.g., ENISA, CERT-EU) to contextualize and respond to emerging threats effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: daxon.giize.com
- file: 45.61.159.148
- hash: 1111
- domain: awake-weaves.cyou
- domain: sordid-snaked.cyou
- domain: wrathful-jammy.cyou
- domain: japanese-cross.gl.at.ply.gg
- domain: p8stolo-29468.portmap.host
- domain: adilfgilitter-43126.portmap.host
- domain: awiero-42728.portmap.host
- domain: edit-beats.gl.at.ply.gg
- domain: plan-view.gl.at.ply.gg
- domain: right-cleared.gl.at.ply.gg
- domain: sale-er.gl.at.ply.gg
- domain: storage-plugin.gl.at.ply.gg
- domain: misha-lomonosov.com
- url: https://pbvtckjkrtht.top/ytzhzjlioddlyti4/
- file: 87.120.126.73
- hash: 8000
- file: 203.227.62.91
- hash: 443
- file: 38.55.193.31
- hash: 443
- file: 108.165.237.230
- hash: 8808
- file: 141.95.114.241
- hash: 8808
- file: 167.114.145.155
- hash: 8808
- file: 185.101.104.3
- hash: 8808
- file: 54.179.92.3
- hash: 443
- file: 181.162.162.136
- hash: 8080
- domain: res.mllcrosoft.com
- file: 185.196.10.2
- hash: 443
- url: http://175.148.157.145:47965/mozi.m
- domain: dckhgjimeghemhl.top
- url: http://dckhgjimeghemhl.top/0obs5ktr2vhtr.php?id=vault&key=76127545828&s=527
- url: http://jejmbadfmeenlnk.top/tfm6euy09zhtr.php
- domain: jejmbadfmeenlnk.top
- url: http://canjjclmlnicbga.top/vo50gtns7dhtr.php
- domain: canjjclmlnicbga.top
- domain: kmaealcfcalhcac.top
- url: http://kmaealcfcalhcac.top/qzotx2r4w7htr.php
- file: 64.190.113.229
- hash: 80
- domain: bmbuz83hhhhg73.top
- domain: ksdgbx9oenj.top
- domain: pitibnzi4un.top
- domain: afnfdijahijefmh.top
- domain: iblaehgffmflamn.top
- domain: bfhdkgmmhdbikgj.top
- domain: kdemjgebjimkanl.top
- domain: cmacnnkfbhlcncm.top
- domain: bkkeiekjfcdaaen.top
- domain: jlijkijkkklbkjn.top
- domain: ruhybh74ub.top
- domain: fdsgujhnby.top
- domain: mubuzb3vvv.top
- domain: mnudybh4unh.top
- domain: mbuz73hb7z3.top
- domain: nubxz4ubhxz9i.top
- domain: poeiughybzu222.top
- domain: poubnxu3jubz.top
- domain: lgbibzuehbz.top
- domain: ohunhebzhbu3.top
- domain: sdubvlbbuz3vzzz.top
- domain: bnbuzu49ibz4.top
- domain: shd9inbjz4.top
- domain: ngub8zb38ib.top
- domain: gkn33hxueub.top
- domain: mnvuz3gvy3.top
- domain: jhubzgv3.top
- domain: bmadfjbhnijhckh.top
- domain: jhkenjhehiadfbn.top
- domain: fgghahagiiekjhg.top
- domain: nbcjihgecijhmnl.top
- domain: hkmlchlbjibdafd.top
- domain: bginkhdndigadkj.top
- file: 104.168.45.25
- hash: 80
- file: 18.212.130.9
- hash: 4443
- file: 198.12.127.223
- hash: 80
- domain: miutubzxe.top
- domain: ghybu8as.top
- domain: iiuthbuzev.top
- domain: bnayvhgb8.top
- domain: kffgkjmjangegkg.top
- domain: gnmdjjckbgddaie.top
- domain: cignjjgmdnbchhc.top
- domain: mcajijknegnbbga.top
- domain: ikhgijabfnkajem.top
- domain: eebchjechginddk.top
- domain: anjmhjidinfmlci.top
- domain: khcjgjmfjgdleag.top
- domain: gbkffjcglabkmne.top
- domain: ckebfjgimhmjgmb.top
- domain: melmejkjaakiakn.top
- domain: imfiejalbhhgijl.top
- domain: ehnediemcaffbij.top
- domain: abhbdiiaehdejgh.top
- domain: kjalcimbfaaddff.top
- domain: gdihcicdghmcldd.top
- domain: cmcebigeiajbfcb.top
- domain: mgjabikgjhhambm.top
- domain: iadkainhkafngnk.top
- domain: ejlhaidjmhcmami.top
- file: 162.33.178.216
- hash: 80
- file: 64.52.80.74
- hash: 80
- file: 45.61.136.166
- hash: 80
- file: 64.52.80.100
- hash: 80
- file: 54.83.104.93
- hash: 1433
- file: 45.77.153.108
- hash: 80
- file: 45.77.153.108
- hash: 443
- file: 64.176.35.214
- hash: 443
- domain: cpcontacts.sumup.live
- file: 198.167.199.190
- hash: 19132
- file: 190.203.34.71
- hash: 443
- file: 165.227.237.151
- hash: 443
- domain: g.sst.upgrade1.zip
- file: 41.250.78.102
- hash: 4099
- file: 41.250.78.102
- hash: 21309
- file: 41.250.78.102
- hash: 2080
- file: 41.250.78.102
- hash: 17309
- file: 41.250.78.102
- hash: 49152
- file: 41.250.78.102
- hash: 1311
- file: 41.250.78.102
- hash: 7547
- file: 41.250.78.102
- hash: 35304
- file: 41.250.78.102
- hash: 37777
- file: 41.250.78.102
- hash: 44818
- file: 41.250.78.102
- hash: 788
- file: 41.250.78.102
- hash: 3631
- file: 41.250.78.102
- hash: 5168
- file: 41.250.78.102
- hash: 1912
- file: 41.250.78.102
- hash: 2083
- file: 41.250.78.102
- hash: 23066
- file: 41.250.78.102
- hash: 8636
- file: 41.250.78.102
- hash: 33635
- file: 41.250.78.102
- hash: 13401
- file: 41.250.78.102
- hash: 24531
- file: 41.250.78.102
- hash: 2222
- file: 41.250.78.102
- hash: 2323
- file: 41.250.78.102
- hash: 8080
- file: 41.250.78.102
- hash: 2456
- file: 41.250.78.102
- hash: 10443
- file: 41.250.78.102
- hash: 20935
- file: 41.250.78.102
- hash: 65306
- file: 41.250.78.102
- hash: 6362
- file: 41.250.78.102
- hash: 8081
- file: 41.250.78.102
- hash: 50172
- file: 41.250.78.102
- hash: 4444
- file: 41.250.78.102
- hash: 17777
- file: 41.250.78.102
- hash: 24312
- file: 41.250.78.102
- hash: 10239
- file: 41.250.78.102
- hash: 12226
- file: 41.250.78.102
- hash: 1961
- file: 41.250.78.102
- hash: 2087
- file: 41.250.78.102
- hash: 2380
- file: 41.250.78.102
- hash: 28498
- file: 41.250.78.102
- hash: 42246
- file: 41.250.78.102
- hash: 16993
- file: 41.250.78.102
- hash: 49646
- file: 41.250.78.102
- hash: 80
- file: 41.250.78.102
- hash: 789
- file: 41.250.78.102
- hash: 10814
- file: 41.250.78.102
- hash: 8443
- file: 41.250.78.102
- hash: 22222
- file: 41.250.78.102
- hash: 554
- file: 41.250.78.102
- hash: 4541
- file: 41.250.78.102
- hash: 16417
- file: 41.250.78.102
- hash: 5433
- file: 41.250.78.102
- hash: 12598
- file: 41.250.78.102
- hash: 41700
- file: 144.202.127.142
- hash: 80
- domain: info.royalreturns.org
- file: 147.182.231.136
- hash: 3333
- domain: wings.pokemulti.fr
- file: 86.120.23.71
- hash: 5000
- file: 88.198.119.36
- hash: 443
- file: 1.94.61.238
- hash: 60000
- file: 74.225.130.162
- hash: 443
- file: 185.119.90.224
- hash: 3333
- file: 217.160.234.90
- hash: 3553
- file: 46.101.33.238
- hash: 3333
- file: 159.75.174.58
- hash: 9205
- file: 138.199.149.107
- hash: 443
- file: 212.227.80.125
- hash: 8443
- file: 41.230.194.38
- hash: 443
- hash: 834f137f9039041bccb4b414154a596c
- hash: b99bdb8880e4ef03727885ea50a4a2fc
- domain: maximu.sbs
- url: https://116.203.166.124
- hash: 73744280fb8e7db578c9303b7620fb16
- url: http://103.200.85.238:59852/mozi.m
- hash: c233aec7917cf34294c19dd60ff79a6e0fac5ed6f0cb57af98013c08201a7a1c
- hash: 66dbf939c00b09d8d22c692864b68c4a602e7a59c4b925b2e2bef57b1ad047bd
- hash: dcf536edd67a98868759f4e72bcbd1f4404c70048a2a3257e77d8af06cb036ac
- hash: b1ef7b267d887e34bf0242a94b38e7dc9fd5e6f8b2c5c440ce4ec98cc74642fb
- hash: 5226ea8e0f516565ba825a1bbed10020982c16414750237068b602c5b4ac6abd
- hash: e622f3b743c7fc0a011b07a2e656aa2b5e50a4876721bcf1f405d582ca4cda22
- hash: 20ed21bfdb7aa970b12e7368eba8e26a711752f1cc5416b6fd6629d0e2a44e5d
- hash: dd15ce869aa79884753e3baad19b0437075202be86268b84f3ec2303e1ecd966
- hash: 7e223a685d5324491bcacf3127869f9f3ec5d5100c5e7cb5af45a227e6ab4603
- domain: order.buyanemostatonline.com
- file: 52.212.200.0
- hash: 4949
- file: 103.68.251.141
- hash: 1604
- file: 154.91.4.5
- hash: 3333
- file: 181.50.73.64
- hash: 9398
- file: 116.203.11.8
- hash: 443
- url: https://maximu.sbs/
- url: https://88.198.119.36/
- file: 47.128.167.72
- hash: 81
- file: 178.255.222.6
- hash: 8080
- domain: sub172.duckdns.org
- file: 94.232.40.32
- hash: 443
- file: 124.70.134.194
- hash: 443
- file: 212.34.147.3
- hash: 80
- domain: interacdeposittransfer10001.com
- file: 121.199.10.233
- hash: 443
- file: 5.252.178.185
- hash: 8080
- file: 144.217.36.75
- hash: 8808
- file: 88.243.168.51
- hash: 20000
- file: 39.100.75.168
- hash: 7443
- file: 79.241.99.57
- hash: 82
- file: 77.105.147.74
- hash: 4000
- file: 85.239.54.99
- hash: 5362
- url: http://106.53.83.169:60127/updates.rss
- file: 93.123.109.39
- hash: 4449
- url: http://this-is-the.b-cdn.net/last/stage/verification/pass-this-step-to-continue.html
- url: http://you-have-to-i.b-cdn.net/last/stage/verification/pass-this-step-to-continue.html
- file: 91.193.19.109
- hash: 13333
- file: 50.18.195.138
- hash: 8444
- file: 195.177.92.88
- hash: 1912
- file: 217.69.2.169
- hash: 80
- domain: mailg-id.one
- domain: ados.fyicompsol.xyz
- domain: kens.fyicompsol.xyz
- domain: kila.fyicompsol.xyz
- domain: rkde.fyicompsol.xyz
- domain: alshamtech.nl
- domain: valhafather.xyz
- domain: fqbe23.xyz
- url: https://prpages.com/4e2e.js
- domain: prpages.com
- url: https://prpages.com/js.php
- url: http://lggknhaffleahbh.top/1.php
- domain: offerszone.click
- domain: sharethewebs.cfd
- domain: wordpress-redirect.biz
- domain: valhafather.xyz
- domain: fqbe23.xyz
- domain: email.gov.in.ministryofdefenceindia.link
- file: 52.73.20.0
- hash: 80
- file: 89.117.109.189
- hash: 31337
- file: 165.22.91.195
- hash: 10001
- file: 72.5.43.162
- hash: 444
- url: https://94.156.177.41/mars/five/pvqdq929bsx_a_d_m1n_a.php
- url: https://77.83.175.91/69d96d770568584a.php
- url: https://77.220.212.32/eb51242cada87444.php
- url: http://154.216.20.246/f493d73b2e06dbd2/sqlite3.dll
- url: http://154.216.20.246/f493d73b2e06dbd2/mozglue.dll
- url: https://45.88.76.207/4b4e7c1351c9e2eb/sqlite3.dll
- url: http://147.45.44.190/dace046278f1f1ba/vcruntime140.dll
- url: http://147.45.44.190/dace046278f1f1ba/sqlite3.dll
- url: http://62.204.41.163/2c3d53f1da5ea53a/vcruntime140.dll
- url: http://5.188.86.231/20bec3f306af6847/vcruntime140.dll
- url: http://5.188.86.231/20bec3f306af6847/sqlite3.dll
- domain: vpsdns.casacam.net
- domain: awake-weaves.cyou
- domain: covery-mover.biz
- domain: dare-curbys.biz
- domain: dwell-exclaim.biz
- domain: fixxyplanterv.click
- domain: formy-spill.biz
- domain: impend-differ.biz
- domain: mutterunurse.click
- domain: print-vexer.biz
- domain: se-blurry.biz
- domain: sordid-snaked.cyou
- domain: wrathful-jammy.cyou
- domain: zinc-sneark.biz
- domain: accommodation-necessity.gl.at.ply.gg
- domain: adilfgilitter-43126.portmap.host
- domain: around-surprise.gl.at.ply.gg
- domain: edit-beats.gl.at.ply.gg
- domain: likejunk-40343.portmap.host
- domain: right-cleared.gl.at.ply.gg
- file: 23.247.130.245
- hash: 80
- file: 148.135.86.38
- hash: 80
- file: 207.148.121.17
- hash: 8080
- file: 38.134.148.115
- hash: 443
- file: 47.120.60.180
- hash: 2222
- file: 49.232.65.225
- hash: 6005
- file: 111.180.144.115
- hash: 8888
- file: 173.44.139.179
- hash: 80
- file: 31.58.169.105
- hash: 6606
- file: 31.58.169.105
- hash: 7707
- file: 91.191.213.118
- hash: 6606
- file: 87.120.116.169
- hash: 7707
- file: 188.127.247.213
- hash: 6606
- file: 188.127.247.213
- hash: 7707
- file: 128.90.113.97
- hash: 9999
- file: 67.219.111.218
- hash: 7443
- file: 195.133.51.108
- hash: 443
- domain: floradocs.live
- domain: wordpress-redirect.biz
- domain: data-redirect.biz
- domain: wordpress-request.com
- domain: wordpress-defense.com
- domain: redirect-security.digital
- domain: wordpress-secirity.org
- domain: wordpress-safety.org
- domain: wordpress-team.org
- domain: wordpress-control.org
- domain: wordpress-secure.org
- domain: serverproxy-v2homes.life
- domain: panel-alert-v1.homes
- file: 198.12.127.223
- hash: 443
- file: 54.162.3.167
- hash: 1433
- domain: js-stats.com
- domain: googlsearchings.shop
- domain: googlsearchings.sbs
- domain: googlsearchings.online
- domain: googlsearchings.guru
- domain: googlsearchings.cfd
- domain: googlsearchings.art
- domain: royaltyfree.click
- domain: royaltyfree.pics
- domain: sharethewebs.click
- domain: sharethewebs.online
- domain: sharethewebs.art
- domain: royaltyfree.quest
- domain: googlsearchings.click
- domain: googlsearchings.quest
- domain: googlsearchings.xyz
- domain: googlsearchings.wiki
- domain: googlsearchings.site
- url: http://www.eautylab.fun/g10y/
- url: https://taymodel.top/work/original.js
- domain: taymodel.top
- url: https://taymodel.top/work/index.php
- url: https://taymodel.top/work/help.php
- url: https://mffaccessories.com/debug.zip
- domain: royaltyfree.cfd
- domain: royaltyfree.fun
- domain: royaltyfree.online
- domain: royaltyfree.site
- domain: accept.bar
- domain: amocha.xyz
- domain: cdn-webstats.com
- domain: clearnetfab.net
- domain: fallodick87-78.sbs
- domain: cd.iconstaff.top
- domain: cdn.iconstaff.top
- domain: cdn.inspectdlet.net
- domain: jqueryuslibs.com
- domain: jstatic201.com
- domain: lererikal.org
- domain: mamatmavali.ru
- domain: nothingillegal.bond
- domain: paie-locli.com
- domain: sellerstat.site
- domain: statsseo.com
- domain: statstoday.org
- domain: vincaolet.xyz
- domain: webexcelsior.org
- domain: admin.capctha.world
- domain: capctha.world
- file: 185.77.174.191
- hash: 443
- file: 155.138.225.144
- hash: 2053
- url: http://www.milp.store/2j93/
- domain: curtainykeo.lat
- domain: loodyswif.lat
- domain: urtainykeo.lat
- domain: inickypwk.lat
- domain: ickykiduz.lat
- domain: eggelatez.lat
- domain: iniatureyu.lat
- domain: avorraiykj.lat
- domain: hoefeatthe.lat
- domain: ashyceehsu.lat
- file: 157.230.12.133
- hash: 443
- domain: poisonx.in
- file: 185.174.101.126
- hash: 2405
- file: 212.34.147.3
- hash: 8080
- file: 107.155.93.118
- hash: 8808
- file: 45.149.241.217
- hash: 8808
- domain: microsoft-onedrive.upgrade1.zip
- domain: accounts4.app-cloud.link
- file: 13.208.43.151
- hash: 503
- file: 35.76.114.8
- hash: 56549
- url: https://curtainykeo.lat/api
- url: https://loodyswif.lat/api
- url: https://urtainykeo.lat/api
- url: https://inickypwk.lat/api
- url: https://ickykiduz.lat/api
- url: https://eggelatez.lat/api
- url: https://iniatureyu.lat/api
- url: https://avorraiykj.lat/api
- url: https://hoefeatthe.lat/api
- url: https://ashyceehsu.lat/api
- domain: www.jvsov.top
- file: 110.42.252.7
- hash: 31337
- file: 188.245.67.69
- hash: 31337
- file: 103.57.130.241
- hash: 54984
- file: 118.178.89.212
- hash: 4434
- file: 173.249.54.213
- hash: 4443
- file: 13.208.63.232
- hash: 4282
- file: 147.185.221.24
- hash: 21180
- file: 147.185.221.24
- hash: 4444
- domain: home789.no-ip.biz
- domain: other-little.gl.at.ply.gg
- domain: www.kposlifestyle.design
- file: 194.180.48.18
- hash: 45265
- domain: myskibiditoilet.zapto.org
- url: http://www.se-online.net/g10y/
- url: http://www.sertc.xyz/g10y/
- url: http://www.aelo.xyz/g10y/
- url: http://www.elax.xyz/g10y/
- url: https://royaltyfree.click/api
- domain: identify-wpenglne.com
- url: https://116.203.11.8/
- domain: avgus.rest
- file: 123.60.183.172
- hash: 2443
- file: 164.215.103.82
- hash: 80
- file: 157.230.12.133
- hash: 80
- file: 124.221.5.207
- hash: 1444
- file: 95.214.234.153
- hash: 443
- file: 104.243.35.241
- hash: 8808
- file: 109.199.101.109
- hash: 1000
- file: 91.191.213.118
- hash: 7000
- file: 154.12.229.73
- hash: 8808
- file: 84.32.188.164
- hash: 39635
- file: 45.12.142.154
- hash: 443
- file: 113.44.50.33
- hash: 4782
- file: 3.70.183.47
- hash: 2
- file: 209.151.154.69
- hash: 8000
- file: 115.120.246.236
- hash: 60000
- file: 149.104.30.51
- hash: 60000
- file: 149.28.157.236
- hash: 8888
- file: 197.0.15.67
- hash: 443
- file: 34.42.9.169
- hash: 443
- file: 62.68.75.16
- hash: 40056
- file: 88.234.24.213
- hash: 443
- file: 203.144.184.187
- hash: 8594
- file: 212.115.109.161
- hash: 6000
- domain: elevenff11pn.top
- domain: eternitysystems.online
- domain: cs55120.tw1.ru
- domain: andre2tn.beget.tech
- domain: medicaljummtj.shop
- domain: toppywook.shop
- domain: burnwastefulke.shop
- domain: shootmixxej.shop
- domain: overtyfruitz.shop
- domain: ripehungryde.click
- domain: skatestringje.click
- domain: kiterexchangez.click
- domain: cultureddirtys.click
- domain: produceresov.click
- domain: supplyedtwoz.click
- domain: corruptedusz.cyou
- domain: motivatefaul.cyou
- domain: rifledford.cyou
- domain: breakfasutwy.cyou
- domain: priceygoveiuz.cyou
- domain: welcomeabjesu.cyou
- domain: fascinatterz.cyou
- url: https://fascinatterz.cyou/api
- url: https://welcomeabjesu.cyou/api
- url: https://priceygoveiuz.cyou/api
- url: https://breakfasutwy.cyou/api
- url: https://rifledford.cyou/api
- url: https://motivatefaul.cyou/api
- url: https://corruptedusz.cyou/api
- url: https://supplyedtwoz.click/api
- url: https://produceresov.click/api
- url: https://cultureddirtys.click/api
- url: https://kiterexchangez.click/api
- url: https://skatestringje.click/api
- url: https://ripehungryde.click/api
- url: https://overtyfruitz.shop/api
- url: https://shootmixxej.shop/api
- url: https://burnwastefulke.shop/api
- url: https://medicaljummtj.shop/api
- domain: oneb1pt.top
- domain: thretenb13vs.top
- domain: elevenb11vs.top
- domain: neinb9pt.top
- domain: neinb9vs.top
- domain: tenb10vs.top
- domain: twelverb12vs.top
- file: 85.192.29.60
- hash: 5173
- file: 45.136.51.217
- hash: 5173
ThreatFox IOCs for 2025-01-13
Description
ThreatFox IOCs for 2025-01-13
AI-Powered Analysis
Technical Analysis
The provided threat intelligence pertains to a malware-related report titled 'ThreatFox IOCs for 2025-01-13,' sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The threat is categorized under 'malware' with a medium severity rating and is tagged as 'type:osint' and 'tlp:white,' indicating that the information is openly shareable without restrictions. The technical details include a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, suggesting moderate dissemination potential. However, there are no specific affected product versions, CWE identifiers, patch links, or known exploits in the wild associated with this threat. Additionally, no concrete indicators such as file hashes, IP addresses, or domain names are provided, limiting the ability to perform targeted detection or response. The absence of detailed technical indicators and exploit information implies that this report is more of a preparatory or informational nature, possibly aggregating IOCs for future reference rather than describing an active or imminent threat. The 'osint' product tag suggests that this intelligence is derived from open-source intelligence gathering rather than proprietary or closed-source detection methods. Overall, this threat intelligence entry appears to be a general update or collection of IOCs related to malware activity without immediate actionable exploitation details.
Potential Impact
Given the lack of specific technical indicators, affected software versions, or known active exploits, the immediate impact on European organizations is likely limited. However, the medium severity rating and moderate distribution score indicate that the malware or associated IOCs could be part of a broader campaign or emerging threat that may evolve. European organizations, especially those relying on open-source intelligence tools or platforms that aggregate such data, might face risks if these IOCs correspond to malware variants targeting their environments. Potential impacts include unauthorized access, data exfiltration, or disruption if the malware is deployed successfully. The absence of known exploits in the wild reduces the likelihood of immediate compromise but does not eliminate future risk. Organizations involved in cybersecurity monitoring, threat hunting, or incident response could benefit from integrating these IOCs into their detection frameworks to enhance situational awareness. The impact is more pronounced for sectors with high exposure to malware threats, such as finance, critical infrastructure, and government entities within Europe.
Mitigation Recommendations
1. Integrate the provided IOCs from ThreatFox into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) systems to enhance detection capabilities, even though specific indicators are not listed here, organizations should monitor ThreatFox for updates. 2. Maintain up-to-date threat intelligence feeds and subscribe to platforms like ThreatFox to receive timely IOC updates and contextual information. 3. Conduct regular threat hunting exercises focusing on malware behaviors and patterns that align with the medium severity threat level indicated. 4. Ensure robust endpoint protection solutions are deployed and configured to detect and block malware activities, including heuristic and behavioral analysis capabilities. 5. Implement network segmentation and strict access controls to limit malware propagation in case of infection. 6. Educate security teams on the importance of open-source intelligence and how to leverage TLP:white tagged information responsibly. 7. Since no patches or CVEs are associated, focus on proactive monitoring and anomaly detection rather than patch management for this specific threat. 8. Collaborate with European cybersecurity information sharing organizations (e.g., ENISA, CERT-EU) to contextualize and respond to emerging threats effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 959554af-637e-49dd-bf4c-7b91d7a36a11
- Original Timestamp
- 1736812987
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domaindaxon.giize.com | DCRat botnet C2 domain (confidence level: 50%) | |
domainawake-weaves.cyou | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainsordid-snaked.cyou | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainwrathful-jammy.cyou | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainjapanese-cross.gl.at.ply.gg | NjRAT botnet C2 domain (confidence level: 50%) | |
domainp8stolo-29468.portmap.host | Quasar RAT botnet C2 domain (confidence level: 50%) | |
domainadilfgilitter-43126.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domainawiero-42728.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domainedit-beats.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainplan-view.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainright-cleared.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainsale-er.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainstorage-plugin.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainmisha-lomonosov.com | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainres.mllcrosoft.com | Havoc botnet C2 domain (confidence level: 100%) | |
domaindckhgjimeghemhl.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainjejmbadfmeenlnk.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaincanjjclmlnicbga.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainkmaealcfcalhcac.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainbmbuz83hhhhg73.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainksdgbx9oenj.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainpitibnzi4un.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainafnfdijahijefmh.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainiblaehgffmflamn.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainbfhdkgmmhdbikgj.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainkdemjgebjimkanl.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaincmacnnkfbhlcncm.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainbkkeiekjfcdaaen.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainjlijkijkkklbkjn.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainruhybh74ub.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainfdsgujhnby.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmubuzb3vvv.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmnudybh4unh.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmbuz73hb7z3.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainnubxz4ubhxz9i.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainpoeiughybzu222.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainpoubnxu3jubz.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainlgbibzuehbz.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainohunhebzhbu3.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainsdubvlbbuz3vzzz.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainbnbuzu49ibz4.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainshd9inbjz4.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainngub8zb38ib.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaingkn33hxueub.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmnvuz3gvy3.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainjhubzgv3.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainbmadfjbhnijhckh.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainjhkenjhehiadfbn.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainfgghahagiiekjhg.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainnbcjihgecijhmnl.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainhkmlchlbjibdafd.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainbginkhdndigadkj.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmiutubzxe.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainghybu8as.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainiiuthbuzev.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainbnayvhgb8.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainkffgkjmjangegkg.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaingnmdjjckbgddaie.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaincignjjgmdnbchhc.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmcajijknegnbbga.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainikhgijabfnkajem.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaineebchjechginddk.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainanjmhjidinfmlci.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainkhcjgjmfjgdleag.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaingbkffjcglabkmne.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainckebfjgimhmjgmb.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmelmejkjaakiakn.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainimfiejalbhhgijl.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainehnediemcaffbij.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainabhbdiiaehdejgh.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainkjalcimbfaaddff.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaingdihcicdghmcldd.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaincmcebigeiajbfcb.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainmgjabikgjhhambm.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainiadkainhkafngnk.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainejlhaidjmhcmami.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domaincpcontacts.sumup.live | Hook botnet C2 domain (confidence level: 100%) | |
domaing.sst.upgrade1.zip | Havoc botnet C2 domain (confidence level: 100%) | |
domaininfo.royalreturns.org | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainwings.pokemulti.fr | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainmaximu.sbs | Vidar botnet C2 domain (confidence level: 100%) | |
domainorder.buyanemostatonline.com | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domainsub172.duckdns.org | Crimson RAT botnet C2 domain (confidence level: 100%) | |
domaininteracdeposittransfer10001.com | Remcos botnet C2 domain (confidence level: 100%) | |
domainmailg-id.one | DUCKTAIL botnet C2 domain (confidence level: 100%) | |
domainados.fyicompsol.xyz | Spyder Patchwork payload delivery domain (confidence level: 100%) | |
domainkens.fyicompsol.xyz | Spyder Patchwork payload delivery domain (confidence level: 100%) | |
domainkila.fyicompsol.xyz | Spyder Patchwork payload delivery domain (confidence level: 100%) | |
domainrkde.fyicompsol.xyz | Spyder Patchwork payload delivery domain (confidence level: 100%) | |
domainalshamtech.nl | DUCKTAIL payload delivery domain (confidence level: 100%) | |
domainvalhafather.xyz | Unknown malware credit card skimming domain (confidence level: 50%) | |
domainfqbe23.xyz | Unknown malware credit card skimming domain (confidence level: 50%) | |
domainprpages.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainofferszone.click | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainsharethewebs.cfd | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainwordpress-redirect.biz | magecart botnet C2 domain (confidence level: 100%) | |
domainvalhafather.xyz | magecart botnet C2 domain (confidence level: 100%) | |
domainfqbe23.xyz | magecart botnet C2 domain (confidence level: 100%) | |
domainemail.gov.in.ministryofdefenceindia.link | Crimson RAT botnet C2 domain (confidence level: 50%) | |
domainvpsdns.casacam.net | AsyncRAT botnet C2 domain (confidence level: 50%) | |
domainawake-weaves.cyou | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaincovery-mover.biz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaindare-curbys.biz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaindwell-exclaim.biz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainfixxyplanterv.click | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainformy-spill.biz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainimpend-differ.biz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainmutterunurse.click | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainprint-vexer.biz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainse-blurry.biz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainsordid-snaked.cyou | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainwrathful-jammy.cyou | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainzinc-sneark.biz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainaccommodation-necessity.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainadilfgilitter-43126.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domainaround-surprise.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainedit-beats.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainlikejunk-40343.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domainright-cleared.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainfloradocs.live | Rhadamanthys botnet C2 domain (confidence level: 100%) | |
domainwordpress-redirect.biz | magecart botnet C2 domain (confidence level: 100%) | |
domaindata-redirect.biz | magecart botnet C2 domain (confidence level: 100%) | |
domainwordpress-request.com | magecart botnet C2 domain (confidence level: 100%) | |
domainwordpress-defense.com | magecart botnet C2 domain (confidence level: 100%) | |
domainredirect-security.digital | magecart botnet C2 domain (confidence level: 100%) | |
domainwordpress-secirity.org | magecart botnet C2 domain (confidence level: 100%) | |
domainwordpress-safety.org | magecart botnet C2 domain (confidence level: 100%) | |
domainwordpress-team.org | magecart botnet C2 domain (confidence level: 100%) | |
domainwordpress-control.org | magecart botnet C2 domain (confidence level: 100%) | |
domainwordpress-secure.org | magecart botnet C2 domain (confidence level: 100%) | |
domainserverproxy-v2homes.life | magecart botnet C2 domain (confidence level: 100%) | |
domainpanel-alert-v1.homes | magecart botnet C2 domain (confidence level: 100%) | |
domainjs-stats.com | magecart botnet C2 domain (confidence level: 100%) | |
domaingooglsearchings.shop | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.sbs | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.online | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.guru | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.cfd | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.art | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainroyaltyfree.click | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainroyaltyfree.pics | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainsharethewebs.click | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainsharethewebs.online | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainsharethewebs.art | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainroyaltyfree.quest | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.click | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.quest | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.xyz | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.wiki | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaingooglsearchings.site | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaintaymodel.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainroyaltyfree.cfd | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainroyaltyfree.fun | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainroyaltyfree.online | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainroyaltyfree.site | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainaccept.bar | magecart botnet C2 domain (confidence level: 100%) | |
domainamocha.xyz | magecart botnet C2 domain (confidence level: 100%) | |
domaincdn-webstats.com | magecart botnet C2 domain (confidence level: 100%) | |
domainclearnetfab.net | magecart botnet C2 domain (confidence level: 100%) | |
domainfallodick87-78.sbs | magecart botnet C2 domain (confidence level: 100%) | |
domaincd.iconstaff.top | magecart botnet C2 domain (confidence level: 100%) | |
domaincdn.iconstaff.top | magecart botnet C2 domain (confidence level: 100%) | |
domaincdn.inspectdlet.net | magecart botnet C2 domain (confidence level: 100%) | |
domainjqueryuslibs.com | magecart botnet C2 domain (confidence level: 100%) | |
domainjstatic201.com | magecart botnet C2 domain (confidence level: 100%) | |
domainlererikal.org | magecart botnet C2 domain (confidence level: 100%) | |
domainmamatmavali.ru | magecart botnet C2 domain (confidence level: 100%) | |
domainnothingillegal.bond | magecart botnet C2 domain (confidence level: 100%) | |
domainpaie-locli.com | magecart botnet C2 domain (confidence level: 100%) | |
domainsellerstat.site | magecart botnet C2 domain (confidence level: 100%) | |
domainstatsseo.com | magecart botnet C2 domain (confidence level: 100%) | |
domainstatstoday.org | magecart botnet C2 domain (confidence level: 100%) | |
domainvincaolet.xyz | magecart botnet C2 domain (confidence level: 100%) | |
domainwebexcelsior.org | magecart botnet C2 domain (confidence level: 100%) | |
domainadmin.capctha.world | Unknown malware payload delivery domain (confidence level: 100%) | |
domaincapctha.world | Unknown malware payload delivery domain (confidence level: 100%) | |
domaincurtainykeo.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainloodyswif.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainurtainykeo.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaininickypwk.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainickykiduz.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaineggelatez.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaininiatureyu.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainavorraiykj.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainhoefeatthe.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainashyceehsu.lat | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpoisonx.in | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainmicrosoft-onedrive.upgrade1.zip | Havoc botnet C2 domain (confidence level: 100%) | |
domainaccounts4.app-cloud.link | Havoc botnet C2 domain (confidence level: 100%) | |
domainwww.jvsov.top | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainhome789.no-ip.biz | NjRAT botnet C2 domain (confidence level: 50%) | |
domainother-little.gl.at.ply.gg | Quasar RAT botnet C2 domain (confidence level: 50%) | |
domainwww.kposlifestyle.design | Remcos botnet C2 domain (confidence level: 50%) | |
domainmyskibiditoilet.zapto.org | XWorm botnet C2 domain (confidence level: 50%) | |
domainidentify-wpenglne.com | FAKEUPDATES payload delivery domain (confidence level: 75%) | |
domainavgus.rest | Vidar botnet C2 domain (confidence level: 100%) | |
domainelevenff11pn.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaineternitysystems.online | DCRat botnet C2 domain (confidence level: 100%) | |
domaincs55120.tw1.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domainandre2tn.beget.tech | DCRat botnet C2 domain (confidence level: 100%) | |
domainmedicaljummtj.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintoppywook.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainburnwastefulke.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainshootmixxej.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainovertyfruitz.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainripehungryde.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainskatestringje.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainkiterexchangez.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincultureddirtys.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainproduceresov.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainsupplyedtwoz.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincorruptedusz.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmotivatefaul.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainrifledford.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainbreakfasutwy.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpriceygoveiuz.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainwelcomeabjesu.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainfascinatterz.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainoneb1pt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainthretenb13vs.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainelevenb11vs.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainneinb9pt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainneinb9vs.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintenb10vs.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintwelverb12vs.top | CryptBot botnet C2 domain (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file45.61.159.148 | DCRat botnet C2 server (confidence level: 50%) | |
file87.120.126.73 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file203.227.62.91 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file38.55.193.31 | Sliver botnet C2 server (confidence level: 100%) | |
file108.165.237.230 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file141.95.114.241 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file167.114.145.155 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file185.101.104.3 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file54.179.92.3 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file181.162.162.136 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file185.196.10.2 | Latrodectus botnet C2 server (confidence level: 75%) | |
file64.190.113.229 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
file104.168.45.25 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file18.212.130.9 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file198.12.127.223 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file162.33.178.216 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
file64.52.80.74 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
file45.61.136.166 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
file64.52.80.100 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
file54.83.104.93 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.77.153.108 | ShadowPad botnet C2 server (confidence level: 90%) | |
file45.77.153.108 | ShadowPad botnet C2 server (confidence level: 90%) | |
file64.176.35.214 | ShadowPad botnet C2 server (confidence level: 90%) | |
file198.167.199.190 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file190.203.34.71 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file165.227.237.151 | Havoc botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file41.250.78.102 | Venom RAT botnet C2 server (confidence level: 100%) | |
file144.202.127.142 | Stealc botnet C2 server (confidence level: 100%) | |
file147.182.231.136 | Unknown malware botnet C2 server (confidence level: 100%) | |
file86.120.23.71 | Unknown malware botnet C2 server (confidence level: 100%) | |
file88.198.119.36 | Vidar botnet C2 server (confidence level: 100%) | |
file1.94.61.238 | Unknown malware botnet C2 server (confidence level: 100%) | |
file74.225.130.162 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.119.90.224 | Unknown malware botnet C2 server (confidence level: 100%) | |
file217.160.234.90 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.101.33.238 | Unknown malware botnet C2 server (confidence level: 100%) | |
file159.75.174.58 | Unknown malware botnet C2 server (confidence level: 100%) | |
file138.199.149.107 | Unknown malware botnet C2 server (confidence level: 100%) | |
file212.227.80.125 | Unknown malware botnet C2 server (confidence level: 100%) | |
file41.230.194.38 | QakBot botnet C2 server (confidence level: 100%) | |
file52.212.200.0 | Unknown malware botnet C2 server (confidence level: 50%) | |
file103.68.251.141 | DarkComet botnet C2 server (confidence level: 50%) | |
file154.91.4.5 | Unknown malware botnet C2 server (confidence level: 50%) | |
file181.50.73.64 | Unknown malware botnet C2 server (confidence level: 50%) | |
file116.203.11.8 | Vidar botnet C2 server (confidence level: 100%) | |
file47.128.167.72 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file178.255.222.6 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file94.232.40.32 | Latrodectus botnet C2 server (confidence level: 75%) | |
file124.70.134.194 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file212.34.147.3 | Remcos botnet C2 server (confidence level: 100%) | |
file121.199.10.233 | Sliver botnet C2 server (confidence level: 100%) | |
file5.252.178.185 | ShadowPad botnet C2 server (confidence level: 90%) | |
file144.217.36.75 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file88.243.168.51 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file39.100.75.168 | Unknown malware botnet C2 server (confidence level: 100%) | |
file79.241.99.57 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file77.105.147.74 | Unknown malware botnet C2 server (confidence level: 100%) | |
file85.239.54.99 | BianLian botnet C2 server (confidence level: 100%) | |
file93.123.109.39 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file91.193.19.109 | xmrig botnet C2 server (confidence level: 49%) | |
file50.18.195.138 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file195.177.92.88 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file217.69.2.169 | AMOS botnet C2 server (confidence level: 100%) | |
file52.73.20.0 | Unknown malware botnet C2 server (confidence level: 50%) | |
file89.117.109.189 | Sliver botnet C2 server (confidence level: 50%) | |
file165.22.91.195 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file72.5.43.162 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file23.247.130.245 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file148.135.86.38 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file207.148.121.17 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file38.134.148.115 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.120.60.180 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file49.232.65.225 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file111.180.144.115 | Unknown malware botnet C2 server (confidence level: 100%) | |
file173.44.139.179 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file31.58.169.105 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file31.58.169.105 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file91.191.213.118 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file87.120.116.169 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file188.127.247.213 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file188.127.247.213 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file128.90.113.97 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file67.219.111.218 | Unknown malware botnet C2 server (confidence level: 100%) | |
file195.133.51.108 | Havoc botnet C2 server (confidence level: 100%) | |
file198.12.127.223 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file54.162.3.167 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file185.77.174.191 | QakBot botnet C2 server (confidence level: 75%) | |
file155.138.225.144 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file157.230.12.133 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.174.101.126 | Remcos botnet C2 server (confidence level: 100%) | |
file212.34.147.3 | Remcos botnet C2 server (confidence level: 100%) | |
file107.155.93.118 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.149.241.217 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file13.208.43.151 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file35.76.114.8 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file110.42.252.7 | Sliver payload delivery server (confidence level: 50%) | |
file188.245.67.69 | Sliver payload delivery server (confidence level: 50%) | |
file103.57.130.241 | Nanocore RAT payload delivery server (confidence level: 50%) | |
file118.178.89.212 | Cobalt Strike payload delivery server (confidence level: 50%) | |
file173.249.54.213 | Unknown malware botnet C2 server (confidence level: 50%) | |
file13.208.63.232 | Unknown malware botnet C2 server (confidence level: 50%) | |
file147.185.221.24 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file147.185.221.24 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file194.180.48.18 | Remcos botnet C2 server (confidence level: 50%) | |
file123.60.183.172 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file164.215.103.82 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file157.230.12.133 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.221.5.207 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file95.214.234.153 | Remcos botnet C2 server (confidence level: 100%) | |
file104.243.35.241 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file109.199.101.109 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file91.191.213.118 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file154.12.229.73 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file84.32.188.164 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.12.142.154 | Unknown malware botnet C2 server (confidence level: 100%) | |
file113.44.50.33 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file3.70.183.47 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file209.151.154.69 | MimiKatz botnet C2 server (confidence level: 100%) | |
file115.120.246.236 | Viper RAT botnet C2 server (confidence level: 75%) | |
file149.104.30.51 | Viper RAT botnet C2 server (confidence level: 75%) | |
file149.28.157.236 | Sliver botnet C2 server (confidence level: 75%) | |
file197.0.15.67 | QakBot botnet C2 server (confidence level: 75%) | |
file34.42.9.169 | DanaBot botnet C2 server (confidence level: 75%) | |
file62.68.75.16 | Havoc botnet C2 server (confidence level: 75%) | |
file88.234.24.213 | QakBot botnet C2 server (confidence level: 75%) | |
file203.144.184.187 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file212.115.109.161 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file85.192.29.60 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file45.136.51.217 | Quasar RAT botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash1111 | DCRat botnet C2 server (confidence level: 50%) | |
hash8000 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8080 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 75%) | |
hash80 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash4443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
hash80 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
hash80 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
hash80 | FAKEUPDATES payload delivery server (confidence level: 100%) | |
hash1433 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash19132 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash4099 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash21309 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash2080 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash17309 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash49152 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash1311 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash7547 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash35304 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash37777 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash44818 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash788 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash3631 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash5168 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash1912 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash2083 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash23066 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash8636 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash33635 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash13401 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash24531 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash2222 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash2323 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash8080 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash2456 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash10443 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash20935 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash65306 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash6362 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash8081 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash50172 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash4444 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash17777 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash24312 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash10239 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash12226 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash1961 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash2087 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash2380 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash28498 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash42246 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash16993 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash49646 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash80 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash789 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash10814 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash8443 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash22222 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash554 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash4541 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash16417 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash5433 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash12598 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash41700 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash5000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3553 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9205 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 100%) | |
hash834f137f9039041bccb4b414154a596c | Akira payload (confidence level: 50%) | |
hashb99bdb8880e4ef03727885ea50a4a2fc | Akira payload (confidence level: 50%) | |
hash73744280fb8e7db578c9303b7620fb16 | Unknown malware payload (confidence level: 50%) | |
hashc233aec7917cf34294c19dd60ff79a6e0fac5ed6f0cb57af98013c08201a7a1c | Unknown malware payload (confidence level: 50%) | |
hash66dbf939c00b09d8d22c692864b68c4a602e7a59c4b925b2e2bef57b1ad047bd | Unknown malware payload (confidence level: 50%) | |
hashdcf536edd67a98868759f4e72bcbd1f4404c70048a2a3257e77d8af06cb036ac | Unknown malware payload (confidence level: 50%) | |
hashb1ef7b267d887e34bf0242a94b38e7dc9fd5e6f8b2c5c440ce4ec98cc74642fb | Unknown malware payload (confidence level: 50%) | |
hash5226ea8e0f516565ba825a1bbed10020982c16414750237068b602c5b4ac6abd | Unknown malware payload (confidence level: 50%) | |
hashe622f3b743c7fc0a011b07a2e656aa2b5e50a4876721bcf1f405d582ca4cda22 | Unknown malware payload (confidence level: 50%) | |
hash20ed21bfdb7aa970b12e7368eba8e26a711752f1cc5416b6fd6629d0e2a44e5d | Unknown malware payload (confidence level: 50%) | |
hashdd15ce869aa79884753e3baad19b0437075202be86268b84f3ec2303e1ecd966 | Unknown malware payload (confidence level: 50%) | |
hash7e223a685d5324491bcacf3127869f9f3ec5d5100c5e7cb5af45a227e6ab4603 | Unknown malware payload (confidence level: 50%) | |
hash4949 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash1604 | DarkComet botnet C2 server (confidence level: 50%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash9398 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash81 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8080 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash20000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash82 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash4000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash5362 | BianLian botnet C2 server (confidence level: 100%) | |
hash4449 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash13333 | xmrig botnet C2 server (confidence level: 49%) | |
hash8444 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash1912 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | AMOS botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash444 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2222 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash6005 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash9999 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash1433 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash2053 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2405 | Remcos botnet C2 server (confidence level: 100%) | |
hash8080 | Remcos botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash503 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash56549 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver payload delivery server (confidence level: 50%) | |
hash31337 | Sliver payload delivery server (confidence level: 50%) | |
hash54984 | Nanocore RAT payload delivery server (confidence level: 50%) | |
hash4434 | Cobalt Strike payload delivery server (confidence level: 50%) | |
hash4443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash4282 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash21180 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash4444 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash45265 | Remcos botnet C2 server (confidence level: 50%) | |
hash2443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1444 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Remcos botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash1000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash39635 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8000 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash60000 | Viper RAT botnet C2 server (confidence level: 75%) | |
hash60000 | Viper RAT botnet C2 server (confidence level: 75%) | |
hash8888 | Sliver botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | DanaBot botnet C2 server (confidence level: 75%) | |
hash40056 | Havoc botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash8594 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash6000 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash5173 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash5173 | Quasar RAT botnet C2 server (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttps://pbvtckjkrtht.top/ytzhzjlioddlyti4/ | Coper botnet C2 (confidence level: 100%) | |
urlhttp://175.148.157.145:47965/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://dckhgjimeghemhl.top/0obs5ktr2vhtr.php?id=vault&key=76127545828&s=527 | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://jejmbadfmeenlnk.top/tfm6euy09zhtr.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://canjjclmlnicbga.top/vo50gtns7dhtr.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://kmaealcfcalhcac.top/qzotx2r4w7htr.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://116.203.166.124 | Vidar botnet C2 (confidence level: 50%) | |
urlhttp://103.200.85.238:59852/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttps://maximu.sbs/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://88.198.119.36/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://106.53.83.169:60127/updates.rss | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttp://this-is-the.b-cdn.net/last/stage/verification/pass-this-step-to-continue.html | Lumma Stealer payload delivery URL (confidence level: 100%) | |
urlhttp://you-have-to-i.b-cdn.net/last/stage/verification/pass-this-step-to-continue.html | Lumma Stealer payload delivery URL (confidence level: 100%) | |
urlhttps://prpages.com/4e2e.js | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://prpages.com/js.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://lggknhaffleahbh.top/1.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://94.156.177.41/mars/five/pvqdq929bsx_a_d_m1n_a.php | LokiBot botnet C2 (confidence level: 50%) | |
urlhttps://77.83.175.91/69d96d770568584a.php | Stealc botnet C2 (confidence level: 50%) | |
urlhttps://77.220.212.32/eb51242cada87444.php | Stealc botnet C2 (confidence level: 50%) | |
urlhttp://154.216.20.246/f493d73b2e06dbd2/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://154.216.20.246/f493d73b2e06dbd2/mozglue.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://45.88.76.207/4b4e7c1351c9e2eb/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://147.45.44.190/dace046278f1f1ba/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://147.45.44.190/dace046278f1f1ba/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://62.204.41.163/2c3d53f1da5ea53a/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://5.188.86.231/20bec3f306af6847/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://5.188.86.231/20bec3f306af6847/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://www.eautylab.fun/g10y/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttps://taymodel.top/work/original.js | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://taymodel.top/work/index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://taymodel.top/work/help.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://mffaccessories.com/debug.zip | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://www.milp.store/2j93/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttps://curtainykeo.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://loodyswif.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://urtainykeo.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://inickypwk.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://ickykiduz.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://eggelatez.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://iniatureyu.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://avorraiykj.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://hoefeatthe.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://ashyceehsu.lat/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://www.se-online.net/g10y/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.sertc.xyz/g10y/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.aelo.xyz/g10y/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.elax.xyz/g10y/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttps://royaltyfree.click/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://116.203.11.8/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://fascinatterz.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://welcomeabjesu.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://priceygoveiuz.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://breakfasutwy.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://rifledford.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://motivatefaul.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://corruptedusz.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://supplyedtwoz.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://produceresov.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://cultureddirtys.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://kiterexchangez.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://skatestringje.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://ripehungryde.click/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://overtyfruitz.shop/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://shootmixxej.shop/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://burnwastefulke.shop/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://medicaljummtj.shop/api | Lumma Stealer botnet C2 (confidence level: 100%) |
Threat ID: 682c7dc2e8347ec82d2e094d
Added to database: 5/20/2025, 1:04:02 PM
Last enriched: 6/19/2025, 4:05:34 PM
Last updated: 7/29/2025, 11:57:14 AM
Views: 29
Related Threats
ThreatFox IOCs for 2025-08-14
MediumOn Going Malvertising Attack Spreads New Crypto Stealing PS1Bot Malware
MediumA Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode
MediumPhantomCard: New NFC-driven Android malware emerging in Brazil
MediumThreatFox IOCs for 2025-08-13
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.