ThreatFox IOCs for 2025-02-22
ThreatFox IOCs for 2025-02-22
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2025-02-22 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The entry does not specify any particular malware family, affected software versions, or detailed technical indicators, and no known exploits are currently reported in the wild. The threat level is rated as medium with a threatLevel score of 2, indicating a moderate concern. The absence of patch availability and lack of specific CWE identifiers suggest this is more an intelligence report on observed malicious activity or infrastructure rather than a newly discovered vulnerability or exploit. The IOCs are intended for use in threat detection and response, helping organizations identify potential malicious payload delivery mechanisms or network behaviors associated with malware campaigns. The lack of detailed technical indicators or affected products limits the ability to pinpoint exact attack vectors or malware capabilities. However, the focus on OSINT and network activity implies that the threat actors may be leveraging publicly available information and network-based delivery methods to propagate malware or conduct reconnaissance. The TLP:white tag indicates that the information is intended for wide distribution and sharing within the security community.
Potential Impact
For European organizations, the impact of this threat primarily lies in the potential for malware infections via network-based payload delivery mechanisms. Given the medium severity and lack of known exploits, the immediate risk may be moderate but should not be underestimated, especially for organizations with high exposure to external networks or those relying heavily on OSINT for their operations. Malware infections can lead to data exfiltration, disruption of services, or further compromise of internal systems. The absence of specific affected products means that a broad range of systems could be targeted, increasing the scope of potential impact. European entities involved in critical infrastructure, finance, or government sectors may face increased risk due to the strategic value of their data and operations. Additionally, the use of OSINT techniques by threat actors could facilitate more targeted and sophisticated attacks, increasing the likelihood of successful compromise if defenses are not adequately prepared.
Mitigation Recommendations
Given the nature of this threat, European organizations should implement enhanced network monitoring and threat hunting practices focused on detecting unusual payload delivery and network activity patterns. Deploying and regularly updating intrusion detection and prevention systems (IDS/IPS) with the latest IOCs from trusted sources like ThreatFox can improve early detection capabilities. Organizations should also conduct regular OSINT hygiene reviews to minimize exposure of sensitive information that could be leveraged by attackers. Network segmentation and strict access controls can limit the lateral movement of malware if an infection occurs. Employee awareness training on phishing and social engineering tactics remains critical, as these are common initial infection vectors. Since no patches are available, emphasis should be placed on proactive detection and response rather than remediation via software updates. Collaboration with national and European cybersecurity centers for sharing threat intelligence and coordinated response can further enhance resilience against such threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
Indicators of Compromise
- domain: check.eiuuu.online
- url: https://check.eiuuu.online/gkcxv.google
- domain: kurrenpowed.run
- file: 1.118.34.220
- hash: 443
- file: 172.94.9.179
- hash: 1962
- file: 118.31.229.51
- hash: 8080
- file: 5.181.157.26
- hash: 60000
- file: 85.239.245.157
- hash: 8888
- file: 163.5.112.109
- hash: 8808
- file: 38.18.228.187
- hash: 5353
- file: 193.163.203.62
- hash: 7443
- domain: www.projectdocs.io
- file: 46.246.84.20
- hash: 9000
- file: 46.246.4.12
- hash: 8080
- file: 46.246.6.12
- hash: 8000
- file: 13.40.111.214
- hash: 8008
- file: 13.125.181.205
- hash: 4841
- file: 154.12.94.68
- hash: 80
- file: 5.181.177.232
- hash: 80
- file: 138.197.25.162
- hash: 3333
- file: 159.223.83.97
- hash: 80
- file: 45.157.233.45
- hash: 80
- file: 134.199.141.28
- hash: 8000
- domain: check.aoyai.online
- url: https://check.aoyai.online/gkcxv.google
- url: http://propere.ru/eternalgeneratorlocal.php
- url: http://59.95.134.248:33569/mozi.m
- file: 64.190.113.159
- hash: 1488
- domain: application-update.australiasoutheast.cloudapp.azure.com
- file: 37.44.238.66
- hash: 889
- file: 103.249.34.153
- hash: 80
- file: 45.76.136.228
- hash: 8085
- file: 128.90.122.201
- hash: 2000
- file: 109.120.137.86
- hash: 80
- file: 176.65.137.197
- hash: 80
- file: 185.193.126.20
- hash: 443
- file: 91.200.101.43
- hash: 443
- file: 91.200.101.43
- hash: 8443
- file: 122.99.131.253
- hash: 443
- file: 122.199.149.129
- hash: 9735
- file: 47.92.216.164
- hash: 8888
- file: 47.96.249.96
- hash: 80
- domain: peacefulsuns.shop
- file: 196.251.118.109
- hash: 443
- domain: 139-162-1-232.ip.linodeusercontent.com
- file: 202.79.171.181
- hash: 60000
- file: 47.98.119.235
- hash: 3333
- file: 93.179.253.181
- hash: 443
- file: 172.232.97.18
- hash: 3333
- file: 18.197.6.78
- hash: 443
- file: 40.82.182.20
- hash: 443
- file: 3.145.44.18
- hash: 3333
- file: 14.140.57.58
- hash: 50001
- file: 13.50.119.113
- hash: 3333
- file: 138.197.40.139
- hash: 3333
- file: 3.120.218.56
- hash: 80
- file: 3.120.218.56
- hash: 443
- file: 3.69.196.166
- hash: 80
- file: 3.69.196.166
- hash: 443
- file: 51.83.123.149
- hash: 443
- file: 44.229.208.63
- hash: 443
- file: 13.60.46.164
- hash: 443
- file: 113.53.233.60
- hash: 3333
- file: 81.70.196.223
- hash: 9999
- file: 68.183.59.177
- hash: 3333
- file: 3.76.101.219
- hash: 80
- file: 3.76.101.219
- hash: 443
- file: 181.32.45.216
- hash: 8080
- file: 3.109.96.224
- hash: 3333
- file: 4.231.252.108
- hash: 443
- file: 5.35.90.238
- hash: 3333
- file: 52.28.64.182
- hash: 80
- file: 52.28.64.182
- hash: 443
- file: 18.206.132.156
- hash: 443
- file: 185.243.241.129
- hash: 3333
- file: 34.87.37.192
- hash: 8080
- file: 18.185.194.29
- hash: 80
- file: 18.185.194.29
- hash: 443
- file: 185.224.0.18
- hash: 23
- file: 162.230.48.189
- hash: 9050
- url: http://657355cm.shnyash.ru/eternallinepythonjssecureprocessormultiflowerasyncdle.php
- file: 92.38.160.48
- hash: 5858
- file: 114.55.100.165
- hash: 19998
- file: 119.91.236.181
- hash: 443
- file: 72.48.168.87
- hash: 31337
- file: 45.61.159.18
- hash: 31337
- file: 137.184.190.241
- hash: 7443
- file: 121.141.37.193
- hash: 6001
- file: 24.248.115.196
- hash: 9443
- hash: b1d81e8bbecccc547645d17395538a2d
- hash: a20886a5b378624d16972db66bd4e7e1
- hash: f16238836909d07f86154c5ccbade96a
- hash: 30656c737338818bee8cc3591e3f3dcc
- hash: 571684f28ce1cf4d8236dbd46ef6f7f0
- hash: 65c0c7c9fe6bc1d5296447aae6c6c14c
- hash: d972bbbb3edb0e5ab5751b911f3dda17
- hash: 146d350fd6271b4411714c630d8cda87
- hash: ff458208c49836cdec92f0a4a7ba6afd
- hash: 67a44a38cc36becd6e2e9c20c27fd9ad
- hash: 3a39bcd9fc840b4e13042f916d9eb39a
- hash: b47cdcdc179c5949ce18f4d161603901
- hash: 2348b069647af0a714ae1e005f73b522
- hash: 14a0ecf45aa72adb2b1f2ccca99f6faa
- hash: 57f45c0738af9cd49c61984ea99f83ca
- hash: 31a77e0d1c1b91eebec1f7cdcc1ab8b8
- hash: 74ae58a716aa834949388ee1574788e0
- hash: 0e521e0452f113cdf8b5c2fa6580db1f
- hash: 7e851829ee37bc0cf65a268d1d1baa7a
- url: http://37.139.129.142/htdocs/fphfnxjwcapqtjs.exe
- url: http://81.161.229.110/htdocs/ckbxefdwztoqgjr.exe
- url: http://66.63.187.123/txt/xcsqpljhnnvxytrw.exe
- url: http://154.216.19.160/txt/xugzybfe02qd31l.exe
- url: https://45.131.215.139/c262c2557c712ca5/mozglue.dll
- url: https://45.131.215.139/c262c2557c712ca5/vcruntime140.dll
- url: https://45.131.215.139/c262c2557c712ca5/sqlite3.dll
- url: http://185.172.128.151/8420e83ceb95f3af/vcruntime140.dll
- url: http://45.200.148.113/2a5dc88bed850cdd/sqlite3.dll
- url: http://5.75.232.223/f7a5529f1c222f09/vcruntime140.dll
- url: http://45.66.10.126/2cff1c7a346e2cbb/sqlite3.dll
- url: http://45.66.10.126/2cff1c7a346e2cbb/mozglue.dll
- url: http://45.66.10.126/2cff1c7a346e2cbb/vcruntime140.dll
- url: https://languarel.fun/api
- url: http://109.120.137.86/
- url: https://api.telegram.org/bot7592112496:aahwqmde0x-fj2n0rbguczjkz_sobvb4yd0/
- domain: arthurus36.duckdns.org
- url: https://pastebin.com/raw/m6f7abes
- url: https://pastebin.com/raw/njcwujba
- domain: mrkoko-25195.portmap.io
- domain: y3yy5434yg3y4y-35188.portmap.host
- file: 193.161.193.99
- hash: 35188
- file: 193.161.193.99
- hash: 25195
- domain: envisionfonddulac.envisionfonddulac.org
- domain: check.aeuye.online
- url: https://check.aeuye.online/gkcxv.google
- domain: check.iyoio.online
- url: https://check.iyoio.online/gkcxv.google
- url: http://sebel.sbs/devil/pws/fre.php
- file: 176.65.144.135
- hash: 65012
- domain: a1.nbdsnb2.top
- domain: a1.yydsnb1.top
- file: 47.76.184.172
- hash: 1080
- url: http://185.101.93.72/14840646743032cdbox/14840646743032cdbox.php
- domain: europeservices-01.sytes.net
- file: 104.194.132.104
- hash: 3306
- domain: mui.cdn-serveri4345-ns.shop
- domain: owerenvokken.run
- domain: download.cdn-serveri2245-ns.shop
- domain: check.yyuea.online
- url: https://check.yyuea.online/gkcxv.google
- file: 121.199.160.241
- hash: 8080
- file: 182.92.106.207
- hash: 80
- file: 8.134.86.92
- hash: 80
- file: 5.181.157.26
- hash: 21
- file: 185.196.10.242
- hash: 2967
- file: 34.239.124.16
- hash: 4839
- file: 18.220.190.184
- hash: 6362
- file: 179.95.205.120
- hash: 9990
- file: 87.251.79.211
- hash: 80
- file: 195.62.32.75
- hash: 8000
- domain: check.iouii.online
- url: https://check.iouii.online/gkcxv.google
- file: 3.147.52.12
- hash: 7771
- file: 46.153.249.193
- hash: 443
- file: 47.76.212.233
- hash: 7771
- file: 77.105.164.175
- hash: 7000
- file: 185.7.214.181
- hash: 4417
- file: 196.251.70.152
- hash: 5000
- file: 196.251.113.81
- hash: 7000
- file: 45.88.186.35
- hash: 4449
- file: 185.196.10.66
- hash: 4449
- domain: sebel.sbs
- file: 162.230.48.189
- hash: 8848
- file: 206.119.117.186
- hash: 8888
- file: 31.184.197.132
- hash: 4443
- file: 49.7.54.66
- hash: 9443
- file: 52.223.43.217
- hash: 443
- file: 95.219.235.86
- hash: 443
- url: http://sebel.sbs/devil/pws/pvqdq929bsx_a_d_m1n_a.php
- domain: thrtnn13sr.top
- domain: tzeight8pn.top
- domain: timofezq.beget.tech
- domain: a1083178.xsph.ru
- domain: rodina.space
- domain: a1002438.xsph.ru
- domain: cs44110.tw1.ru
- domain: vavstcilke.site
- domain: babyedopposer.site
- domain: paggerquitl.click
- domain: lompappojumm.click
- domain: reconcilen.cyou
- file: 121.40.116.208
- hash: 80
- file: 202.165.123.57
- hash: 1234
- url: https://uncertainyelemz.bet/api
- url: https://reconcilen.cyou/api
- url: https://vavstcilke.site/api
- domain: uncertainyelemz.bet
- domain: elvnnn11sr.top
- domain: tencc10vs.top
- domain: ninecc9vs.top
- domain: tennn10sr.top
- domain: elvncc11vs.top
- domain: prideforgek.fun
- file: 195.62.32.75
- hash: 4569
- domain: newcli.bumbleshrimp.com
- domain: vf5qziznc.theworkpc.com
- file: 124.81.189.211
- hash: 5555
- file: 8.155.7.133
- hash: 80
- file: 47.119.122.113
- hash: 8443
- file: 160.202.227.126
- hash: 80
- domain: web.4t.com
- url: https://www.rim.jp.eu.org/
- url: https://web.4t.com/
- file: 196.251.87.253
- hash: 3409
- url: https://193.143.1.242/nta4mzixmjdkyznj/
- url: https://8ed56n923sml237vm90sdl23k.xyz/nta4mzixmjdkyznj/
- url: https://8edfw45sacasf237vm90sdl23k.xyz/nta4mzixmjdkyznj/
- url: https://8edfw45sacasfdvm90sdl23k.xyz/nta4mzixmjdkyznj/
- url: https://66edf5sacasfdml237vm90sdl23k.xyz/nta4mzixmjdkyznj/
- url: https://6edfw45sfdml237vm90sdl23k.xyz/nta4mzixmjdkyznj/
- url: https://5edfw45saml237vm90sdl23k.xyz/nta4mzixmjdkyznj/
- url: https://karemalespet35.com/zjq2njg0mwjjnge0/
- url: https://ezhlkgerman0101.com/zjq2njg0mwjjnge0/
- url: https://gassapadalera.com/zjq2njg0mwjjnge0/
- url: https://tanjubolubaskani.com/zjq2njg0mwjjnge0/
- url: https://lalelercicekalti.com/zjq2njg0mwjjnge0/
- url: https://91.202.233.175/nta4mzixmjdkyznj/
- url: https://8ed56n923sacasfdml237vm90sdl23k.com/nta4mzixmjdkyznj/
- url: https://8edfw45sacasfdml237vm90sdl23k.com/nta4mzixmjdkyznj/
- file: 154.92.14.41
- hash: 2999
- url: http://147.45.185.85/4servervoiddbtemporary/3pipe/eternaltojavascriptrequestprocessorauthbasetrackwordpresstemp.php
- domain: check.oyaoe.icu
- url: https://check.oyaoe.icu/gkcxv.google
- domain: check.oyyyo.icu
- url: https://check.oyyyo.icu/gkcxv.google
- domain: check.ayyiy.icu
- url: http://rakeidea.xyz/art.php
- url: http://hairteeth.icu/ryt.php
- url: http://rakeidea.xyz/lod.php
- url: http://rakeidea.xyz/dol.php
- url: https://check.ayyiy.icu/gkcxv.google
- domain: rakeidea.xyz
- domain: booksstamp.icu
- domain: hairteeth.icu
- file: 34.41.85.175
- hash: 8080
- file: 8.137.98.17
- hash: 4567
- file: 185.157.162.126
- hash: 1777
- file: 194.113.74.21
- hash: 31337
- file: 101.36.112.228
- hash: 31337
- file: 45.9.148.226
- hash: 8808
- file: 102.117.167.162
- hash: 7443
- file: 45.77.140.9
- hash: 8089
- domain: trumpsbtc.com
- file: 156.238.247.236
- hash: 8082
- file: 176.65.141.101
- hash: 8080
- file: 34.239.124.16
- hash: 49089
- file: 13.48.190.228
- hash: 888
- file: 13.48.190.228
- hash: 5938
- file: 103.117.120.196
- hash: 80
- file: 107.189.31.150
- hash: 22512
- file: 95.111.195.204
- hash: 8000
- file: 103.180.236.30
- hash: 38964
- domain: ubuntu.tel
- url: http://u1.stungoverhaul.shop/vtsucks.mp4
- domain: u1.stungoverhaul.shop
- domain: check.yeiia.icu
- domain: fk.fdsfdsdfdsf.co
- file: 154.221.21.196
- hash: 8080
- url: https://check.yeiia.icu/gkcxv.google
- domain: check.yieue.icu
- url: https://check.yieue.icu/gkcxv.google
- domain: check.eyoiu.icu
- url: https://check.eyoiu.icu/gkcxv.google
- url: http://62.164.130.69
- domain: virus00963.ddns.net
- domain: sites-ascii.gl.at.ply.gg
- domain: 783264.zapto.org
- domain: qmffk002.ddns.net
- domain: started-smtp.gl.at.ply.gg
- domain: xtr.all4syrian.com
- domain: antivir.myq-see.com
- domain: btlryan.webredirect.org
- domain: sembrani.duckdns.org
- domain: so-cells.gl.at.ply.gg
- domain: islands-toy.gl.at.ply.gg
- domain: front-trader.gl.at.ply.gg
- file: 198.46.177.152
- hash: 1177
- file: 25.14.26.97
- hash: 5040
- file: 144.126.151.157
- hash: 1194
- file: 195.166.166.2
- hash: 1080
- url: http://home.fivejj5sr.top/fwukggcxtlvtnbnjjscp17
- url: http://home.thrtcc13vs.top/hqltbjpjafkpsochiymy1739702807
- url: http://home.elvncc11vs.top/xbsnazxltqycaortyqzi18
- url: http://home.fivecc5vs.top/rkxptsblyxnxxrpalizi17
- url: http://home.thrtnn13sr.top/aahavaebyhhtjvhqeqsz17
- url: http://home.fivenn5sr.top/dodogdwnpbpmwhmjdvnk17
- domain: sponsor.sewacanada.org
- domain: check.iauyy.icu
- url: https://check.iauyy.icu/gkcxv.google
- url: http://u1.stungoverhaul.shop/1.mp4
- file: 109.120.137.80
- hash: 56443
- file: 115.120.230.250
- hash: 8091
- file: 106.75.171.12
- hash: 8443
- file: 34.96.252.230
- hash: 443
- file: 78.129.165.238
- hash: 8000
- file: 176.65.142.132
- hash: 8808
- domain: trumpboost.vip
- file: 31.58.158.92
- hash: 80
- file: 125.24.5.72
- hash: 7443
- domain: ramatwo.site
- url: http://109.120.137.80:56443/xexh
- domain: neglectdivid.world
- domain: censcusfunw.icu
- domain: lawyesaved.today
- domain: miscrirarisz.today
- domain: reasonablerwi.today
- domain: embarkiffe.shop
- domain: hearemiscrati.shop
- domain: fallerestez.digital
- domain: girflekoma.digital
- file: 185.222.58.250
- hash: 55615
- domain: check.iyaea.icu
- url: https://check.iyaea.icu/gkcxv.google
- url: https://check.aayai.icu/gkcxv.google
- url: http://a1083407.xsph.ru/l1nc0in.php
- file: 186.169.51.98
- hash: 2404
- domain: topics22.live
- domain: trumpboost.pro
- file: 114.240.69.64
- hash: 4782
- file: 45.61.137.211
- hash: 443
- domain: host-185-193-126-20.njalla.net
- file: 15.222.13.226
- hash: 9201
- file: 203.96.177.194
- hash: 443
- file: 31.184.196.130
- hash: 4443
- file: 34.96.252.230
- hash: 8888
- file: 36.212.254.213
- hash: 9443
- file: 52.78.73.214
- hash: 1723
- url: http://a1087172.xsph.ru/182aa2a7.php
- domain: ns1.kerrerf.com
- domain: wxx.aliyunn.uno
- file: 27.106.110.32
- hash: 53
- file: 98.84.63.214
- hash: 53
- url: http://maxsim87.beget.tech/a375e275.php
ThreatFox IOCs for 2025-02-22
Description
ThreatFox IOCs for 2025-02-22
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2025-02-22 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The entry does not specify any particular malware family, affected software versions, or detailed technical indicators, and no known exploits are currently reported in the wild. The threat level is rated as medium with a threatLevel score of 2, indicating a moderate concern. The absence of patch availability and lack of specific CWE identifiers suggest this is more an intelligence report on observed malicious activity or infrastructure rather than a newly discovered vulnerability or exploit. The IOCs are intended for use in threat detection and response, helping organizations identify potential malicious payload delivery mechanisms or network behaviors associated with malware campaigns. The lack of detailed technical indicators or affected products limits the ability to pinpoint exact attack vectors or malware capabilities. However, the focus on OSINT and network activity implies that the threat actors may be leveraging publicly available information and network-based delivery methods to propagate malware or conduct reconnaissance. The TLP:white tag indicates that the information is intended for wide distribution and sharing within the security community.
Potential Impact
For European organizations, the impact of this threat primarily lies in the potential for malware infections via network-based payload delivery mechanisms. Given the medium severity and lack of known exploits, the immediate risk may be moderate but should not be underestimated, especially for organizations with high exposure to external networks or those relying heavily on OSINT for their operations. Malware infections can lead to data exfiltration, disruption of services, or further compromise of internal systems. The absence of specific affected products means that a broad range of systems could be targeted, increasing the scope of potential impact. European entities involved in critical infrastructure, finance, or government sectors may face increased risk due to the strategic value of their data and operations. Additionally, the use of OSINT techniques by threat actors could facilitate more targeted and sophisticated attacks, increasing the likelihood of successful compromise if defenses are not adequately prepared.
Mitigation Recommendations
Given the nature of this threat, European organizations should implement enhanced network monitoring and threat hunting practices focused on detecting unusual payload delivery and network activity patterns. Deploying and regularly updating intrusion detection and prevention systems (IDS/IPS) with the latest IOCs from trusted sources like ThreatFox can improve early detection capabilities. Organizations should also conduct regular OSINT hygiene reviews to minimize exposure of sensitive information that could be leveraged by attackers. Network segmentation and strict access controls can limit the lateral movement of malware if an infection occurs. Employee awareness training on phishing and social engineering tactics remains critical, as these are common initial infection vectors. Since no patches are available, emphasis should be placed on proactive detection and response rather than remediation via software updates. Collaboration with national and European cybersecurity centers for sharing threat intelligence and coordinated response can further enhance resilience against such threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- ed3ac9bd-0318-4bdc-a196-30838575938f
- Original Timestamp
- 1740268986
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domaincheck.eiuuu.online | ClearFake payload delivery domain (confidence level: 100%) | |
domainkurrenpowed.run | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainwww.projectdocs.io | Havoc botnet C2 domain (confidence level: 100%) | |
domaincheck.aoyai.online | ClearFake payload delivery domain (confidence level: 100%) | |
domainapplication-update.australiasoutheast.cloudapp.azure.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainpeacefulsuns.shop | Unknown malware botnet C2 domain (confidence level: 100%) | |
domain139-162-1-232.ip.linodeusercontent.com | Havoc botnet C2 domain (confidence level: 100%) | |
domainarthurus36.duckdns.org | Quasar RAT botnet C2 domain (confidence level: 50%) | |
domainmrkoko-25195.portmap.io | XWorm botnet C2 domain (confidence level: 50%) | |
domainy3yy5434yg3y4y-35188.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domainenvisionfonddulac.envisionfonddulac.org | FAKEUPDATES payload delivery domain (confidence level: 50%) | |
domaincheck.aeuye.online | ClearFake payload delivery domain (confidence level: 100%) | |
domaincheck.iyoio.online | ClearFake payload delivery domain (confidence level: 100%) | |
domaina1.nbdsnb2.top | FatalRat botnet C2 domain (confidence level: 100%) | |
domaina1.yydsnb1.top | FatalRat botnet C2 domain (confidence level: 100%) | |
domaineuropeservices-01.sytes.net | JanelaRAT botnet C2 domain (confidence level: 100%) | |
domainmui.cdn-serveri4345-ns.shop | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainowerenvokken.run | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaindownload.cdn-serveri2245-ns.shop | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domaincheck.yyuea.online | ClearFake payload delivery domain (confidence level: 100%) | |
domaincheck.iouii.online | ClearFake payload delivery domain (confidence level: 100%) | |
domainsebel.sbs | Loki Password Stealer (PWS) botnet C2 domain (confidence level: 50%) | |
domainthrtnn13sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintzeight8pn.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintimofezq.beget.tech | DCRat botnet C2 domain (confidence level: 100%) | |
domaina1083178.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domainrodina.space | DCRat botnet C2 domain (confidence level: 100%) | |
domaina1002438.xsph.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domaincs44110.tw1.ru | DCRat botnet C2 domain (confidence level: 100%) | |
domainvavstcilke.site | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainbabyedopposer.site | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpaggerquitl.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlompappojumm.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainreconcilen.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainuncertainyelemz.bet | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainelvnnn11sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintencc10vs.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainninecc9vs.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domaintennn10sr.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainelvncc11vs.top | CryptBot botnet C2 domain (confidence level: 100%) | |
domainprideforgek.fun | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainnewcli.bumbleshrimp.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainvf5qziznc.theworkpc.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainweb.4t.com | Vidar botnet C2 domain (confidence level: 100%) | |
domaincheck.oyaoe.icu | ClearFake payload delivery domain (confidence level: 100%) | |
domaincheck.oyyyo.icu | ClearFake payload delivery domain (confidence level: 100%) | |
domaincheck.ayyiy.icu | ClearFake payload delivery domain (confidence level: 100%) | |
domainrakeidea.xyz | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainbooksstamp.icu | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainhairteeth.icu | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domaintrumpsbtc.com | Hook botnet C2 domain (confidence level: 100%) | |
domainubuntu.tel | Mirai botnet C2 domain (confidence level: 75%) | |
domainu1.stungoverhaul.shop | ClearFake payload delivery domain (confidence level: 100%) | |
domaincheck.yeiia.icu | ClearFake payload delivery domain (confidence level: 100%) | |
domainfk.fdsfdsdfdsf.co | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaincheck.yieue.icu | ClearFake payload delivery domain (confidence level: 100%) | |
domaincheck.eyoiu.icu | ClearFake payload delivery domain (confidence level: 100%) | |
domainvirus00963.ddns.net | NjRAT botnet C2 domain (confidence level: 100%) | |
domainsites-ascii.gl.at.ply.gg | NjRAT botnet C2 domain (confidence level: 100%) | |
domain783264.zapto.org | NjRAT botnet C2 domain (confidence level: 100%) | |
domainqmffk002.ddns.net | NjRAT botnet C2 domain (confidence level: 100%) | |
domainstarted-smtp.gl.at.ply.gg | NjRAT botnet C2 domain (confidence level: 100%) | |
domainxtr.all4syrian.com | NjRAT botnet C2 domain (confidence level: 100%) | |
domainantivir.myq-see.com | NjRAT botnet C2 domain (confidence level: 100%) | |
domainbtlryan.webredirect.org | NjRAT botnet C2 domain (confidence level: 100%) | |
domainsembrani.duckdns.org | NjRAT botnet C2 domain (confidence level: 100%) | |
domainso-cells.gl.at.ply.gg | NjRAT botnet C2 domain (confidence level: 100%) | |
domainislands-toy.gl.at.ply.gg | NjRAT botnet C2 domain (confidence level: 100%) | |
domainfront-trader.gl.at.ply.gg | NjRAT botnet C2 domain (confidence level: 100%) | |
domainsponsor.sewacanada.org | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domaincheck.iauyy.icu | ClearFake payload delivery domain (confidence level: 100%) | |
domaintrumpboost.vip | Hook botnet C2 domain (confidence level: 100%) | |
domainramatwo.site | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainneglectdivid.world | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincenscusfunw.icu | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlawyesaved.today | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmiscrirarisz.today | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainreasonablerwi.today | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainembarkiffe.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainhearemiscrati.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainfallerestez.digital | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaingirflekoma.digital | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincheck.iyaea.icu | ClearFake payload delivery domain (confidence level: 100%) | |
domaintopics22.live | Hook botnet C2 domain (confidence level: 100%) | |
domaintrumpboost.pro | Hook botnet C2 domain (confidence level: 100%) | |
domainhost-185-193-126-20.njalla.net | Havoc botnet C2 domain (confidence level: 100%) | |
domainns1.kerrerf.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainwxx.aliyunn.uno | Cobalt Strike botnet C2 domain (confidence level: 75%) |
Url
Value | Description | Copy |
---|---|---|
urlhttps://check.eiuuu.online/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.aoyai.online/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://propere.ru/eternalgeneratorlocal.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://59.95.134.248:33569/mozi.m | Mozi payload delivery URL (confidence level: 50%) | |
urlhttp://657355cm.shnyash.ru/eternallinepythonjssecureprocessormultiflowerasyncdle.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://37.139.129.142/htdocs/fphfnxjwcapqtjs.exe | MASS Logger payload delivery URL (confidence level: 50%) | |
urlhttp://81.161.229.110/htdocs/ckbxefdwztoqgjr.exe | MASS Logger payload delivery URL (confidence level: 50%) | |
urlhttp://66.63.187.123/txt/xcsqpljhnnvxytrw.exe | MASS Logger payload delivery URL (confidence level: 50%) | |
urlhttp://154.216.19.160/txt/xugzybfe02qd31l.exe | MASS Logger payload delivery URL (confidence level: 50%) | |
urlhttps://45.131.215.139/c262c2557c712ca5/mozglue.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://45.131.215.139/c262c2557c712ca5/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://45.131.215.139/c262c2557c712ca5/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://185.172.128.151/8420e83ceb95f3af/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://45.200.148.113/2a5dc88bed850cdd/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://5.75.232.223/f7a5529f1c222f09/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://45.66.10.126/2cff1c7a346e2cbb/sqlite3.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://45.66.10.126/2cff1c7a346e2cbb/mozglue.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttp://45.66.10.126/2cff1c7a346e2cbb/vcruntime140.dll | Stealc payload delivery URL (confidence level: 50%) | |
urlhttps://languarel.fun/api | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttp://109.120.137.86/ | Hook botnet C2 (confidence level: 50%) | |
urlhttps://api.telegram.org/bot7592112496:aahwqmde0x-fj2n0rbguczjkz_sobvb4yd0/ | Agent Tesla botnet C2 (confidence level: 50%) | |
urlhttps://pastebin.com/raw/m6f7abes | XWorm botnet C2 (confidence level: 50%) | |
urlhttps://pastebin.com/raw/njcwujba | XWorm botnet C2 (confidence level: 50%) | |
urlhttps://check.aeuye.online/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.iyoio.online/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://sebel.sbs/devil/pws/fre.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 100%) | |
urlhttp://185.101.93.72/14840646743032cdbox/14840646743032cdbox.php | Metamorfo botnet C2 (confidence level: 100%) | |
urlhttps://check.yyuea.online/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.iouii.online/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://sebel.sbs/devil/pws/pvqdq929bsx_a_d_m1n_a.php | LokiBot botnet C2 (confidence level: 100%) | |
urlhttps://uncertainyelemz.bet/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://reconcilen.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://vavstcilke.site/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://www.rim.jp.eu.org/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://web.4t.com/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://193.143.1.242/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://8ed56n923sml237vm90sdl23k.xyz/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://8edfw45sacasf237vm90sdl23k.xyz/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://8edfw45sacasfdvm90sdl23k.xyz/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://66edf5sacasfdml237vm90sdl23k.xyz/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://6edfw45sfdml237vm90sdl23k.xyz/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://5edfw45saml237vm90sdl23k.xyz/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://karemalespet35.com/zjq2njg0mwjjnge0/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://ezhlkgerman0101.com/zjq2njg0mwjjnge0/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://gassapadalera.com/zjq2njg0mwjjnge0/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://tanjubolubaskani.com/zjq2njg0mwjjnge0/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://lalelercicekalti.com/zjq2njg0mwjjnge0/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://91.202.233.175/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://8ed56n923sacasfdml237vm90sdl23k.com/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttps://8edfw45sacasfdml237vm90sdl23k.com/nta4mzixmjdkyznj/ | Coper botnet C2 (confidence level: 80%) | |
urlhttp://147.45.185.85/4servervoiddbtemporary/3pipe/eternaltojavascriptrequestprocessorauthbasetrackwordpresstemp.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://check.oyaoe.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.oyyyo.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://rakeidea.xyz/art.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttp://hairteeth.icu/ryt.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttp://rakeidea.xyz/lod.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttp://rakeidea.xyz/dol.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttps://check.ayyiy.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://u1.stungoverhaul.shop/vtsucks.mp4 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.yeiia.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.yieue.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.eyoiu.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://62.164.130.69 | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://home.fivejj5sr.top/fwukggcxtlvtnbnjjscp17 | CryptBot botnet C2 (confidence level: 100%) | |
urlhttp://home.thrtcc13vs.top/hqltbjpjafkpsochiymy1739702807 | CryptBot botnet C2 (confidence level: 100%) | |
urlhttp://home.elvncc11vs.top/xbsnazxltqycaortyqzi18 | CryptBot botnet C2 (confidence level: 100%) | |
urlhttp://home.fivecc5vs.top/rkxptsblyxnxxrpalizi17 | CryptBot botnet C2 (confidence level: 100%) | |
urlhttp://home.thrtnn13sr.top/aahavaebyhhtjvhqeqsz17 | CryptBot botnet C2 (confidence level: 100%) | |
urlhttp://home.fivenn5sr.top/dodogdwnpbpmwhmjdvnk17 | CryptBot botnet C2 (confidence level: 100%) | |
urlhttps://check.iauyy.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://u1.stungoverhaul.shop/1.mp4 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://109.120.137.80:56443/xexh | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttps://check.iyaea.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.aayai.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://a1083407.xsph.ru/l1nc0in.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://a1087172.xsph.ru/182aa2a7.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://maxsim87.beget.tech/a375e275.php | DCRat botnet C2 (confidence level: 100%) |
File
Value | Description | Copy |
---|---|---|
file1.118.34.220 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file172.94.9.179 | Remcos botnet C2 server (confidence level: 100%) | |
file118.31.229.51 | Remcos botnet C2 server (confidence level: 100%) | |
file5.181.157.26 | Remcos botnet C2 server (confidence level: 100%) | |
file85.239.245.157 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file163.5.112.109 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file38.18.228.187 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file193.163.203.62 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.246.84.20 | DCRat botnet C2 server (confidence level: 100%) | |
file46.246.4.12 | DCRat botnet C2 server (confidence level: 100%) | |
file46.246.6.12 | DCRat botnet C2 server (confidence level: 100%) | |
file13.40.111.214 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.125.181.205 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file154.12.94.68 | MooBot botnet C2 server (confidence level: 100%) | |
file5.181.177.232 | MooBot botnet C2 server (confidence level: 100%) | |
file138.197.25.162 | Unknown malware botnet C2 server (confidence level: 100%) | |
file159.223.83.97 | Bashlite botnet C2 server (confidence level: 100%) | |
file45.157.233.45 | MimiKatz botnet C2 server (confidence level: 100%) | |
file134.199.141.28 | MimiKatz botnet C2 server (confidence level: 100%) | |
file64.190.113.159 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file37.44.238.66 | Bashlite botnet C2 server (confidence level: 100%) | |
file103.249.34.153 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.76.136.228 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file128.90.122.201 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file109.120.137.86 | Hook botnet C2 server (confidence level: 100%) | |
file176.65.137.197 | Hook botnet C2 server (confidence level: 100%) | |
file185.193.126.20 | Havoc botnet C2 server (confidence level: 100%) | |
file91.200.101.43 | Havoc botnet C2 server (confidence level: 100%) | |
file91.200.101.43 | Havoc botnet C2 server (confidence level: 100%) | |
file122.99.131.253 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file122.199.149.129 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file47.92.216.164 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.96.249.96 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file196.251.118.109 | Havoc botnet C2 server (confidence level: 100%) | |
file202.79.171.181 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.98.119.235 | Unknown malware botnet C2 server (confidence level: 100%) | |
file93.179.253.181 | Unknown malware botnet C2 server (confidence level: 100%) | |
file172.232.97.18 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.197.6.78 | Unknown malware botnet C2 server (confidence level: 100%) | |
file40.82.182.20 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.145.44.18 | Unknown malware botnet C2 server (confidence level: 100%) | |
file14.140.57.58 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.50.119.113 | Unknown malware botnet C2 server (confidence level: 100%) | |
file138.197.40.139 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.120.218.56 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.120.218.56 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.69.196.166 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.69.196.166 | Unknown malware botnet C2 server (confidence level: 100%) | |
file51.83.123.149 | Unknown malware botnet C2 server (confidence level: 100%) | |
file44.229.208.63 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.60.46.164 | Unknown malware botnet C2 server (confidence level: 100%) | |
file113.53.233.60 | Unknown malware botnet C2 server (confidence level: 100%) | |
file81.70.196.223 | Unknown malware botnet C2 server (confidence level: 100%) | |
file68.183.59.177 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.76.101.219 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.76.101.219 | Unknown malware botnet C2 server (confidence level: 100%) | |
file181.32.45.216 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.109.96.224 | Unknown malware botnet C2 server (confidence level: 100%) | |
file4.231.252.108 | Unknown malware botnet C2 server (confidence level: 100%) | |
file5.35.90.238 | Unknown malware botnet C2 server (confidence level: 100%) | |
file52.28.64.182 | Unknown malware botnet C2 server (confidence level: 100%) | |
file52.28.64.182 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.206.132.156 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.243.241.129 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.87.37.192 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.185.194.29 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.185.194.29 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.224.0.18 | Bashlite botnet C2 server (confidence level: 90%) | |
file162.230.48.189 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file92.38.160.48 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file114.55.100.165 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file119.91.236.181 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file72.48.168.87 | Sliver botnet C2 server (confidence level: 50%) | |
file45.61.159.18 | Sliver botnet C2 server (confidence level: 50%) | |
file137.184.190.241 | Unknown malware botnet C2 server (confidence level: 50%) | |
file121.141.37.193 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file24.248.115.196 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file193.161.193.99 | XWorm botnet C2 server (confidence level: 50%) | |
file193.161.193.99 | XWorm botnet C2 server (confidence level: 50%) | |
file176.65.144.135 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file47.76.184.172 | FatalRat botnet C2 server (confidence level: 75%) | |
file104.194.132.104 | JanelaRAT botnet C2 server (confidence level: 75%) | |
file121.199.160.241 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file182.92.106.207 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.134.86.92 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file5.181.157.26 | Remcos botnet C2 server (confidence level: 100%) | |
file185.196.10.242 | Remcos botnet C2 server (confidence level: 100%) | |
file34.239.124.16 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file18.220.190.184 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file179.95.205.120 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file87.251.79.211 | MooBot botnet C2 server (confidence level: 100%) | |
file195.62.32.75 | MimiKatz botnet C2 server (confidence level: 100%) | |
file3.147.52.12 | XWorm botnet C2 server (confidence level: 100%) | |
file46.153.249.193 | XWorm botnet C2 server (confidence level: 100%) | |
file47.76.212.233 | XWorm botnet C2 server (confidence level: 100%) | |
file77.105.164.175 | XWorm botnet C2 server (confidence level: 100%) | |
file185.7.214.181 | XWorm botnet C2 server (confidence level: 100%) | |
file196.251.70.152 | XWorm botnet C2 server (confidence level: 100%) | |
file196.251.113.81 | XWorm botnet C2 server (confidence level: 100%) | |
file45.88.186.35 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file185.196.10.66 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file162.230.48.189 | Remcos botnet C2 server (confidence level: 75%) | |
file206.119.117.186 | Sliver botnet C2 server (confidence level: 75%) | |
file31.184.197.132 | Sliver botnet C2 server (confidence level: 75%) | |
file49.7.54.66 | Sliver botnet C2 server (confidence level: 75%) | |
file52.223.43.217 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file95.219.235.86 | QakBot botnet C2 server (confidence level: 75%) | |
file121.40.116.208 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file202.165.123.57 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file195.62.32.75 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.81.189.211 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.155.7.133 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.119.122.113 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file160.202.227.126 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file196.251.87.253 | Remcos botnet C2 server (confidence level: 75%) | |
file154.92.14.41 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file34.41.85.175 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.137.98.17 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.157.162.126 | Remcos botnet C2 server (confidence level: 100%) | |
file194.113.74.21 | Sliver botnet C2 server (confidence level: 100%) | |
file101.36.112.228 | Sliver botnet C2 server (confidence level: 100%) | |
file45.9.148.226 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file102.117.167.162 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.77.140.9 | Hook botnet C2 server (confidence level: 100%) | |
file156.238.247.236 | Hook botnet C2 server (confidence level: 100%) | |
file176.65.141.101 | Venom RAT botnet C2 server (confidence level: 100%) | |
file34.239.124.16 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.48.190.228 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.48.190.228 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file103.117.120.196 | MooBot botnet C2 server (confidence level: 100%) | |
file107.189.31.150 | Mirai botnet C2 server (confidence level: 100%) | |
file95.111.195.204 | MimiKatz botnet C2 server (confidence level: 100%) | |
file103.180.236.30 | Mirai botnet C2 server (confidence level: 75%) | |
file154.221.21.196 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file198.46.177.152 | NjRAT botnet C2 server (confidence level: 100%) | |
file25.14.26.97 | NjRAT botnet C2 server (confidence level: 100%) | |
file144.126.151.157 | NjRAT botnet C2 server (confidence level: 100%) | |
file195.166.166.2 | NjRAT botnet C2 server (confidence level: 100%) | |
file109.120.137.80 | Meterpreter botnet C2 server (confidence level: 100%) | |
file115.120.230.250 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file106.75.171.12 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file34.96.252.230 | Sliver botnet C2 server (confidence level: 100%) | |
file78.129.165.238 | Sliver botnet C2 server (confidence level: 100%) | |
file176.65.142.132 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file31.58.158.92 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file125.24.5.72 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file185.222.58.250 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file186.169.51.98 | Remcos botnet C2 server (confidence level: 100%) | |
file114.240.69.64 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file45.61.137.211 | Havoc botnet C2 server (confidence level: 100%) | |
file15.222.13.226 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
file203.96.177.194 | Sliver botnet C2 server (confidence level: 75%) | |
file31.184.196.130 | Sliver botnet C2 server (confidence level: 75%) | |
file34.96.252.230 | Sliver botnet C2 server (confidence level: 75%) | |
file36.212.254.213 | Sliver botnet C2 server (confidence level: 75%) | |
file52.78.73.214 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
file27.106.110.32 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file98.84.63.214 | Cobalt Strike botnet C2 server (confidence level: 75%) |
Hash
Value | Description | Copy |
---|---|---|
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1962 | Remcos botnet C2 server (confidence level: 100%) | |
hash8080 | Remcos botnet C2 server (confidence level: 100%) | |
hash60000 | Remcos botnet C2 server (confidence level: 100%) | |
hash8888 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash5353 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9000 | DCRat botnet C2 server (confidence level: 100%) | |
hash8080 | DCRat botnet C2 server (confidence level: 100%) | |
hash8000 | DCRat botnet C2 server (confidence level: 100%) | |
hash8008 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash4841 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Bashlite botnet C2 server (confidence level: 100%) | |
hash80 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash8000 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash1488 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash889 | Bashlite botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8085 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash8443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash9735 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash50001 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9999 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash23 | Bashlite botnet C2 server (confidence level: 90%) | |
hash9050 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash5858 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash19998 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash6001 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash9443 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hashb1d81e8bbecccc547645d17395538a2d | Lynx payload (confidence level: 50%) | |
hasha20886a5b378624d16972db66bd4e7e1 | Lynx payload (confidence level: 50%) | |
hashf16238836909d07f86154c5ccbade96a | Lynx payload (confidence level: 50%) | |
hash30656c737338818bee8cc3591e3f3dcc | Lynx payload (confidence level: 50%) | |
hash571684f28ce1cf4d8236dbd46ef6f7f0 | Lynx payload (confidence level: 50%) | |
hash65c0c7c9fe6bc1d5296447aae6c6c14c | Lynx payload (confidence level: 50%) | |
hashd972bbbb3edb0e5ab5751b911f3dda17 | Lynx payload (confidence level: 50%) | |
hash146d350fd6271b4411714c630d8cda87 | Lynx payload (confidence level: 50%) | |
hashff458208c49836cdec92f0a4a7ba6afd | Lynx payload (confidence level: 50%) | |
hash67a44a38cc36becd6e2e9c20c27fd9ad | Lynx payload (confidence level: 50%) | |
hash3a39bcd9fc840b4e13042f916d9eb39a | Lynx payload (confidence level: 50%) | |
hashb47cdcdc179c5949ce18f4d161603901 | Lynx payload (confidence level: 50%) | |
hash2348b069647af0a714ae1e005f73b522 | Lynx payload (confidence level: 50%) | |
hash14a0ecf45aa72adb2b1f2ccca99f6faa | Lynx payload (confidence level: 50%) | |
hash57f45c0738af9cd49c61984ea99f83ca | Lynx payload (confidence level: 50%) | |
hash31a77e0d1c1b91eebec1f7cdcc1ab8b8 | Lynx payload (confidence level: 50%) | |
hash74ae58a716aa834949388ee1574788e0 | Lynx payload (confidence level: 50%) | |
hash0e521e0452f113cdf8b5c2fa6580db1f | Lynx payload (confidence level: 50%) | |
hash7e851829ee37bc0cf65a268d1d1baa7a | Lynx payload (confidence level: 50%) | |
hash35188 | XWorm botnet C2 server (confidence level: 50%) | |
hash25195 | XWorm botnet C2 server (confidence level: 50%) | |
hash65012 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash1080 | FatalRat botnet C2 server (confidence level: 75%) | |
hash3306 | JanelaRAT botnet C2 server (confidence level: 75%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash21 | Remcos botnet C2 server (confidence level: 100%) | |
hash2967 | Remcos botnet C2 server (confidence level: 100%) | |
hash4839 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash6362 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash9990 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash8000 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash7771 | XWorm botnet C2 server (confidence level: 100%) | |
hash443 | XWorm botnet C2 server (confidence level: 100%) | |
hash7771 | XWorm botnet C2 server (confidence level: 100%) | |
hash7000 | XWorm botnet C2 server (confidence level: 100%) | |
hash4417 | XWorm botnet C2 server (confidence level: 100%) | |
hash5000 | XWorm botnet C2 server (confidence level: 100%) | |
hash7000 | XWorm botnet C2 server (confidence level: 100%) | |
hash4449 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash4449 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8848 | Remcos botnet C2 server (confidence level: 75%) | |
hash8888 | Sliver botnet C2 server (confidence level: 75%) | |
hash4443 | Sliver botnet C2 server (confidence level: 75%) | |
hash9443 | Sliver botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1234 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4569 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash5555 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash3409 | Remcos botnet C2 server (confidence level: 75%) | |
hash2999 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4567 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1777 | Remcos botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8089 | Hook botnet C2 server (confidence level: 100%) | |
hash8082 | Hook botnet C2 server (confidence level: 100%) | |
hash8080 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash49089 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash888 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash5938 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash22512 | Mirai botnet C2 server (confidence level: 100%) | |
hash8000 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash38964 | Mirai botnet C2 server (confidence level: 75%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 100%) | |
hash5040 | NjRAT botnet C2 server (confidence level: 100%) | |
hash1194 | NjRAT botnet C2 server (confidence level: 100%) | |
hash1080 | NjRAT botnet C2 server (confidence level: 100%) | |
hash56443 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash8091 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8000 | Sliver botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash7443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash55615 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash9201 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
hash443 | Sliver botnet C2 server (confidence level: 75%) | |
hash4443 | Sliver botnet C2 server (confidence level: 75%) | |
hash8888 | Sliver botnet C2 server (confidence level: 75%) | |
hash9443 | Sliver botnet C2 server (confidence level: 75%) | |
hash1723 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
hash53 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash53 | Cobalt Strike botnet C2 server (confidence level: 75%) |
Threat ID: 68367c99182aa0cae2321fcd
Added to database: 5/28/2025, 3:01:45 AM
Last enriched: 6/27/2025, 10:50:13 AM
Last updated: 8/16/2025, 12:12:11 AM
Views: 19
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.