ThreatFox IOCs for 2025-01-30
ThreatFox IOCs for 2025-01-30
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on January 30, 2025, by the ThreatFox MISP Feed, categorized under malware-related threats. The threat is associated with OSINT (Open Source Intelligence) activities, payload delivery, and network activity. However, the data lacks specific details such as affected software versions, concrete technical indicators, or exploit mechanisms. The absence of known exploits in the wild and the lack of available patches suggest that this is an intelligence feed sharing observed or suspected malicious indicators rather than a newly discovered vulnerability or active exploit. The threat level is rated as medium, with a threatLevel score of 2 (on an unspecified scale), analysis score of 1, and distribution score of 3, indicating moderate dissemination or relevance. The category tags imply that the threat involves the delivery of malicious payloads possibly through network vectors, and the use of OSINT techniques to gather or distribute threat intelligence. The lack of CWE identifiers and patch information further supports that this is an intelligence report rather than a vulnerability disclosure. Overall, this entry serves as a situational awareness update for security teams to monitor and potentially incorporate the provided IOCs into detection systems, rather than an immediate exploit requiring urgent remediation.
Potential Impact
For European organizations, the impact of this threat is primarily related to the potential for detection and prevention of malware infections through the use of updated threat intelligence. Since no specific exploit or vulnerability is detailed, the direct risk to confidentiality, integrity, or availability is unclear and likely low to medium. However, the presence of payload delivery and network activity tags suggests that organizations could face attempts of malware delivery or network-based intrusion attempts leveraging the indicators shared. If these IOCs correspond to active campaigns targeting European entities, there could be risks of data breaches, operational disruption, or espionage. The lack of known exploits in the wild reduces immediate risk, but organizations should remain vigilant, especially those in sectors commonly targeted by malware campaigns such as finance, critical infrastructure, and government. The use of OSINT implies that threat actors might be leveraging publicly available information to tailor attacks, increasing the sophistication and potential success of intrusion attempts.
Mitigation Recommendations
European organizations should integrate the provided IOCs into their security monitoring tools such as SIEMs, IDS/IPS, and endpoint detection and response (EDR) systems to enhance detection capabilities. Regularly updating threat intelligence feeds and correlating alerts with these IOCs can help identify early signs of compromise. Network segmentation and strict egress filtering can limit the impact of payload delivery attempts. Given the lack of patches, focus should be on proactive detection and response rather than remediation. Security teams should conduct threat hunting exercises using the IOCs to identify any latent infections. Employee awareness training on phishing and social engineering, common vectors for payload delivery, remains critical. Additionally, organizations should ensure robust backup and recovery procedures to mitigate potential damage from malware infections. Collaboration with national cybersecurity centers and sharing intelligence within trusted communities can improve collective defense against such threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
Indicators of Compromise
- url: https://rebecca-nylon-invention-ii.trycloudflare.com/cloudfll
- url: https://5.75.209.106/
- url: https://95.216.181.234/
- file: 146.19.24.68
- hash: 606
- file: 209.141.35.180
- hash: 61234
- domain: answerzeypher.biz
- domain: aromaticridz.biz
- domain: bluermaij.biz
- domain: cleavemover.biz
- domain: dayclammethir.biz
- domain: drinkeracte.biz
- domain: forcenodder.biz
- domain: freeezemediccal.biz
- domain: greatrabbid.biz
- domain: hatesomeber.biz
- domain: homellygage.biz
- domain: kubekuqyeud.biz
- domain: maintainhaat.biz
- domain: mannyrahse.biz
- domain: mistreanranger.biz
- domain: operregula.biz
- domain: overttriter.biz
- domain: peacesallyek.biz
- domain: railwaiberred.biz
- domain: rollinsccred.biz
- domain: shakeiarrep.biz
- domain: slimdresser.biz
- domain: springobtainn.biz
- domain: thangolekke.biz
- domain: versesoffe.biz
- domain: warmconfuse.biz
- domain: weartemptr.biz
- domain: worshipstrar.biz
- domain: xenoporren.biz
- domain: zoomsedat.biz
- file: 141.98.10.142
- hash: 2211
- file: 45.135.194.61
- hash: 1738
- file: 45.135.194.61
- hash: 6606
- file: 195.177.95.92
- hash: 1337
- file: 195.177.95.92
- hash: 4320
- file: 45.141.76.97
- hash: 4433
- file: 38.55.239.26
- hash: 80
- file: 195.177.95.155
- hash: 2404
- file: 93.144.177.185
- hash: 8808
- file: 94.156.166.240
- hash: 8808
- file: 45.62.170.251
- hash: 5353
- file: 128.90.102.97
- hash: 5000
- file: 45.15.162.116
- hash: 7443
- file: 195.177.95.146
- hash: 8089
- file: 31.220.80.82
- hash: 443
- file: 18.217.210.12
- hash: 80
- file: 45.128.233.72
- hash: 1337
- file: 193.143.1.66
- hash: 62389
- file: 80.76.51.164
- hash: 666
- file: 45.221.96.37
- hash: 5555
- file: 37.221.67.209
- hash: 7001
- file: 107.172.51.228
- hash: 3778
- file: 195.178.110.224
- hash: 9999
- url: http://112.248.142.156:42033/mozi.m
- file: 136.244.79.96
- hash: 80
- file: 84.38.133.30
- hash: 18682
- file: 3.125.42.153
- hash: 443
- file: 91.202.233.168
- hash: 80
- file: 216.173.112.219
- hash: 8808
- file: 45.141.84.60
- hash: 15747
- file: 146.70.232.28
- hash: 443
- file: 43.201.248.30
- hash: 16942
- file: 185.33.86.15
- hash: 8000
- file: 159.223.207.140
- hash: 443
- file: 5.252.74.51
- hash: 1337
- file: 147.45.78.188
- hash: 443
- file: 35.164.210.220
- hash: 443
- file: 195.58.36.183
- hash: 3333
- file: 51.83.76.255
- hash: 444
- file: 34.74.201.118
- hash: 443
- file: 35.154.0.27
- hash: 443
- file: 103.1.93.93
- hash: 4444
- file: 15.157.72.26
- hash: 443
- file: 84.238.132.116
- hash: 8443
- file: 35.177.87.190
- hash: 2222
- file: 13.59.91.113
- hash: 8082
- file: 157.230.57.160
- hash: 3333
- file: 54.148.125.236
- hash: 443
- file: 50.17.125.201
- hash: 443
- file: 185.22.153.166
- hash: 3334
- file: 160.2.35.236
- hash: 23
- file: 105.158.236.142
- hash: 995
- file: 95.110.224.149
- hash: 2404
- file: 103.84.89.222
- hash: 4444
- file: 179.95.173.137
- hash: 9990
- file: 18.179.43.144
- hash: 8085
- file: 195.201.58.26
- hash: 8889
- file: 3.8.8.132
- hash: 80
- file: 35.183.127.207
- hash: 80
- file: 193.203.49.90
- hash: 8000
- file: 38.146.28.93
- hash: 8000
- url: http://94.156.177.41/alpha/five/fre.php
- file: 13.203.159.2
- hash: 4730
- file: 13.214.187.174
- hash: 6002
- file: 185.130.213.219
- hash: 80
- file: 185.33.86.15
- hash: 443
- file: 38.146.28.93
- hash: 443
- file: 45.141.86.123
- hash: 443
- file: 46.101.106.2
- hash: 443
- file: 5.252.176.4
- hash: 443
- file: 54.38.94.225
- hash: 8891
- file: 69.159.0.149
- hash: 2222
- file: 70.31.125.8
- hash: 2222
- file: 104.248.170.245
- hash: 4443
- url: http://touxzw.ir/sccc/five/fre.php
- file: 185.112.83.45
- hash: 443
- url: http://3.17.10.250:80/ekty
- file: 94.154.35.145
- hash: 6666
- file: 37.120.198.216
- hash: 443
- file: 60.19.13.188
- hash: 8980
- file: 60.188.59.126
- hash: 50050
- file: 110.42.48.177
- hash: 443
- file: 158.23.90.30
- hash: 31337
- file: 173.249.24.236
- hash: 31337
- file: 65.109.108.19
- hash: 31337
- file: 217.160.192.139
- hash: 31337
- file: 111.229.194.121
- hash: 9088
- file: 52.199.248.182
- hash: 11
- file: 72.214.165.49
- hash: 443
- file: 70.167.250.169
- hash: 444
- file: 64.237.240.11
- hash: 1800
- file: 160.177.0.69
- hash: 10134
- url: http://45.14.245.11/1477304b7b2e46dc/sqlite3.dll
- url: http://128.140.91.217/16c60772756db6d6/sqlite3.dll
- url: http://65.109.2.12/4b219a338978614c/vcruntime140.dll
- url: https://212.34.148.47/f3920c55236c2636/sqlite3.dll
- url: http://217.196.96.138/063ec44b1db69f0e/vcruntime140.dll
- url: http://65.21.175.0/b13597c85f807692/vcruntime140.dll
- url: http://171.22.28.221/9e226a84ec50246d/vcruntime140.dll
- url: http://212.86.109.106/df6db770d6188cea/sqlite3.dll
- url: https://91.215.85.213/4a4993f1399adf8e/vcruntime140.dll
- url: http://185.231.69.90/dd855692109225f0/vcruntime140.dll
- url: https://185.196.10.147/4cadf15814a54569/vcruntime140.dll
- url: http://62.204.41.163/1d1758bf3d6d1a39/vcruntime140.dll
- url: http://5.252.155.30/72c1dd8f9bb7d11a/mozglue.dll
- url: http://209.141.35.175/0853a005e18f0946/vcruntime140.dll
- url: http://209.141.35.175/0853a005e18f0946/sqlite3.dll
- url: http://45.86.230.234/55145c8889ec57f2/sqlite3.dll
- url: http://154.216.18.128/0853a005e18f0946/mozglue.dll
- url: http://45.143.166.34/55145c8889ec57f2/sqlite3.dll
- url: http://5.188.87.38/ba0f11c06102c3bc/mozglue.dll
- url: https://95.215.207.176/70d63ca8a5be6cc3/vcruntime140.dll
- url: https://traveladdicts.top/api
- url: https://athleisurestyletop.top/api
- url: https://inspirationseekertop.top/api
- url: https://ecofriendlyhometop.top/api
- url: https://personaldevelopmentjourney.biz/api
- url: https://drunkedroomen.top/api
- url: https://inspecatlk.shop/api
- url: https://goodstylestop.top/api
- url: https://ceaselessarogg.shop/api
- url: https://bakkyyfshirte.shop/api
- url: https://first-security-verden.de/
- url: https://jellycoin.claims/
- url: https://www.jupuary.claims.65-109-38-81.cprapid.com/
- url: https://app.houseforma.com.br/
- url: https://symbitoic.foundation/
- url: https://google.meet-join.us/jyf-vqxe-rky/
- file: 141.144.239.133
- hash: 22
- file: 141.144.239.133
- hash: 30058
- file: 141.144.239.133
- hash: 6606
- file: 141.144.239.133
- hash: 7707
- file: 141.144.239.133
- hash: 8808
- file: 83.168.69.7
- hash: 22
- file: 83.168.69.7
- hash: 30058
- file: 83.168.69.7
- hash: 6606
- file: 83.168.69.7
- hash: 7707
- file: 83.168.69.7
- hash: 8808
- domain: bot.nulling.io
- domain: panel.subdeew.site
- domain: records-spank.gl.at.ply.gg
- domain: linux-submissions.gl.at.ply.gg
- domain: gotob67920-30070.portmap.host
- domain: me-teams.gl.at.ply.gg
- domain: methods-rats.gl.at.ply.gg
- domain: models-needed.gl.at.ply.gg
- domain: original-structural.gl.at.ply.gg
- domain: say-oops.gl.at.ply.gg
- domain: wine-attractions.gl.at.ply.gg
- url: https://pastebin.com/raw/ga9k4n4u
- url: https://pastebin.com/raw/e4fkmsf1
- url: https://pastebin.com/raw/ehjwxnkn
- url: http://www.030003741.xyz/kmge/
- url: http://www.foziaclothing.shop/kmge/
- url: http://www.nb-event-b2b.online/kmge/
- url: http://www.son37.club/kmge/
- url: http://www.gsolartech.com/kmge/
- url: http://www.go88l.club/kmge/
- url: http://www.douromaintenance.info/kmge/
- url: http://www.trendy-style.store/kmge/
- url: http://www.offersnow-store.shop/kmge/
- url: http://www.eurosirel.info/kmge/
- url: http://www.imples.live/kmge/
- url: http://www.lapostehotel.one/kmge/
- url: http://www.ft0722a9usj38.shop/kmge/
- domain: www.030003741.xyz
- domain: www.foziaclothing.shop
- domain: www.nb-event-b2b.online
- domain: www.son37.club
- domain: www.gsolartech.com
- domain: www.go88l.club
- domain: www.douromaintenance.info
- domain: www.trendy-style.store
- domain: www.offersnow-store.shop
- domain: www.eurosirel.info
- domain: www.imples.live
- domain: www.lapostehotel.one
- domain: www.ft0722a9usj38.shop
- domain: www.yaqpqljcwmhesaj.buzz
- domain: www.stove-10000.bond
- domain: www.solar-systems-panels-50320.bond
- domain: www.pgfnrecuperacao.store
- domain: www.cg-qu.xyz
- domain: www.c87xy374jt.bond
- domain: www.2tdb3dk65m.skin
- file: 91.84.104.75
- hash: 80
- file: 64.112.84.184
- hash: 2404
- file: 45.156.85.63
- hash: 443
- file: 143.198.158.86
- hash: 443
- file: 185.244.129.81
- hash: 443
- file: 121.40.19.66
- hash: 7070
- file: 146.103.11.125
- hash: 7707
- file: 23.184.48.4
- hash: 443
- file: 13.60.246.102
- hash: 443
- file: 147.45.78.188
- hash: 80
- file: 47.129.169.193
- hash: 2000
- file: 47.129.169.193
- hash: 9200
- file: 47.129.169.193
- hash: 51200
- file: 51.79.160.209
- hash: 808
- file: 62.111.142.118
- hash: 80
- file: 156.243.244.27
- hash: 8081
- file: 92.255.57.155
- hash: 80
- url: https://pastebin.com/raw/cn4rm5c9
- domain: dkdrlahhwlxptmxm2.p-e.kr
- domain: kanikiken.duckdns.org
- domain: thebeautylovelytop.top
- domain: traveladdicts.top
- domain: webmail.ebuildingsource.com
- file: 23.227.196.45
- hash: 443
- file: 147.124.215.24
- hash: 2404
- domain: dedicated-zap1145577-1.zap-srv.com
- file: 176.65.139.69
- hash: 333
- file: 94.156.105.138
- hash: 222
- file: 100.29.8.186
- hash: 443
- file: 195.177.95.162
- hash: 80
- file: 5.255.106.12
- hash: 3389
- domain: dns.rightyellow.com
- domain: ns.rightyellow.com
- domain: ns1.rightyellow.com
- file: 95.179.130.232
- hash: 53
- file: 5.253.59.162
- hash: 443
- file: 91.202.233.168
- hash: 443
- file: 64.95.10.162
- hash: 1119
- file: 91.92.250.213
- hash: 1110
- file: 64.95.13.143
- hash: 1120
- file: 94.156.68.124
- hash: 1122
- file: 91.92.250.213
- hash: 1050
- file: 45.202.33.26
- hash: 1128
- file: 45.200.148.158
- hash: 1129
- file: 93.115.172.125
- hash: 1130
- domain: gray-horse-56758.zap.cloud
- file: 94.156.105.136
- hash: 222
- file: 159.65.244.146
- hash: 7443
- domain: h1.redethics.es
- file: 98.182.138.118
- hash: 3306
- file: 70.186.243.22
- hash: 8081
- file: 192.129.178.59
- hash: 9002
- file: 192.129.178.58
- hash: 9002
- file: 167.99.194.187
- hash: 31337
- file: 178.164.141.185
- hash: 80
- file: 18.159.224.113
- hash: 2087
- file: 111.125.153.206
- hash: 443
- url: https://warmconfuse.biz/api
- url: https://wellnesscoaching.biz/api
- file: 176.44.59.208
- hash: 443
- file: 185.244.129.81
- hash: 8888
- file: 195.177.95.163
- hash: 443
- url: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/pvqdq929bsx_a_d_m1n_a.php
- file: 39.40.154.171
- hash: 995
- file: 54.244.13.243
- hash: 443
- file: 62.60.248.190
- hash: 443
- url: https://berachain.support/
- domain: fax-costumes.gl.at.ply.gg
- domain: lavoslegend-45873.portmap.host
- domain: our-sw.gl.at.ply.gg
- domain: story-blacks.gl.at.ply.gg
- hash: 422b322bc601e52a4c7c4f002f9dc9e4
- domain: thrtgg13th.top
- domain: elvnww11vt.top
- domain: f1080003.xsph.ru
- domain: jumaisimba.x10.mx
- domain: a0909123.xsph.ru
- domain: f1077757.xsph.ru
- domain: dvvldvvz.beget.tech
- domain: ponos22834.mywebcommunity.org
- domain: carcookect.shop
- domain: warmconfuse.biz
- domain: mistreanranger.biz
- domain: kubekuqyeud.biz
- domain: tennisincl.com
- url: https://tennisincl.com/api
- url: https://kubekuqyeud.biz/api
- url: https://mistreanranger.biz/api
- url: https://carcookect.shop/api
- url: https://hatesomeber.biz/api
- url: https://homellygage.biz/api
- url: https://maintainhaat.biz/api
- url: https://mannyrahse.biz/api
- url: https://operregula.biz/api
- url: https://overttriter.biz/api
- url: https://peacesallyek.biz/api
- url: https://railwaiberred.biz/api
- url: https://shakeiarrep.biz/api
- url: https://slimdresser.biz/api
- url: https://springobtainn.biz/api
- url: https://thangolekke.biz/api
- url: https://versesoffe.biz/api
- url: https://weartemptr.biz/api
- url: https://worshipstrar.biz/api
- url: https://xenoporren.biz/api
- url: https://zoomsedat.biz/api
- domain: elvngg11th.top
- domain: tenww10vt.top
- domain: tenrr10pn.top
- domain: 69nk69.linkpc.net
- domain: long-cg.gl.at.ply.gg
- file: 51.89.253.21
- hash: 1604
- domain: mubuzb3vvv.top
- domain: nfuvueibzi4.top
- domain: mnudybh4unh.top
- domain: nuvye89bjz4.top
- domain: mbuz73hb7z3.top
- domain: tubnzy3uvz.top
- domain: nubxz4ubhxz9i.top
- domain: poeiughybzu222.top
- domain: poubnxu3jubz.top
- domain: lgbibzuehbz.top
- domain: ohunhebzhbu3.top
- domain: sdubvlbbuz3vzzz.top
- domain: bnbuzu49ibz4.top
- domain: shd9inbjz4.top
- domain: ngub8zb38ib.top
- domain: adkfnnbmakcgael.top
- domain: hhgiflifcbmdjmh.top
- domain: blclmjamegjaffd.top
- domain: iblaehgffmflamn.top
- domain: bfhdkgmmhdbikgj.top
- domain: canjjclmlnicbga.top
- domain: jejmbadfmeenlnk.top
- domain: diebinjmajbkhhg.top
- domain: kmaealcfcalhcac.top
- domain: dckhgjimeghemhl.top
- domain: ekbnfghmhcaldid.top
- domain: lalclenfjhkinbn.top
- domain: feheecfmkmhfiij.top
- domain: midhkalfmddcece.top
- domain: mdinjlkfcajkjck.top
- domain: ghecbjcmdfghfkg.top
- domain: nlafhhiffkceadc.top
- domain: gbkiafbmhbmbkkl.top
- domain: afglgehgjgjmgdh.top
- domain: hjbamcnnkmfjbld.top
- domain: anldfaggmdbglen.top
- domain: idhglmmnaimdhlj.top
- domain: bidjdlegcnincee.top
- domain: immmjjkndeekmma.top
- domain: ccibchdgfjbhhfk.top
- domain: jgeeifjnhbledmg.top
- domain: ckahaebgighbngc.top
- domain: afnfdijahijefmh.top
- domain: kdemjgebjimkanl.top
- domain: tools-jam.gl.at.ply.gg
- file: 185.208.156.62
- hash: 9009
- domain: as.svcsghost.com
- domain: feltonworkshop.com
- domain: qw.svcsghost.com
- domain: zx.svcsghost.com
ThreatFox IOCs for 2025-01-30
Description
ThreatFox IOCs for 2025-01-30
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on January 30, 2025, by the ThreatFox MISP Feed, categorized under malware-related threats. The threat is associated with OSINT (Open Source Intelligence) activities, payload delivery, and network activity. However, the data lacks specific details such as affected software versions, concrete technical indicators, or exploit mechanisms. The absence of known exploits in the wild and the lack of available patches suggest that this is an intelligence feed sharing observed or suspected malicious indicators rather than a newly discovered vulnerability or active exploit. The threat level is rated as medium, with a threatLevel score of 2 (on an unspecified scale), analysis score of 1, and distribution score of 3, indicating moderate dissemination or relevance. The category tags imply that the threat involves the delivery of malicious payloads possibly through network vectors, and the use of OSINT techniques to gather or distribute threat intelligence. The lack of CWE identifiers and patch information further supports that this is an intelligence report rather than a vulnerability disclosure. Overall, this entry serves as a situational awareness update for security teams to monitor and potentially incorporate the provided IOCs into detection systems, rather than an immediate exploit requiring urgent remediation.
Potential Impact
For European organizations, the impact of this threat is primarily related to the potential for detection and prevention of malware infections through the use of updated threat intelligence. Since no specific exploit or vulnerability is detailed, the direct risk to confidentiality, integrity, or availability is unclear and likely low to medium. However, the presence of payload delivery and network activity tags suggests that organizations could face attempts of malware delivery or network-based intrusion attempts leveraging the indicators shared. If these IOCs correspond to active campaigns targeting European entities, there could be risks of data breaches, operational disruption, or espionage. The lack of known exploits in the wild reduces immediate risk, but organizations should remain vigilant, especially those in sectors commonly targeted by malware campaigns such as finance, critical infrastructure, and government. The use of OSINT implies that threat actors might be leveraging publicly available information to tailor attacks, increasing the sophistication and potential success of intrusion attempts.
Mitigation Recommendations
European organizations should integrate the provided IOCs into their security monitoring tools such as SIEMs, IDS/IPS, and endpoint detection and response (EDR) systems to enhance detection capabilities. Regularly updating threat intelligence feeds and correlating alerts with these IOCs can help identify early signs of compromise. Network segmentation and strict egress filtering can limit the impact of payload delivery attempts. Given the lack of patches, focus should be on proactive detection and response rather than remediation. Security teams should conduct threat hunting exercises using the IOCs to identify any latent infections. Employee awareness training on phishing and social engineering, common vectors for payload delivery, remains critical. Additionally, organizations should ensure robust backup and recovery procedures to mitigate potential damage from malware infections. Collaboration with national cybersecurity centers and sharing intelligence within trusted communities can improve collective defense against such threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- e7b4e1dc-ec72-462a-add1-dd8382653379
- Original Timestamp
- 1738281787
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttps://rebecca-nylon-invention-ii.trycloudflare.com/cloudfll | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://5.75.209.106/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://95.216.181.234/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttp://112.248.142.156:42033/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://94.156.177.41/alpha/five/fre.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 75%) | |
urlhttp://touxzw.ir/sccc/five/fre.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 75%) | |
urlhttp://3.17.10.250:80/ekty | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttp://45.14.245.11/1477304b7b2e46dc/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://128.140.91.217/16c60772756db6d6/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://65.109.2.12/4b219a338978614c/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://212.34.148.47/f3920c55236c2636/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://217.196.96.138/063ec44b1db69f0e/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://65.21.175.0/b13597c85f807692/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://171.22.28.221/9e226a84ec50246d/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://212.86.109.106/df6db770d6188cea/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://91.215.85.213/4a4993f1399adf8e/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://185.231.69.90/dd855692109225f0/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://185.196.10.147/4cadf15814a54569/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://62.204.41.163/1d1758bf3d6d1a39/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://5.252.155.30/72c1dd8f9bb7d11a/mozglue.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://209.141.35.175/0853a005e18f0946/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://209.141.35.175/0853a005e18f0946/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://45.86.230.234/55145c8889ec57f2/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://154.216.18.128/0853a005e18f0946/mozglue.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://45.143.166.34/55145c8889ec57f2/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://5.188.87.38/ba0f11c06102c3bc/mozglue.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://95.215.207.176/70d63ca8a5be6cc3/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://traveladdicts.top/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://athleisurestyletop.top/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://inspirationseekertop.top/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://ecofriendlyhometop.top/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://personaldevelopmentjourney.biz/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://drunkedroomen.top/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://inspecatlk.shop/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://goodstylestop.top/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://ceaselessarogg.shop/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://bakkyyfshirte.shop/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://first-security-verden.de/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://jellycoin.claims/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://www.jupuary.claims.65-109-38-81.cprapid.com/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://app.houseforma.com.br/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://symbitoic.foundation/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://google.meet-join.us/jyf-vqxe-rky/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://pastebin.com/raw/ga9k4n4u | XWorm botnet C2 (confidence level: 50%) | |
urlhttps://pastebin.com/raw/e4fkmsf1 | XWorm botnet C2 (confidence level: 50%) | |
urlhttps://pastebin.com/raw/ehjwxnkn | XWorm botnet C2 (confidence level: 50%) | |
urlhttp://www.030003741.xyz/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.foziaclothing.shop/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.nb-event-b2b.online/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.son37.club/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.gsolartech.com/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.go88l.club/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.douromaintenance.info/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.trendy-style.store/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.offersnow-store.shop/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.eurosirel.info/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.imples.live/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.lapostehotel.one/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttp://www.ft0722a9usj38.shop/kmge/ | Formbook botnet C2 (confidence level: 50%) | |
urlhttps://pastebin.com/raw/cn4rm5c9 | DCRat botnet C2 (confidence level: 50%) | |
urlhttps://warmconfuse.biz/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://wellnesscoaching.biz/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttp://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/pvqdq929bsx_a_d_m1n_a.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 50%) | |
urlhttps://berachain.support/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://tennisincl.com/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://kubekuqyeud.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://mistreanranger.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://carcookect.shop/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://hatesomeber.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://homellygage.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://maintainhaat.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://mannyrahse.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://operregula.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://overttriter.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://peacesallyek.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://railwaiberred.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://shakeiarrep.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://slimdresser.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://springobtainn.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://thangolekke.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://versesoffe.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://weartemptr.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://worshipstrar.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://xenoporren.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://zoomsedat.biz/api | Lumma Stealer botnet C2 (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file146.19.24.68 | QakBot botnet C2 server (confidence level: 100%) | |
file209.141.35.180 | QakBot botnet C2 server (confidence level: 100%) | |
file141.98.10.142 | Mirai botnet C2 server (confidence level: 100%) | |
file45.135.194.61 | QakBot botnet C2 server (confidence level: 100%) | |
file45.135.194.61 | QakBot botnet C2 server (confidence level: 100%) | |
file195.177.95.92 | Mirai botnet C2 server (confidence level: 100%) | |
file195.177.95.92 | Mirai botnet C2 server (confidence level: 100%) | |
file45.141.76.97 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file38.55.239.26 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file195.177.95.155 | Remcos botnet C2 server (confidence level: 100%) | |
file93.144.177.185 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file94.156.166.240 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.62.170.251 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file128.90.102.97 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.15.162.116 | Unknown malware botnet C2 server (confidence level: 100%) | |
file195.177.95.146 | Hook botnet C2 server (confidence level: 100%) | |
file31.220.80.82 | Havoc botnet C2 server (confidence level: 100%) | |
file18.217.210.12 | MooBot botnet C2 server (confidence level: 100%) | |
file45.128.233.72 | Mirai botnet C2 server (confidence level: 100%) | |
file193.143.1.66 | Mirai botnet C2 server (confidence level: 100%) | |
file80.76.51.164 | Mirai botnet C2 server (confidence level: 100%) | |
file45.221.96.37 | Mirai botnet C2 server (confidence level: 100%) | |
file37.221.67.209 | Mirai botnet C2 server (confidence level: 100%) | |
file107.172.51.228 | Mirai botnet C2 server (confidence level: 100%) | |
file195.178.110.224 | Mirai botnet C2 server (confidence level: 100%) | |
file136.244.79.96 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file84.38.133.30 | Remcos botnet C2 server (confidence level: 100%) | |
file3.125.42.153 | Sliver botnet C2 server (confidence level: 100%) | |
file91.202.233.168 | Matanbuchus botnet C2 server (confidence level: 100%) | |
file216.173.112.219 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.141.84.60 | SectopRAT botnet C2 server (confidence level: 100%) | |
file146.70.232.28 | Havoc botnet C2 server (confidence level: 100%) | |
file43.201.248.30 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file185.33.86.15 | RansomHub botnet C2 server (confidence level: 100%) | |
file159.223.207.140 | Sliver botnet C2 server (confidence level: 90%) | |
file5.252.74.51 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file147.45.78.188 | Havoc botnet C2 server (confidence level: 100%) | |
file35.164.210.220 | Unknown malware botnet C2 server (confidence level: 100%) | |
file195.58.36.183 | Unknown malware botnet C2 server (confidence level: 100%) | |
file51.83.76.255 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.74.201.118 | Unknown malware botnet C2 server (confidence level: 100%) | |
file35.154.0.27 | Unknown malware botnet C2 server (confidence level: 100%) | |
file103.1.93.93 | Unknown malware botnet C2 server (confidence level: 100%) | |
file15.157.72.26 | Unknown malware botnet C2 server (confidence level: 100%) | |
file84.238.132.116 | Unknown malware botnet C2 server (confidence level: 100%) | |
file35.177.87.190 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.59.91.113 | Unknown malware botnet C2 server (confidence level: 100%) | |
file157.230.57.160 | Unknown malware botnet C2 server (confidence level: 100%) | |
file54.148.125.236 | Unknown malware botnet C2 server (confidence level: 100%) | |
file50.17.125.201 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.22.153.166 | Unknown malware botnet C2 server (confidence level: 100%) | |
file160.2.35.236 | Bashlite botnet C2 server (confidence level: 90%) | |
file105.158.236.142 | QakBot botnet C2 server (confidence level: 100%) | |
file95.110.224.149 | Remcos botnet C2 server (confidence level: 100%) | |
file103.84.89.222 | DCRat botnet C2 server (confidence level: 100%) | |
file179.95.173.137 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file18.179.43.144 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file195.201.58.26 | BitRAT botnet C2 server (confidence level: 100%) | |
file3.8.8.132 | MooBot botnet C2 server (confidence level: 100%) | |
file35.183.127.207 | MimiKatz botnet C2 server (confidence level: 100%) | |
file193.203.49.90 | RansomHub botnet C2 server (confidence level: 100%) | |
file38.146.28.93 | RansomHub botnet C2 server (confidence level: 100%) | |
file13.203.159.2 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
file13.214.187.174 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
file185.130.213.219 | Havoc botnet C2 server (confidence level: 75%) | |
file185.33.86.15 | RansomHub botnet C2 server (confidence level: 75%) | |
file38.146.28.93 | RansomHub botnet C2 server (confidence level: 75%) | |
file45.141.86.123 | Sliver botnet C2 server (confidence level: 75%) | |
file46.101.106.2 | Brute Ratel C4 botnet C2 server (confidence level: 75%) | |
file5.252.176.4 | Havoc botnet C2 server (confidence level: 75%) | |
file54.38.94.225 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
file69.159.0.149 | QakBot botnet C2 server (confidence level: 75%) | |
file70.31.125.8 | QakBot botnet C2 server (confidence level: 75%) | |
file104.248.170.245 | Meterpreter botnet C2 server (confidence level: 75%) | |
file185.112.83.45 | Meterpreter botnet C2 server (confidence level: 75%) | |
file94.154.35.145 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file37.120.198.216 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file60.19.13.188 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file60.188.59.126 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file110.42.48.177 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file158.23.90.30 | Sliver botnet C2 server (confidence level: 50%) | |
file173.249.24.236 | Sliver botnet C2 server (confidence level: 50%) | |
file65.109.108.19 | Sliver botnet C2 server (confidence level: 50%) | |
file217.160.192.139 | Sliver botnet C2 server (confidence level: 50%) | |
file111.229.194.121 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file52.199.248.182 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file72.214.165.49 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file70.167.250.169 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file64.237.240.11 | Remcos botnet C2 server (confidence level: 50%) | |
file160.177.0.69 | Orcus RAT botnet C2 server (confidence level: 50%) | |
file141.144.239.133 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file141.144.239.133 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file141.144.239.133 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file141.144.239.133 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file141.144.239.133 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file83.168.69.7 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file83.168.69.7 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file83.168.69.7 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file83.168.69.7 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file83.168.69.7 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file91.84.104.75 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file64.112.84.184 | Remcos botnet C2 server (confidence level: 100%) | |
file45.156.85.63 | Remcos botnet C2 server (confidence level: 100%) | |
file143.198.158.86 | Sliver botnet C2 server (confidence level: 100%) | |
file185.244.129.81 | Sliver botnet C2 server (confidence level: 100%) | |
file121.40.19.66 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file146.103.11.125 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file23.184.48.4 | Havoc botnet C2 server (confidence level: 100%) | |
file13.60.246.102 | Havoc botnet C2 server (confidence level: 100%) | |
file147.45.78.188 | Havoc botnet C2 server (confidence level: 100%) | |
file47.129.169.193 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file47.129.169.193 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file47.129.169.193 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file51.79.160.209 | Kaiji botnet C2 server (confidence level: 100%) | |
file62.111.142.118 | MimiKatz botnet C2 server (confidence level: 100%) | |
file156.243.244.27 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file92.255.57.155 | Amadey botnet C2 server (confidence level: 50%) | |
file23.227.196.45 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file147.124.215.24 | Remcos botnet C2 server (confidence level: 100%) | |
file176.65.139.69 | Remcos botnet C2 server (confidence level: 100%) | |
file94.156.105.138 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file100.29.8.186 | Havoc botnet C2 server (confidence level: 100%) | |
file195.177.95.162 | Stealc botnet C2 server (confidence level: 100%) | |
file5.255.106.12 | BianLian botnet C2 server (confidence level: 100%) | |
file95.179.130.232 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file5.253.59.162 | QakBot botnet C2 server (confidence level: 75%) | |
file91.202.233.168 | Matanbuchus botnet C2 server (confidence level: 60%) | |
file64.95.10.162 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
file91.92.250.213 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
file64.95.13.143 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
file94.156.68.124 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
file91.92.250.213 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
file45.202.33.26 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
file45.200.148.158 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
file93.115.172.125 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
file94.156.105.136 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file159.65.244.146 | Unknown malware botnet C2 server (confidence level: 100%) | |
file98.182.138.118 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file70.186.243.22 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file192.129.178.59 | DCRat botnet C2 server (confidence level: 50%) | |
file192.129.178.58 | DCRat botnet C2 server (confidence level: 50%) | |
file167.99.194.187 | Sliver botnet C2 server (confidence level: 50%) | |
file178.164.141.185 | NjRAT botnet C2 server (confidence level: 50%) | |
file18.159.224.113 | BlackShades botnet C2 server (confidence level: 50%) | |
file111.125.153.206 | QakBot botnet C2 server (confidence level: 75%) | |
file176.44.59.208 | QakBot botnet C2 server (confidence level: 75%) | |
file185.244.129.81 | Sliver botnet C2 server (confidence level: 75%) | |
file195.177.95.163 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
file39.40.154.171 | QakBot botnet C2 server (confidence level: 75%) | |
file54.244.13.243 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file62.60.248.190 | DanaBot botnet C2 server (confidence level: 75%) | |
file51.89.253.21 | XWorm botnet C2 server (confidence level: 100%) | |
file185.208.156.62 | XWorm botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash606 | QakBot botnet C2 server (confidence level: 100%) | |
hash61234 | QakBot botnet C2 server (confidence level: 100%) | |
hash2211 | Mirai botnet C2 server (confidence level: 100%) | |
hash1738 | QakBot botnet C2 server (confidence level: 100%) | |
hash6606 | QakBot botnet C2 server (confidence level: 100%) | |
hash1337 | Mirai botnet C2 server (confidence level: 100%) | |
hash4320 | Mirai botnet C2 server (confidence level: 100%) | |
hash4433 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash5353 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash5000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8089 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash1337 | Mirai botnet C2 server (confidence level: 100%) | |
hash62389 | Mirai botnet C2 server (confidence level: 100%) | |
hash666 | Mirai botnet C2 server (confidence level: 100%) | |
hash5555 | Mirai botnet C2 server (confidence level: 100%) | |
hash7001 | Mirai botnet C2 server (confidence level: 100%) | |
hash3778 | Mirai botnet C2 server (confidence level: 100%) | |
hash9999 | Mirai botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash18682 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash80 | Matanbuchus botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash15747 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash16942 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8000 | RansomHub botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 90%) | |
hash1337 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash444 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4444 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash2222 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8082 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3334 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash23 | Bashlite botnet C2 server (confidence level: 90%) | |
hash995 | QakBot botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash4444 | DCRat botnet C2 server (confidence level: 100%) | |
hash9990 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8085 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8889 | BitRAT botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash80 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash8000 | RansomHub botnet C2 server (confidence level: 100%) | |
hash8000 | RansomHub botnet C2 server (confidence level: 100%) | |
hash4730 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
hash6002 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
hash80 | Havoc botnet C2 server (confidence level: 75%) | |
hash443 | RansomHub botnet C2 server (confidence level: 75%) | |
hash443 | RansomHub botnet C2 server (confidence level: 75%) | |
hash443 | Sliver botnet C2 server (confidence level: 75%) | |
hash443 | Brute Ratel C4 botnet C2 server (confidence level: 75%) | |
hash443 | Havoc botnet C2 server (confidence level: 75%) | |
hash8891 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
hash2222 | QakBot botnet C2 server (confidence level: 75%) | |
hash2222 | QakBot botnet C2 server (confidence level: 75%) | |
hash4443 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash443 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash6666 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash8980 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash50050 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash9088 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash11 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash443 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash444 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash1800 | Remcos botnet C2 server (confidence level: 50%) | |
hash10134 | Orcus RAT botnet C2 server (confidence level: 50%) | |
hash22 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash30058 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash22 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash30058 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash7070 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | Havoc botnet C2 server (confidence level: 100%) | |
hash2000 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash9200 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash51200 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash808 | Kaiji botnet C2 server (confidence level: 100%) | |
hash80 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Amadey botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash333 | Remcos botnet C2 server (confidence level: 100%) | |
hash222 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash3389 | BianLian botnet C2 server (confidence level: 100%) | |
hash53 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | Matanbuchus botnet C2 server (confidence level: 60%) | |
hash1119 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
hash1110 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
hash1120 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
hash1122 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
hash1050 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
hash1128 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
hash1129 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
hash1130 | Unidentified 118 botnet C2 server (confidence level: 100%) | |
hash222 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3306 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash8081 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash9002 | DCRat botnet C2 server (confidence level: 50%) | |
hash9002 | DCRat botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash80 | NjRAT botnet C2 server (confidence level: 50%) | |
hash2087 | BlackShades botnet C2 server (confidence level: 50%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash8888 | Sliver botnet C2 server (confidence level: 75%) | |
hash443 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
hash995 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DanaBot botnet C2 server (confidence level: 75%) | |
hash422b322bc601e52a4c7c4f002f9dc9e4 | AMOS payload (confidence level: 50%) | |
hash1604 | XWorm botnet C2 server (confidence level: 100%) | |
hash9009 | XWorm botnet C2 server (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainanswerzeypher.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainaromaticridz.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainbluermaij.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domaincleavemover.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domaindayclammethir.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domaindrinkeracte.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainforcenodder.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainfreeezemediccal.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domaingreatrabbid.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainhatesomeber.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainhomellygage.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainkubekuqyeud.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainmaintainhaat.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainmannyrahse.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainmistreanranger.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainoperregula.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainoverttriter.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainpeacesallyek.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainrailwaiberred.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainrollinsccred.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainshakeiarrep.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainslimdresser.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainspringobtainn.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainthangolekke.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainversesoffe.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainwarmconfuse.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainweartemptr.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainworshipstrar.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainxenoporren.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainzoomsedat.biz | Lumma Stealer credit card skimming domain (confidence level: 100%) | |
domainbot.nulling.io | Mirai botnet C2 domain (confidence level: 50%) | |
domainpanel.subdeew.site | Mirai botnet C2 domain (confidence level: 50%) | |
domainrecords-spank.gl.at.ply.gg | Quasar RAT botnet C2 domain (confidence level: 50%) | |
domainlinux-submissions.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domaingotob67920-30070.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domainme-teams.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainmethods-rats.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainmodels-needed.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainoriginal-structural.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainsay-oops.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainwine-attractions.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainwww.030003741.xyz | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.foziaclothing.shop | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.nb-event-b2b.online | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.son37.club | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.gsolartech.com | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.go88l.club | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.douromaintenance.info | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.trendy-style.store | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.offersnow-store.shop | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.eurosirel.info | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.imples.live | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.lapostehotel.one | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.ft0722a9usj38.shop | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.yaqpqljcwmhesaj.buzz | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.stove-10000.bond | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.solar-systems-panels-50320.bond | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.pgfnrecuperacao.store | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.cg-qu.xyz | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.c87xy374jt.bond | Formbook botnet C2 domain (confidence level: 50%) | |
domainwww.2tdb3dk65m.skin | Formbook botnet C2 domain (confidence level: 50%) | |
domaindkdrlahhwlxptmxm2.p-e.kr | Mirai botnet C2 domain (confidence level: 50%) | |
domainkanikiken.duckdns.org | Mirai botnet C2 domain (confidence level: 50%) | |
domainthebeautylovelytop.top | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaintraveladdicts.top | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainwebmail.ebuildingsource.com | FAKEUPDATES payload delivery domain (confidence level: 50%) | |
domaindedicated-zap1145577-1.zap-srv.com | Remcos botnet C2 domain (confidence level: 100%) | |
domaindns.rightyellow.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainns.rightyellow.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainns1.rightyellow.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaingray-horse-56758.zap.cloud | Remcos botnet C2 domain (confidence level: 100%) | |
domainh1.redethics.es | Havoc botnet C2 domain (confidence level: 100%) | |
domainfax-costumes.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainlavoslegend-45873.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domainour-sw.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainstory-blacks.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainthrtgg13th.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainelvnww11vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainf1080003.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domainjumaisimba.x10.mx | DCRat botnet C2 domain (confidence level: 100%) | |
domaina0909123.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domainf1077757.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domaindvvldvvz.beget.tech | DCRat botnet C2 domain (confidence level: 100%) | |
domainponos22834.mywebcommunity.org | DCRat botnet C2 domain (confidence level: 100%) | |
domaincarcookect.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainwarmconfuse.biz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmistreanranger.biz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainkubekuqyeud.biz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintennisincl.com | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainelvngg11th.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintenww10vt.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintenrr10pn.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domain69nk69.linkpc.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainlong-cg.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domainmubuzb3vvv.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainnfuvueibzi4.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainmnudybh4unh.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainnuvye89bjz4.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainmbuz73hb7z3.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domaintubnzy3uvz.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainnubxz4ubhxz9i.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainpoeiughybzu222.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainpoubnxu3jubz.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainlgbibzuehbz.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainohunhebzhbu3.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainsdubvlbbuz3vzzz.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainbnbuzu49ibz4.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainshd9inbjz4.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainngub8zb38ib.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainadkfnnbmakcgael.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainhhgiflifcbmdjmh.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainblclmjamegjaffd.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainiblaehgffmflamn.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainbfhdkgmmhdbikgj.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domaincanjjclmlnicbga.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainjejmbadfmeenlnk.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domaindiebinjmajbkhhg.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainkmaealcfcalhcac.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domaindckhgjimeghemhl.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainekbnfghmhcaldid.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainlalclenfjhkinbn.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainfeheecfmkmhfiij.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainmidhkalfmddcece.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainmdinjlkfcajkjck.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainghecbjcmdfghfkg.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainnlafhhiffkceadc.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domaingbkiafbmhbmbkkl.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainafglgehgjgjmgdh.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainhjbamcnnkmfjbld.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainanldfaggmdbglen.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainidhglmmnaimdhlj.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainbidjdlegcnincee.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainimmmjjkndeekmma.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainccibchdgfjbhhfk.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainjgeeifjnhbledmg.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainckahaebgighbngc.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainafnfdijahijefmh.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domainkdemjgebjimkanl.top | MintsLoader botnet C2 domain (confidence level: 50%) | |
domaintools-jam.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domainas.svcsghost.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainfeltonworkshop.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainqw.svcsghost.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainzx.svcsghost.com | Cobalt Strike botnet C2 domain (confidence level: 75%) |
Threat ID: 68367c99182aa0cae2325136
Added to database: 5/28/2025, 3:01:45 AM
Last enriched: 6/27/2025, 10:35:04 AM
Last updated: 8/17/2025, 5:16:16 PM
Views: 18
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.