Skip to main content

ThreatFox IOCs for 2025-03-25

Medium
Published: Tue Mar 25 2025 (03/25/2025, 00:00:00 UTC)
Source: ThreatFox
Vendor/Project: type
Product: osint

Description

ThreatFox IOCs for 2025-03-25

AI-Powered Analysis

AILast updated: 06/18/2025, 08:20:38 UTC

Technical Analysis

The provided threat intelligence pertains to a malware-related report titled "ThreatFox IOCs for 2025-03-25," sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The report is categorized under OSINT (Open Source Intelligence), payload delivery, and network activity, indicating that it involves the distribution or delivery of malicious payloads through network vectors, with an emphasis on observable threat indicators. However, the technical details are limited, with no specific affected software versions or products identified beyond the generic label "osint." There are no Common Weakness Enumerations (CWEs) listed, no patches available, and no known exploits actively observed in the wild at the time of publication. The threat level is rated as 2 on an unspecified scale, with analysis and distribution scores suggesting moderate visibility and spread. The absence of concrete IOCs or detailed technical signatures limits the ability to perform deep technical analysis, but the classification implies a malware campaign or activity that leverages OSINT techniques for payload delivery and network-based infection vectors. The lack of patch availability and known exploits suggests this may be a newly observed or emerging threat, or one that exploits social engineering or network delivery mechanisms rather than software vulnerabilities. The TLP (Traffic Light Protocol) classification as white indicates the information is intended for broad dissemination without restrictions.

Potential Impact

For European organizations, the potential impact of this threat lies primarily in the risk of malware infection through network-based delivery mechanisms, possibly facilitated by OSINT-derived targeting or reconnaissance. Given the lack of specific affected products or vulnerabilities, the threat may manifest as phishing campaigns, malicious payload distribution via compromised websites or email, or exploitation of network services without requiring software vulnerabilities. This could lead to unauthorized access, data exfiltration, or disruption of services depending on the payload's nature. The medium severity rating suggests a moderate risk level, where successful exploitation could impact confidentiality and integrity, with potential availability effects depending on the malware's capabilities. European organizations with extensive network exposure, especially those in sectors with high-value data or critical infrastructure, could face targeted attempts to deliver malicious payloads. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation or escalation. The broad OSINT tag implies attackers may leverage publicly available information to tailor attacks, increasing the likelihood of successful social engineering or targeted delivery.

Mitigation Recommendations

Given the nature of this threat, European organizations should implement targeted mitigations beyond generic advice: 1) Enhance network monitoring with a focus on detecting unusual payload delivery patterns and network activity consistent with malware distribution, leveraging threat intelligence feeds including ThreatFox updates. 2) Employ advanced email filtering and URL reputation services to intercept phishing or malicious payload delivery attempts that may be informed by OSINT-derived targeting. 3) Conduct regular OSINT assessments on organizational digital footprints to identify and reduce exposure of sensitive information that could aid attackers in crafting targeted payload delivery campaigns. 4) Implement strict network segmentation and application whitelisting to limit the impact of potential malware infections. 5) Train security teams to recognize emerging malware delivery tactics that may not rely on known vulnerabilities but on social engineering and network exploitation. 6) Maintain up-to-date incident response plans that incorporate detection and containment strategies for malware introduced via network vectors without known patches or exploits. 7) Collaborate with national and European cybersecurity centers to share and receive timely intelligence on evolving malware threats and IOCs.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
1
Distribution
3
Uuid
fb50097c-aba2-4375-847f-21d83d94ebc8
Original Timestamp
1742947386

Indicators of Compromise

Domain

ValueDescriptionCopy
domainprogressiveptgreenvalley.com
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainwww.amanmail.info
Havoc botnet C2 domain (confidence level: 100%)
domainwww.mkdirjava.com
Havoc botnet C2 domain (confidence level: 100%)
domainelectrumdoge.com
Unknown malware botnet C2 domain (confidence level: 75%)
domainelectrum-avax.com
Unknown malware botnet C2 domain (confidence level: 75%)
domainelectrum-ravencoin.com
Unknown malware botnet C2 domain (confidence level: 75%)
domainelectrum-xmr.net
Unknown malware botnet C2 domain (confidence level: 75%)
domaincpcontacts.aaa.104-168-101-27.cprapid.com
Bashlite botnet C2 domain (confidence level: 100%)
domaincpanel.a.multi-canale.com
Bashlite botnet C2 domain (confidence level: 100%)
domainmail.b.ora-0-web.com
Bashlite botnet C2 domain (confidence level: 100%)
domainwebdisk.aaa.104-168-101-27.cprapid.com
Bashlite botnet C2 domain (confidence level: 100%)
domaincpanel.ora-0-web.com
Bashlite botnet C2 domain (confidence level: 100%)
domainsvchost.iqiyid.icu
Cobalt Strike botnet C2 domain (confidence level: 75%)
domainksmj.ddns.net
Nanocore RAT botnet C2 domain (confidence level: 100%)
domainhacknestm.run
Lumma Stealer botnet C2 domain (confidence level: 100%)
domaingalaxiay.world
Lumma Stealer botnet C2 domain (confidence level: 100%)
domaintrobudrunksz.click
Lumma Stealer botnet C2 domain (confidence level: 100%)
domain5461458.ddns.net
AsyncRAT botnet C2 domain (confidence level: 50%)
domaindadfsfsdfasdfasddfgssdfaafsd-63495.portmap.host
AsyncRAT botnet C2 domain (confidence level: 50%)
domainmmdrza.ddns.net
Quasar RAT botnet C2 domain (confidence level: 50%)
domainblancoestev27.duckdns.org
Remcos botnet C2 domain (confidence level: 50%)
domainruffella1122.duckdns.org
Remcos botnet C2 domain (confidence level: 50%)
domainflame3135-44263.portmap.host
XWorm botnet C2 domain (confidence level: 50%)
domaingmt-sherman.gl.at.ply.gg
XWorm botnet C2 domain (confidence level: 50%)
domainiii-single.gl.at.ply.gg
XWorm botnet C2 domain (confidence level: 50%)
domainpppaa-51102.portmap.host
XWorm botnet C2 domain (confidence level: 50%)
domainh.p.formaxprime.co.uk
Vidar botnet C2 domain (confidence level: 100%)
domainaiwavey.run
Lumma Stealer botnet C2 domain (confidence level: 75%)
domainbyteplusx.digital
Lumma Stealer botnet C2 domain (confidence level: 75%)
domainskynetxc.live
Lumma Stealer botnet C2 domain (confidence level: 75%)
domainpixtreev.run
Lumma Stealer botnet C2 domain (confidence level: 75%)
domainsparkiob.digital
Lumma Stealer botnet C2 domain (confidence level: 75%)
domainappgridn.live
Lumma Stealer botnet C2 domain (confidence level: 75%)
domainwebdisk.oraonweb.com
Bashlite botnet C2 domain (confidence level: 100%)
domainoct2.xyz
Loki Password Stealer (PWS) botnet C2 domain (confidence level: 75%)
domaincompralibri.com
FAKEUPDATES payload delivery domain (confidence level: 100%)
domainapp.formaxprime.co.uk
Vidar botnet C2 domain (confidence level: 100%)
domainse.app.formaxprime.co.uk
Vidar botnet C2 domain (confidence level: 100%)
domainpersimmon-turquoise344028.vm-host.com
Bashlite botnet C2 domain (confidence level: 100%)
domainhigerson.shop
Lumma Stealer payload delivery domain (confidence level: 100%)
domainamozon.cc
Cobalt Strike botnet C2 domain (confidence level: 75%)
domainkpl-gun77dan.com
Unknown Stealer botnet C2 domain (confidence level: 100%)
domainwebmail.efcommxerce.ru
Hook botnet C2 domain (confidence level: 100%)
domainjmucha.fun
Amadey botnet C2 domain (confidence level: 50%)
domainrootedkrypto-29674.portmap.host
AsyncRAT botnet C2 domain (confidence level: 50%)
domainseverug.com
Ramnit botnet C2 domain (confidence level: 50%)
domainhai1723rat-29066.portmap.host
XenoRAT botnet C2 domain (confidence level: 50%)
domainabuwire123.ddns.net
XWorm botnet C2 domain (confidence level: 50%)
domainsong-direct.gl.at.ply.gg
XWorm botnet C2 domain (confidence level: 50%)
domainthem-hobbies.gl.at.ply.gg
XWorm botnet C2 domain (confidence level: 50%)
domainyear-tim.gl.at.ply.gg
XWorm botnet C2 domain (confidence level: 50%)
domaindns-5hm3l-stf-otbor.online
Cobalt Strike botnet C2 domain (confidence level: 75%)
domainbitcorep.digital
Lumma Stealer botnet C2 domain (confidence level: 100%)
domaindocuments.aruba.cloudconnect-auth0.top
Hook botnet C2 domain (confidence level: 100%)
domaincpanel.efcommxerce.ru
Hook botnet C2 domain (confidence level: 100%)
domainlingardmechanics.shop
Havoc botnet C2 domain (confidence level: 100%)
domainsubdomainhere.klogixsecurity.org
Havoc botnet C2 domain (confidence level: 100%)
domainehchq7m7rpvdr.cfc-execute.bj.baidubce.com
Cobalt Strike botnet C2 domain (confidence level: 75%)

File

ValueDescriptionCopy
file43.160.193.143
Cobalt Strike botnet C2 server (confidence level: 100%)
file128.90.113.194
AsyncRAT botnet C2 server (confidence level: 100%)
file209.38.142.255
Hook botnet C2 server (confidence level: 100%)
file113.45.132.242
Unknown malware botnet C2 server (confidence level: 100%)
file213.199.57.185
Unknown malware botnet C2 server (confidence level: 100%)
file152.203.30.145
Unknown malware botnet C2 server (confidence level: 100%)
file47.94.7.163
Unknown malware botnet C2 server (confidence level: 100%)
file144.208.127.241
Remcos botnet C2 server (confidence level: 100%)
file31.58.169.119
AsyncRAT botnet C2 server (confidence level: 100%)
file51.38.215.206
Unknown malware botnet C2 server (confidence level: 100%)
file103.215.78.176
ValleyRAT botnet C2 server (confidence level: 100%)
file14.128.50.21
Cobalt Strike botnet C2 server (confidence level: 75%)
file67.159.18.50
Mirai botnet C2 server (confidence level: 75%)
file169.150.202.83
Nanocore RAT botnet C2 server (confidence level: 100%)
file121.36.215.212
Cobalt Strike botnet C2 server (confidence level: 100%)
file106.75.245.80
Cobalt Strike botnet C2 server (confidence level: 100%)
file104.250.169.98
Remcos botnet C2 server (confidence level: 100%)
file38.146.27.151
Sliver botnet C2 server (confidence level: 100%)
file45.130.151.163
Sliver botnet C2 server (confidence level: 100%)
file23.94.126.113
AsyncRAT botnet C2 server (confidence level: 100%)
file196.251.70.104
AsyncRAT botnet C2 server (confidence level: 100%)
file91.211.248.206
Hook botnet C2 server (confidence level: 100%)
file197.133.22.251
Quasar RAT botnet C2 server (confidence level: 100%)
file157.20.182.77
Venom RAT botnet C2 server (confidence level: 100%)
file102.96.189.137
NetSupportManager RAT botnet C2 server (confidence level: 100%)
file35.86.98.1
NetSupportManager RAT botnet C2 server (confidence level: 100%)
file167.71.234.19
MooBot botnet C2 server (confidence level: 100%)
file159.65.224.196
MooBot botnet C2 server (confidence level: 100%)
file117.72.119.63
Unknown malware botnet C2 server (confidence level: 100%)
file8.213.228.20
Havoc botnet C2 server (confidence level: 100%)
file179.43.152.178
DCRat botnet C2 server (confidence level: 100%)
file43.138.81.38
Unknown malware botnet C2 server (confidence level: 100%)
file47.238.47.190
Unknown malware botnet C2 server (confidence level: 100%)
file185.247.224.66
Unknown malware botnet C2 server (confidence level: 100%)
file113.45.140.119
Cobalt Strike botnet C2 server (confidence level: 50%)
file47.120.46.195
Cobalt Strike botnet C2 server (confidence level: 50%)
file103.149.182.77
Cobalt Strike botnet C2 server (confidence level: 50%)
file104.42.26.200
Cobalt Strike botnet C2 server (confidence level: 50%)
file67.219.99.34
Cobalt Strike botnet C2 server (confidence level: 50%)
file64.94.84.10
Cobalt Strike botnet C2 server (confidence level: 50%)
file69.57.161.93
Sliver botnet C2 server (confidence level: 50%)
file162.19.228.213
Sliver botnet C2 server (confidence level: 50%)
file62.146.169.174
Sliver botnet C2 server (confidence level: 50%)
file183.134.55.166
Xtreme RAT botnet C2 server (confidence level: 50%)
file170.130.200.118
Xtreme RAT botnet C2 server (confidence level: 50%)
file118.122.8.155
Unknown malware botnet C2 server (confidence level: 50%)
file18.224.18.64
Unknown malware botnet C2 server (confidence level: 50%)
file18.224.18.64
Unknown malware botnet C2 server (confidence level: 50%)
file162.254.86.108
Brute Ratel C4 botnet C2 server (confidence level: 50%)
file84.46.239.89
Brute Ratel C4 botnet C2 server (confidence level: 50%)
file51.195.2.222
Unknown malware botnet C2 server (confidence level: 50%)
file3.0.103.25
Unknown malware botnet C2 server (confidence level: 50%)
file45.83.207.229
NjRAT botnet C2 server (confidence level: 50%)
file91.4.38.47
Ghost RAT botnet C2 server (confidence level: 50%)
file56.155.3.36
BlackShades botnet C2 server (confidence level: 50%)
file216.9.225.133
Remcos botnet C2 server (confidence level: 75%)
file150.158.110.197
Unknown malware botnet C2 server (confidence level: 50%)
file117.205.172.44
Mozi botnet C2 server (confidence level: 50%)
file147.185.221.26
AsyncRAT botnet C2 server (confidence level: 50%)
file18.197.94.4
AsyncRAT botnet C2 server (confidence level: 50%)
file147.185.221.25
DCRat botnet C2 server (confidence level: 50%)
file147.185.221.25
DCRat botnet C2 server (confidence level: 50%)
file194.36.26.109
DCRat botnet C2 server (confidence level: 50%)
file3.127.121.101
DCRat botnet C2 server (confidence level: 50%)
file3.127.121.101
DCRat botnet C2 server (confidence level: 50%)
file176.65.144.200
Remcos botnet C2 server (confidence level: 50%)
file113.45.7.54
Cobalt Strike botnet C2 server (confidence level: 100%)
file2.58.56.217
Cobalt Strike botnet C2 server (confidence level: 100%)
file47.108.158.237
Cobalt Strike botnet C2 server (confidence level: 100%)
file159.75.26.73
Cobalt Strike botnet C2 server (confidence level: 100%)
file65.20.70.235
Remcos botnet C2 server (confidence level: 100%)
file27.124.6.49
Remcos botnet C2 server (confidence level: 100%)
file104.250.169.68
Remcos botnet C2 server (confidence level: 100%)
file199.231.167.54
AsyncRAT botnet C2 server (confidence level: 100%)
file120.24.250.89
Unknown malware botnet C2 server (confidence level: 100%)
file42.116.59.138
Quasar RAT botnet C2 server (confidence level: 100%)
file172.86.97.13
Havoc botnet C2 server (confidence level: 100%)
file43.129.41.152
Havoc botnet C2 server (confidence level: 100%)
file18.175.56.117
NetSupportManager RAT botnet C2 server (confidence level: 100%)
file18.175.56.117
NetSupportManager RAT botnet C2 server (confidence level: 100%)
file18.175.56.117
NetSupportManager RAT botnet C2 server (confidence level: 100%)
file115.233.60.197
Unknown malware botnet C2 server (confidence level: 100%)
file47.98.153.84
Cobalt Strike botnet C2 server (confidence level: 100%)
file42.51.40.85
Cobalt Strike botnet C2 server (confidence level: 100%)
file103.231.12.252
Cobalt Strike botnet C2 server (confidence level: 100%)
file8.146.210.125
Cobalt Strike botnet C2 server (confidence level: 100%)
file47.93.25.72
Cobalt Strike botnet C2 server (confidence level: 100%)
file154.39.140.34
Meterpreter botnet C2 server (confidence level: 75%)
file34.245.175.187
Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%)
file78.46.253.51
Vidar botnet C2 server (confidence level: 100%)
file95.216.180.148
Vidar botnet C2 server (confidence level: 100%)
file103.140.154.73
Cobalt Strike botnet C2 server (confidence level: 100%)
file103.74.192.189
Cobalt Strike botnet C2 server (confidence level: 100%)
file206.206.77.88
Unknown malware botnet C2 server (confidence level: 100%)
file41.188.124.175
Havoc botnet C2 server (confidence level: 100%)
file196.251.86.90
Havoc botnet C2 server (confidence level: 100%)
file154.205.145.133
Havoc botnet C2 server (confidence level: 100%)
file94.250.249.129
DeimosC2 botnet C2 server (confidence level: 100%)
file103.12.149.85
Cobalt Strike botnet C2 server (confidence level: 75%)
file58.87.94.202
Cobalt Strike botnet C2 server (confidence level: 75%)
file58.87.94.202
Cobalt Strike botnet C2 server (confidence level: 75%)
file115.120.251.188
Cobalt Strike botnet C2 server (confidence level: 100%)
file205.198.65.161
Unknown malware botnet C2 server (confidence level: 100%)
file45.147.7.149
AsyncRAT botnet C2 server (confidence level: 100%)
file192.227.220.27
AsyncRAT botnet C2 server (confidence level: 100%)
file91.99.23.89
Unknown malware botnet C2 server (confidence level: 100%)
file3.85.11.163
Unknown malware botnet C2 server (confidence level: 100%)
file102.117.175.16
Unknown malware botnet C2 server (confidence level: 100%)
file188.166.56.10
Unknown malware botnet C2 server (confidence level: 100%)
file154.90.63.65
Quasar RAT botnet C2 server (confidence level: 100%)
file38.180.141.143
Havoc botnet C2 server (confidence level: 100%)
file45.76.97.76
Cobalt Strike botnet C2 server (confidence level: 50%)
file62.234.27.146
Cobalt Strike botnet C2 server (confidence level: 50%)
file47.92.125.40
Cobalt Strike botnet C2 server (confidence level: 50%)
file192.46.223.134
Sliver botnet C2 server (confidence level: 50%)
file157.173.112.131
Sliver botnet C2 server (confidence level: 50%)
file172.86.80.221
Sliver botnet C2 server (confidence level: 50%)
file95.131.202.38
Brute Ratel C4 botnet C2 server (confidence level: 50%)
file212.69.167.73
Brute Ratel C4 botnet C2 server (confidence level: 50%)
file34.219.107.81
NetSupportManager RAT botnet C2 server (confidence level: 50%)
file176.82.217.48
NetSupportManager RAT botnet C2 server (confidence level: 50%)
file166.167.30.196
Ghost RAT botnet C2 server (confidence level: 50%)
file13.58.46.246
Unknown malware botnet C2 server (confidence level: 50%)
file108.61.187.67
Cobalt Strike botnet C2 server (confidence level: 75%)
file206.123.152.103
XWorm botnet C2 server (confidence level: 75%)
file4.234.110.221
Cobalt Strike botnet C2 server (confidence level: 75%)
file196.251.70.183
Cobalt Strike botnet C2 server (confidence level: 100%)
file120.55.169.128
Cobalt Strike botnet C2 server (confidence level: 100%)
file176.65.142.27
Remcos botnet C2 server (confidence level: 100%)
file46.105.31.193
Sliver botnet C2 server (confidence level: 100%)
file35.159.245.137
Havoc botnet C2 server (confidence level: 100%)
file173.212.208.95
Havoc botnet C2 server (confidence level: 100%)
file23.160.168.165
Orcus RAT botnet C2 server (confidence level: 100%)
file46.246.82.12
DCRat botnet C2 server (confidence level: 100%)
file18.183.153.54
NetSupportManager RAT botnet C2 server (confidence level: 100%)
file154.205.148.129
ERMAC botnet C2 server (confidence level: 100%)
file175.178.169.151
Unknown malware botnet C2 server (confidence level: 75%)
file2.88.86.152
QakBot botnet C2 server (confidence level: 75%)
file216.245.184.116
Broomstick botnet C2 server (confidence level: 75%)
file139.9.135.76
Cobalt Strike botnet C2 server (confidence level: 75%)

Hash

ValueDescriptionCopy
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash2000
AsyncRAT botnet C2 server (confidence level: 100%)
hash80
Hook botnet C2 server (confidence level: 100%)
hash60000
Unknown malware botnet C2 server (confidence level: 100%)
hash3333
Unknown malware botnet C2 server (confidence level: 100%)
hash8080
Unknown malware botnet C2 server (confidence level: 100%)
hash10001
Unknown malware botnet C2 server (confidence level: 100%)
hash1313
Remcos botnet C2 server (confidence level: 100%)
hash8808
AsyncRAT botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash53
ValleyRAT botnet C2 server (confidence level: 100%)
hash8080
Cobalt Strike botnet C2 server (confidence level: 75%)
hash1995
Mirai botnet C2 server (confidence level: 75%)
hash5552
Nanocore RAT botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash2404
Remcos botnet C2 server (confidence level: 100%)
hash443
Sliver botnet C2 server (confidence level: 100%)
hash443
Sliver botnet C2 server (confidence level: 100%)
hash8808
AsyncRAT botnet C2 server (confidence level: 100%)
hash6606
AsyncRAT botnet C2 server (confidence level: 100%)
hash80
Hook botnet C2 server (confidence level: 100%)
hash8081
Quasar RAT botnet C2 server (confidence level: 100%)
hash4449
Venom RAT botnet C2 server (confidence level: 100%)
hash443
NetSupportManager RAT botnet C2 server (confidence level: 100%)
hash27017
NetSupportManager RAT botnet C2 server (confidence level: 100%)
hash80
MooBot botnet C2 server (confidence level: 100%)
hash80
MooBot botnet C2 server (confidence level: 100%)
hash7088
Unknown malware botnet C2 server (confidence level: 100%)
hash4443
Havoc botnet C2 server (confidence level: 100%)
hash8825
DCRat botnet C2 server (confidence level: 100%)
hash60000
Unknown malware botnet C2 server (confidence level: 100%)
hash60000
Unknown malware botnet C2 server (confidence level: 100%)
hash3333
Unknown malware botnet C2 server (confidence level: 100%)
hash7777
Cobalt Strike botnet C2 server (confidence level: 50%)
hash8080
Cobalt Strike botnet C2 server (confidence level: 50%)
hash2345
Cobalt Strike botnet C2 server (confidence level: 50%)
hash443
Cobalt Strike botnet C2 server (confidence level: 50%)
hash443
Cobalt Strike botnet C2 server (confidence level: 50%)
hash50050
Cobalt Strike botnet C2 server (confidence level: 50%)
hash31337
Sliver botnet C2 server (confidence level: 50%)
hash31337
Sliver botnet C2 server (confidence level: 50%)
hash31337
Sliver botnet C2 server (confidence level: 50%)
hash10001
Xtreme RAT botnet C2 server (confidence level: 50%)
hash10001
Xtreme RAT botnet C2 server (confidence level: 50%)
hash7775
Unknown malware botnet C2 server (confidence level: 50%)
hash48001
Unknown malware botnet C2 server (confidence level: 50%)
hash8151
Unknown malware botnet C2 server (confidence level: 50%)
hash2087
Brute Ratel C4 botnet C2 server (confidence level: 50%)
hash8089
Brute Ratel C4 botnet C2 server (confidence level: 50%)
hash3333
Unknown malware botnet C2 server (confidence level: 50%)
hash3333
Unknown malware botnet C2 server (confidence level: 50%)
hash1177
NjRAT botnet C2 server (confidence level: 50%)
hash80
Ghost RAT botnet C2 server (confidence level: 50%)
hash636
BlackShades botnet C2 server (confidence level: 50%)
hash57090
Remcos botnet C2 server (confidence level: 75%)
hash8888
Unknown malware botnet C2 server (confidence level: 50%)
hash47080
Mozi botnet C2 server (confidence level: 50%)
hash28568
AsyncRAT botnet C2 server (confidence level: 50%)
hash6606
AsyncRAT botnet C2 server (confidence level: 50%)
hash3064
DCRat botnet C2 server (confidence level: 50%)
hash80
DCRat botnet C2 server (confidence level: 50%)
hash25514
DCRat botnet C2 server (confidence level: 50%)
hash3064
DCRat botnet C2 server (confidence level: 50%)
hash80
DCRat botnet C2 server (confidence level: 50%)
hash6426
Remcos botnet C2 server (confidence level: 50%)
hash9999
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8010
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Remcos botnet C2 server (confidence level: 100%)
hash2404
Remcos botnet C2 server (confidence level: 100%)
hash1962
Remcos botnet C2 server (confidence level: 100%)
hash7707
AsyncRAT botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash8080
Quasar RAT botnet C2 server (confidence level: 100%)
hash443
Havoc botnet C2 server (confidence level: 100%)
hash443
Havoc botnet C2 server (confidence level: 100%)
hash17450
NetSupportManager RAT botnet C2 server (confidence level: 100%)
hash60000
NetSupportManager RAT botnet C2 server (confidence level: 100%)
hash250
NetSupportManager RAT botnet C2 server (confidence level: 100%)
hash443
Unknown malware botnet C2 server (confidence level: 100%)
hash1234
Cobalt Strike botnet C2 server (confidence level: 100%)
hash808
Cobalt Strike botnet C2 server (confidence level: 100%)
hash801
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8080
Cobalt Strike botnet C2 server (confidence level: 100%)
hash82
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8080
Meterpreter botnet C2 server (confidence level: 75%)
hash80
Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%)
hash443
Vidar botnet C2 server (confidence level: 100%)
hash443
Vidar botnet C2 server (confidence level: 100%)
hash80
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8080
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8888
Unknown malware botnet C2 server (confidence level: 100%)
hash443
Havoc botnet C2 server (confidence level: 100%)
hash443
Havoc botnet C2 server (confidence level: 100%)
hash2096
Havoc botnet C2 server (confidence level: 100%)
hash8443
DeimosC2 botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 75%)
hash443
Cobalt Strike botnet C2 server (confidence level: 75%)
hash80
Cobalt Strike botnet C2 server (confidence level: 75%)
hash2246f3653b24eb50f8e43be528270178d8b9576b72fce298d97dda6b5865aced
Unknown Stealer payload (confidence level: 100%)
hash28080
Cobalt Strike botnet C2 server (confidence level: 100%)
hash8888
Unknown malware botnet C2 server (confidence level: 100%)
hash8080
AsyncRAT botnet C2 server (confidence level: 100%)
hash8808
AsyncRAT botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash7443
Unknown malware botnet C2 server (confidence level: 100%)
hash4782
Quasar RAT botnet C2 server (confidence level: 100%)
hash443
Havoc botnet C2 server (confidence level: 100%)
hash2065c11664a7a30b693a8334a37fa049f7221ec39bdad401ebae9c453d453edb
Unknown Stealer payload (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 50%)
hash3306
Cobalt Strike botnet C2 server (confidence level: 50%)
hash443
Cobalt Strike botnet C2 server (confidence level: 50%)
hash31337
Sliver botnet C2 server (confidence level: 50%)
hash31337
Sliver botnet C2 server (confidence level: 50%)
hash31337
Sliver botnet C2 server (confidence level: 50%)
hash8085
Brute Ratel C4 botnet C2 server (confidence level: 50%)
hash8089
Brute Ratel C4 botnet C2 server (confidence level: 50%)
hash6633
NetSupportManager RAT botnet C2 server (confidence level: 50%)
hash6001
NetSupportManager RAT botnet C2 server (confidence level: 50%)
hash443
Ghost RAT botnet C2 server (confidence level: 50%)
hash32764
Unknown malware botnet C2 server (confidence level: 50%)
hash80
Cobalt Strike botnet C2 server (confidence level: 75%)
hash3911
XWorm botnet C2 server (confidence level: 75%)
hash443
Cobalt Strike botnet C2 server (confidence level: 75%)
hash1b48785b6098f696992c1f65e814ad9f4e2fe3f61ce57bdf0477c05c19661217
Unknown Stealer payload (confidence level: 100%)
hasha4ef61a4c32010e87894ad322b87d9f24b9b64c20da5b8b53a1545bbcd16e810
Unknown Stealer payload (confidence level: 100%)
hash6deae0104a84d93f5d2e4fd4c8fb3ae218b77129771bd6c5c79bd7a31e621fd2
Unknown Stealer payload (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash443
Cobalt Strike botnet C2 server (confidence level: 100%)
hash4054
Remcos botnet C2 server (confidence level: 100%)
hash8000
Sliver botnet C2 server (confidence level: 100%)
hash80
Havoc botnet C2 server (confidence level: 100%)
hash40056
Havoc botnet C2 server (confidence level: 100%)
hash7058
Orcus RAT botnet C2 server (confidence level: 100%)
hash2000
DCRat botnet C2 server (confidence level: 100%)
hash20546
NetSupportManager RAT botnet C2 server (confidence level: 100%)
hash8082
ERMAC botnet C2 server (confidence level: 100%)
hash60000
Unknown malware botnet C2 server (confidence level: 75%)
hash443
QakBot botnet C2 server (confidence level: 75%)
hash80
Broomstick botnet C2 server (confidence level: 75%)
hash18443
Cobalt Strike botnet C2 server (confidence level: 75%)

Url

ValueDescriptionCopy
urlhttp://91.211.248.206/
Hook botnet C2 (confidence level: 50%)
urlhttp://176.65.141.187/
Hook botnet C2 (confidence level: 50%)
urlhttps://pastebin.com/raw/jd8cp7b0
AsyncRAT botnet C2 (confidence level: 50%)
urlhttps://pastebin.com/raw/lbtbvbyi
AsyncRAT botnet C2 (confidence level: 50%)
urlhttps://pastebin.com/raw/j5bthnrr
XWorm botnet C2 (confidence level: 50%)
urlhttps://h.p.formaxprime.co.uk/
Vidar botnet C2 (confidence level: 100%)
urlhttps://4ad74aab.xyz/index.php
DarkWatchman botnet C2 (confidence level: 100%)
urlhttps://compralibri.com/1q2w.js
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://compralibri.com/js.php
FAKEUPDATES payload delivery URL (confidence level: 100%)
urlhttps://steamcommunity.com/profiles/76561199839170361
Vidar botnet C2 (confidence level: 100%)
urlhttps://t.me/lw25chm
Vidar botnet C2 (confidence level: 100%)
urlhttps://se.app.formaxprime.co.uk/
Vidar botnet C2 (confidence level: 100%)
urlhttps://95.216.180.148/
Vidar botnet C2 (confidence level: 100%)
urlhttps://higerson.shop/playlandmusic.mp3
Lumma Stealer botnet C2 (confidence level: 100%)
urlhttps://elcctrum.com/download/index.php
Unknown Stealer payload delivery URL (confidence level: 100%)
urlhttps://367524bins7923.b-cdn.net/electrum-4.5.8-setup.exe
Unknown Stealer payload delivery URL (confidence level: 100%)
urlhttp://54.173.207.199:443/mpj6
Cobalt Strike botnet C2 (confidence level: 100%)
urlhttps://t5impactsupport.world/api
Lumma Stealer botnet C2 (confidence level: 75%)
urlhttp://jmucha.fun/g5vppphc/index.php
Amadey botnet C2 (confidence level: 50%)
urlhttp://213.176.72.47/api/ytasodysodisowqsytesodgsotasotusnjusn2qs
SmartLoader botnet C2 (confidence level: 75%)
urlhttps://check.dymab.icu/gkcxv.google
ClearFake payload delivery URL (confidence level: 100%)
urlhttps://check.ledax.icu/gkcxv.google
ClearFake payload delivery URL (confidence level: 100%)
urlhttps://check.cohor.icu/gkcxv.google
ClearFake payload delivery URL (confidence level: 100%)

Threat ID: 682acdc3bbaf20d303f1fef2

Added to database: 5/19/2025, 6:20:51 AM

Last enriched: 6/18/2025, 8:20:38 AM

Last updated: 8/14/2025, 3:35:06 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats