ThreatFox IOCs for 2025-03-25
ThreatFox IOCs for 2025-03-25
AI Analysis
Technical Summary
The provided threat intelligence pertains to a malware-related report titled "ThreatFox IOCs for 2025-03-25," sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The report is categorized under OSINT (Open Source Intelligence), payload delivery, and network activity, indicating that it involves the distribution or delivery of malicious payloads through network vectors, with an emphasis on observable threat indicators. However, the technical details are limited, with no specific affected software versions or products identified beyond the generic label "osint." There are no Common Weakness Enumerations (CWEs) listed, no patches available, and no known exploits actively observed in the wild at the time of publication. The threat level is rated as 2 on an unspecified scale, with analysis and distribution scores suggesting moderate visibility and spread. The absence of concrete IOCs or detailed technical signatures limits the ability to perform deep technical analysis, but the classification implies a malware campaign or activity that leverages OSINT techniques for payload delivery and network-based infection vectors. The lack of patch availability and known exploits suggests this may be a newly observed or emerging threat, or one that exploits social engineering or network delivery mechanisms rather than software vulnerabilities. The TLP (Traffic Light Protocol) classification as white indicates the information is intended for broad dissemination without restrictions.
Potential Impact
For European organizations, the potential impact of this threat lies primarily in the risk of malware infection through network-based delivery mechanisms, possibly facilitated by OSINT-derived targeting or reconnaissance. Given the lack of specific affected products or vulnerabilities, the threat may manifest as phishing campaigns, malicious payload distribution via compromised websites or email, or exploitation of network services without requiring software vulnerabilities. This could lead to unauthorized access, data exfiltration, or disruption of services depending on the payload's nature. The medium severity rating suggests a moderate risk level, where successful exploitation could impact confidentiality and integrity, with potential availability effects depending on the malware's capabilities. European organizations with extensive network exposure, especially those in sectors with high-value data or critical infrastructure, could face targeted attempts to deliver malicious payloads. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation or escalation. The broad OSINT tag implies attackers may leverage publicly available information to tailor attacks, increasing the likelihood of successful social engineering or targeted delivery.
Mitigation Recommendations
Given the nature of this threat, European organizations should implement targeted mitigations beyond generic advice: 1) Enhance network monitoring with a focus on detecting unusual payload delivery patterns and network activity consistent with malware distribution, leveraging threat intelligence feeds including ThreatFox updates. 2) Employ advanced email filtering and URL reputation services to intercept phishing or malicious payload delivery attempts that may be informed by OSINT-derived targeting. 3) Conduct regular OSINT assessments on organizational digital footprints to identify and reduce exposure of sensitive information that could aid attackers in crafting targeted payload delivery campaigns. 4) Implement strict network segmentation and application whitelisting to limit the impact of potential malware infections. 5) Train security teams to recognize emerging malware delivery tactics that may not rely on known vulnerabilities but on social engineering and network exploitation. 6) Maintain up-to-date incident response plans that incorporate detection and containment strategies for malware introduced via network vectors without known patches or exploits. 7) Collaborate with national and European cybersecurity centers to share and receive timely intelligence on evolving malware threats and IOCs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: progressiveptgreenvalley.com
- file: 43.160.193.143
- hash: 443
- file: 128.90.113.194
- hash: 2000
- file: 209.38.142.255
- hash: 80
- domain: www.amanmail.info
- domain: www.mkdirjava.com
- file: 113.45.132.242
- hash: 60000
- file: 213.199.57.185
- hash: 3333
- file: 152.203.30.145
- hash: 8080
- file: 47.94.7.163
- hash: 10001
- domain: electrumdoge.com
- domain: electrum-avax.com
- domain: electrum-ravencoin.com
- domain: electrum-xmr.net
- file: 144.208.127.241
- hash: 1313
- file: 31.58.169.119
- hash: 8808
- file: 51.38.215.206
- hash: 7443
- domain: cpcontacts.aaa.104-168-101-27.cprapid.com
- domain: cpanel.a.multi-canale.com
- domain: mail.b.ora-0-web.com
- domain: webdisk.aaa.104-168-101-27.cprapid.com
- domain: cpanel.ora-0-web.com
- file: 103.215.78.176
- hash: 53
- domain: svchost.iqiyid.icu
- file: 14.128.50.21
- hash: 8080
- file: 67.159.18.50
- hash: 1995
- file: 169.150.202.83
- hash: 5552
- domain: ksmj.ddns.net
- file: 121.36.215.212
- hash: 80
- file: 106.75.245.80
- hash: 8443
- file: 104.250.169.98
- hash: 2404
- file: 38.146.27.151
- hash: 443
- file: 45.130.151.163
- hash: 443
- file: 23.94.126.113
- hash: 8808
- file: 196.251.70.104
- hash: 6606
- file: 91.211.248.206
- hash: 80
- file: 197.133.22.251
- hash: 8081
- file: 157.20.182.77
- hash: 4449
- file: 102.96.189.137
- hash: 443
- file: 35.86.98.1
- hash: 27017
- file: 167.71.234.19
- hash: 80
- file: 159.65.224.196
- hash: 80
- file: 117.72.119.63
- hash: 7088
- file: 8.213.228.20
- hash: 4443
- file: 179.43.152.178
- hash: 8825
- file: 43.138.81.38
- hash: 60000
- file: 47.238.47.190
- hash: 60000
- file: 185.247.224.66
- hash: 3333
- domain: hacknestm.run
- domain: galaxiay.world
- domain: trobudrunksz.click
- file: 113.45.140.119
- hash: 7777
- file: 47.120.46.195
- hash: 8080
- file: 103.149.182.77
- hash: 2345
- file: 104.42.26.200
- hash: 443
- file: 67.219.99.34
- hash: 443
- file: 64.94.84.10
- hash: 50050
- file: 69.57.161.93
- hash: 31337
- file: 162.19.228.213
- hash: 31337
- file: 62.146.169.174
- hash: 31337
- file: 183.134.55.166
- hash: 10001
- file: 170.130.200.118
- hash: 10001
- file: 118.122.8.155
- hash: 7775
- file: 18.224.18.64
- hash: 48001
- file: 18.224.18.64
- hash: 8151
- file: 162.254.86.108
- hash: 2087
- file: 84.46.239.89
- hash: 8089
- file: 51.195.2.222
- hash: 3333
- file: 3.0.103.25
- hash: 3333
- file: 45.83.207.229
- hash: 1177
- file: 91.4.38.47
- hash: 80
- file: 56.155.3.36
- hash: 636
- file: 216.9.225.133
- hash: 57090
- file: 150.158.110.197
- hash: 8888
- file: 117.205.172.44
- hash: 47080
- url: http://91.211.248.206/
- url: http://176.65.141.187/
- url: https://pastebin.com/raw/jd8cp7b0
- url: https://pastebin.com/raw/lbtbvbyi
- domain: 5461458.ddns.net
- domain: dadfsfsdfasdfasddfgssdfaafsd-63495.portmap.host
- file: 147.185.221.26
- hash: 28568
- file: 18.197.94.4
- hash: 6606
- file: 147.185.221.25
- hash: 3064
- file: 147.185.221.25
- hash: 80
- file: 194.36.26.109
- hash: 25514
- file: 3.127.121.101
- hash: 3064
- file: 3.127.121.101
- hash: 80
- domain: mmdrza.ddns.net
- domain: blancoestev27.duckdns.org
- domain: ruffella1122.duckdns.org
- file: 176.65.144.200
- hash: 6426
- url: https://pastebin.com/raw/j5bthnrr
- domain: flame3135-44263.portmap.host
- domain: gmt-sherman.gl.at.ply.gg
- domain: iii-single.gl.at.ply.gg
- domain: pppaa-51102.portmap.host
- url: https://h.p.formaxprime.co.uk/
- domain: h.p.formaxprime.co.uk
- domain: aiwavey.run
- domain: byteplusx.digital
- domain: skynetxc.live
- domain: pixtreev.run
- domain: sparkiob.digital
- domain: appgridn.live
- file: 113.45.7.54
- hash: 9999
- file: 2.58.56.217
- hash: 443
- file: 47.108.158.237
- hash: 443
- file: 159.75.26.73
- hash: 8010
- file: 65.20.70.235
- hash: 443
- file: 27.124.6.49
- hash: 2404
- file: 104.250.169.68
- hash: 1962
- file: 199.231.167.54
- hash: 7707
- file: 120.24.250.89
- hash: 7443
- file: 42.116.59.138
- hash: 8080
- file: 172.86.97.13
- hash: 443
- file: 43.129.41.152
- hash: 443
- file: 18.175.56.117
- hash: 17450
- file: 18.175.56.117
- hash: 60000
- file: 18.175.56.117
- hash: 250
- file: 115.233.60.197
- hash: 443
- domain: webdisk.oraonweb.com
- url: https://4ad74aab.xyz/index.php
- file: 47.98.153.84
- hash: 1234
- file: 42.51.40.85
- hash: 808
- file: 103.231.12.252
- hash: 801
- file: 8.146.210.125
- hash: 8080
- file: 47.93.25.72
- hash: 82
- file: 154.39.140.34
- hash: 8080
- file: 34.245.175.187
- hash: 80
- domain: oct2.xyz
- url: https://compralibri.com/1q2w.js
- domain: compralibri.com
- url: https://compralibri.com/js.php
- url: https://steamcommunity.com/profiles/76561199839170361
- url: https://t.me/lw25chm
- url: https://se.app.formaxprime.co.uk/
- url: https://95.216.180.148/
- domain: app.formaxprime.co.uk
- domain: se.app.formaxprime.co.uk
- file: 78.46.253.51
- hash: 443
- file: 95.216.180.148
- hash: 443
- file: 103.140.154.73
- hash: 80
- file: 103.74.192.189
- hash: 8080
- file: 206.206.77.88
- hash: 8888
- file: 41.188.124.175
- hash: 443
- file: 196.251.86.90
- hash: 443
- file: 154.205.145.133
- hash: 2096
- file: 94.250.249.129
- hash: 8443
- domain: persimmon-turquoise344028.vm-host.com
- url: https://higerson.shop/playlandmusic.mp3
- domain: higerson.shop
- domain: amozon.cc
- file: 103.12.149.85
- hash: 443
- file: 58.87.94.202
- hash: 443
- file: 58.87.94.202
- hash: 80
- url: https://elcctrum.com/download/index.php
- url: https://367524bins7923.b-cdn.net/electrum-4.5.8-setup.exe
- hash: 2246f3653b24eb50f8e43be528270178d8b9576b72fce298d97dda6b5865aced
- domain: kpl-gun77dan.com
- url: http://54.173.207.199:443/mpj6
- url: https://t5impactsupport.world/api
- file: 115.120.251.188
- hash: 28080
- file: 205.198.65.161
- hash: 8888
- file: 45.147.7.149
- hash: 8080
- file: 192.227.220.27
- hash: 8808
- file: 91.99.23.89
- hash: 7443
- file: 3.85.11.163
- hash: 7443
- file: 102.117.175.16
- hash: 7443
- file: 188.166.56.10
- hash: 7443
- domain: webmail.efcommxerce.ru
- file: 154.90.63.65
- hash: 4782
- file: 38.180.141.143
- hash: 443
- hash: 2065c11664a7a30b693a8334a37fa049f7221ec39bdad401ebae9c453d453edb
- file: 45.76.97.76
- hash: 443
- file: 62.234.27.146
- hash: 3306
- file: 47.92.125.40
- hash: 443
- file: 192.46.223.134
- hash: 31337
- file: 157.173.112.131
- hash: 31337
- file: 172.86.80.221
- hash: 31337
- file: 95.131.202.38
- hash: 8085
- file: 212.69.167.73
- hash: 8089
- file: 34.219.107.81
- hash: 6633
- file: 176.82.217.48
- hash: 6001
- file: 166.167.30.196
- hash: 443
- file: 13.58.46.246
- hash: 32764
- url: http://jmucha.fun/g5vppphc/index.php
- domain: jmucha.fun
- domain: rootedkrypto-29674.portmap.host
- domain: severug.com
- domain: hai1723rat-29066.portmap.host
- domain: abuwire123.ddns.net
- domain: song-direct.gl.at.ply.gg
- domain: them-hobbies.gl.at.ply.gg
- domain: year-tim.gl.at.ply.gg
- file: 108.61.187.67
- hash: 80
- file: 206.123.152.103
- hash: 3911
- file: 4.234.110.221
- hash: 443
- hash: 1b48785b6098f696992c1f65e814ad9f4e2fe3f61ce57bdf0477c05c19661217
- hash: a4ef61a4c32010e87894ad322b87d9f24b9b64c20da5b8b53a1545bbcd16e810
- hash: 6deae0104a84d93f5d2e4fd4c8fb3ae218b77129771bd6c5c79bd7a31e621fd2
- url: http://213.176.72.47/api/ytasodysodisowqsytesodgsotasotusnjusn2qs
- domain: dns-5hm3l-stf-otbor.online
- domain: bitcorep.digital
- url: https://check.dymab.icu/gkcxv.google
- file: 196.251.70.183
- hash: 443
- file: 120.55.169.128
- hash: 443
- file: 176.65.142.27
- hash: 4054
- file: 46.105.31.193
- hash: 8000
- domain: documents.aruba.cloudconnect-auth0.top
- domain: cpanel.efcommxerce.ru
- file: 35.159.245.137
- hash: 80
- file: 173.212.208.95
- hash: 40056
- domain: lingardmechanics.shop
- domain: subdomainhere.klogixsecurity.org
- file: 23.160.168.165
- hash: 7058
- file: 46.246.82.12
- hash: 2000
- file: 18.183.153.54
- hash: 20546
- file: 154.205.148.129
- hash: 8082
- url: https://check.ledax.icu/gkcxv.google
- file: 175.178.169.151
- hash: 60000
- file: 2.88.86.152
- hash: 443
- file: 216.245.184.116
- hash: 80
- url: https://check.cohor.icu/gkcxv.google
- domain: ehchq7m7rpvdr.cfc-execute.bj.baidubce.com
- file: 139.9.135.76
- hash: 18443
ThreatFox IOCs for 2025-03-25
Description
ThreatFox IOCs for 2025-03-25
AI-Powered Analysis
Technical Analysis
The provided threat intelligence pertains to a malware-related report titled "ThreatFox IOCs for 2025-03-25," sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The report is categorized under OSINT (Open Source Intelligence), payload delivery, and network activity, indicating that it involves the distribution or delivery of malicious payloads through network vectors, with an emphasis on observable threat indicators. However, the technical details are limited, with no specific affected software versions or products identified beyond the generic label "osint." There are no Common Weakness Enumerations (CWEs) listed, no patches available, and no known exploits actively observed in the wild at the time of publication. The threat level is rated as 2 on an unspecified scale, with analysis and distribution scores suggesting moderate visibility and spread. The absence of concrete IOCs or detailed technical signatures limits the ability to perform deep technical analysis, but the classification implies a malware campaign or activity that leverages OSINT techniques for payload delivery and network-based infection vectors. The lack of patch availability and known exploits suggests this may be a newly observed or emerging threat, or one that exploits social engineering or network delivery mechanisms rather than software vulnerabilities. The TLP (Traffic Light Protocol) classification as white indicates the information is intended for broad dissemination without restrictions.
Potential Impact
For European organizations, the potential impact of this threat lies primarily in the risk of malware infection through network-based delivery mechanisms, possibly facilitated by OSINT-derived targeting or reconnaissance. Given the lack of specific affected products or vulnerabilities, the threat may manifest as phishing campaigns, malicious payload distribution via compromised websites or email, or exploitation of network services without requiring software vulnerabilities. This could lead to unauthorized access, data exfiltration, or disruption of services depending on the payload's nature. The medium severity rating suggests a moderate risk level, where successful exploitation could impact confidentiality and integrity, with potential availability effects depending on the malware's capabilities. European organizations with extensive network exposure, especially those in sectors with high-value data or critical infrastructure, could face targeted attempts to deliver malicious payloads. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation or escalation. The broad OSINT tag implies attackers may leverage publicly available information to tailor attacks, increasing the likelihood of successful social engineering or targeted delivery.
Mitigation Recommendations
Given the nature of this threat, European organizations should implement targeted mitigations beyond generic advice: 1) Enhance network monitoring with a focus on detecting unusual payload delivery patterns and network activity consistent with malware distribution, leveraging threat intelligence feeds including ThreatFox updates. 2) Employ advanced email filtering and URL reputation services to intercept phishing or malicious payload delivery attempts that may be informed by OSINT-derived targeting. 3) Conduct regular OSINT assessments on organizational digital footprints to identify and reduce exposure of sensitive information that could aid attackers in crafting targeted payload delivery campaigns. 4) Implement strict network segmentation and application whitelisting to limit the impact of potential malware infections. 5) Train security teams to recognize emerging malware delivery tactics that may not rely on known vulnerabilities but on social engineering and network exploitation. 6) Maintain up-to-date incident response plans that incorporate detection and containment strategies for malware introduced via network vectors without known patches or exploits. 7) Collaborate with national and European cybersecurity centers to share and receive timely intelligence on evolving malware threats and IOCs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- fb50097c-aba2-4375-847f-21d83d94ebc8
- Original Timestamp
- 1742947386
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainprogressiveptgreenvalley.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainwww.amanmail.info | Havoc botnet C2 domain (confidence level: 100%) | |
domainwww.mkdirjava.com | Havoc botnet C2 domain (confidence level: 100%) | |
domainelectrumdoge.com | Unknown malware botnet C2 domain (confidence level: 75%) | |
domainelectrum-avax.com | Unknown malware botnet C2 domain (confidence level: 75%) | |
domainelectrum-ravencoin.com | Unknown malware botnet C2 domain (confidence level: 75%) | |
domainelectrum-xmr.net | Unknown malware botnet C2 domain (confidence level: 75%) | |
domaincpcontacts.aaa.104-168-101-27.cprapid.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domaincpanel.a.multi-canale.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainmail.b.ora-0-web.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainwebdisk.aaa.104-168-101-27.cprapid.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domaincpanel.ora-0-web.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainsvchost.iqiyid.icu | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainksmj.ddns.net | Nanocore RAT botnet C2 domain (confidence level: 100%) | |
domainhacknestm.run | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaingalaxiay.world | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintrobudrunksz.click | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domain5461458.ddns.net | AsyncRAT botnet C2 domain (confidence level: 50%) | |
domaindadfsfsdfasdfasddfgssdfaafsd-63495.portmap.host | AsyncRAT botnet C2 domain (confidence level: 50%) | |
domainmmdrza.ddns.net | Quasar RAT botnet C2 domain (confidence level: 50%) | |
domainblancoestev27.duckdns.org | Remcos botnet C2 domain (confidence level: 50%) | |
domainruffella1122.duckdns.org | Remcos botnet C2 domain (confidence level: 50%) | |
domainflame3135-44263.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domaingmt-sherman.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainiii-single.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainpppaa-51102.portmap.host | XWorm botnet C2 domain (confidence level: 50%) | |
domainh.p.formaxprime.co.uk | Vidar botnet C2 domain (confidence level: 100%) | |
domainaiwavey.run | Lumma Stealer botnet C2 domain (confidence level: 75%) | |
domainbyteplusx.digital | Lumma Stealer botnet C2 domain (confidence level: 75%) | |
domainskynetxc.live | Lumma Stealer botnet C2 domain (confidence level: 75%) | |
domainpixtreev.run | Lumma Stealer botnet C2 domain (confidence level: 75%) | |
domainsparkiob.digital | Lumma Stealer botnet C2 domain (confidence level: 75%) | |
domainappgridn.live | Lumma Stealer botnet C2 domain (confidence level: 75%) | |
domainwebdisk.oraonweb.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainoct2.xyz | Loki Password Stealer (PWS) botnet C2 domain (confidence level: 75%) | |
domaincompralibri.com | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domainapp.formaxprime.co.uk | Vidar botnet C2 domain (confidence level: 100%) | |
domainse.app.formaxprime.co.uk | Vidar botnet C2 domain (confidence level: 100%) | |
domainpersimmon-turquoise344028.vm-host.com | Bashlite botnet C2 domain (confidence level: 100%) | |
domainhigerson.shop | Lumma Stealer payload delivery domain (confidence level: 100%) | |
domainamozon.cc | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainkpl-gun77dan.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainwebmail.efcommxerce.ru | Hook botnet C2 domain (confidence level: 100%) | |
domainjmucha.fun | Amadey botnet C2 domain (confidence level: 50%) | |
domainrootedkrypto-29674.portmap.host | AsyncRAT botnet C2 domain (confidence level: 50%) | |
domainseverug.com | Ramnit botnet C2 domain (confidence level: 50%) | |
domainhai1723rat-29066.portmap.host | XenoRAT botnet C2 domain (confidence level: 50%) | |
domainabuwire123.ddns.net | XWorm botnet C2 domain (confidence level: 50%) | |
domainsong-direct.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainthem-hobbies.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainyear-tim.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domaindns-5hm3l-stf-otbor.online | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainbitcorep.digital | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaindocuments.aruba.cloudconnect-auth0.top | Hook botnet C2 domain (confidence level: 100%) | |
domaincpanel.efcommxerce.ru | Hook botnet C2 domain (confidence level: 100%) | |
domainlingardmechanics.shop | Havoc botnet C2 domain (confidence level: 100%) | |
domainsubdomainhere.klogixsecurity.org | Havoc botnet C2 domain (confidence level: 100%) | |
domainehchq7m7rpvdr.cfc-execute.bj.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) |
File
Value | Description | Copy |
---|---|---|
file43.160.193.143 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file128.90.113.194 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file209.38.142.255 | Hook botnet C2 server (confidence level: 100%) | |
file113.45.132.242 | Unknown malware botnet C2 server (confidence level: 100%) | |
file213.199.57.185 | Unknown malware botnet C2 server (confidence level: 100%) | |
file152.203.30.145 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.94.7.163 | Unknown malware botnet C2 server (confidence level: 100%) | |
file144.208.127.241 | Remcos botnet C2 server (confidence level: 100%) | |
file31.58.169.119 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file51.38.215.206 | Unknown malware botnet C2 server (confidence level: 100%) | |
file103.215.78.176 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file14.128.50.21 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file67.159.18.50 | Mirai botnet C2 server (confidence level: 75%) | |
file169.150.202.83 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file121.36.215.212 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file106.75.245.80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file104.250.169.98 | Remcos botnet C2 server (confidence level: 100%) | |
file38.146.27.151 | Sliver botnet C2 server (confidence level: 100%) | |
file45.130.151.163 | Sliver botnet C2 server (confidence level: 100%) | |
file23.94.126.113 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file196.251.70.104 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file91.211.248.206 | Hook botnet C2 server (confidence level: 100%) | |
file197.133.22.251 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file157.20.182.77 | Venom RAT botnet C2 server (confidence level: 100%) | |
file102.96.189.137 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file35.86.98.1 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file167.71.234.19 | MooBot botnet C2 server (confidence level: 100%) | |
file159.65.224.196 | MooBot botnet C2 server (confidence level: 100%) | |
file117.72.119.63 | Unknown malware botnet C2 server (confidence level: 100%) | |
file8.213.228.20 | Havoc botnet C2 server (confidence level: 100%) | |
file179.43.152.178 | DCRat botnet C2 server (confidence level: 100%) | |
file43.138.81.38 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.238.47.190 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.247.224.66 | Unknown malware botnet C2 server (confidence level: 100%) | |
file113.45.140.119 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file47.120.46.195 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file103.149.182.77 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file104.42.26.200 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file67.219.99.34 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file64.94.84.10 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file69.57.161.93 | Sliver botnet C2 server (confidence level: 50%) | |
file162.19.228.213 | Sliver botnet C2 server (confidence level: 50%) | |
file62.146.169.174 | Sliver botnet C2 server (confidence level: 50%) | |
file183.134.55.166 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file170.130.200.118 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
file118.122.8.155 | Unknown malware botnet C2 server (confidence level: 50%) | |
file18.224.18.64 | Unknown malware botnet C2 server (confidence level: 50%) | |
file18.224.18.64 | Unknown malware botnet C2 server (confidence level: 50%) | |
file162.254.86.108 | Brute Ratel C4 botnet C2 server (confidence level: 50%) | |
file84.46.239.89 | Brute Ratel C4 botnet C2 server (confidence level: 50%) | |
file51.195.2.222 | Unknown malware botnet C2 server (confidence level: 50%) | |
file3.0.103.25 | Unknown malware botnet C2 server (confidence level: 50%) | |
file45.83.207.229 | NjRAT botnet C2 server (confidence level: 50%) | |
file91.4.38.47 | Ghost RAT botnet C2 server (confidence level: 50%) | |
file56.155.3.36 | BlackShades botnet C2 server (confidence level: 50%) | |
file216.9.225.133 | Remcos botnet C2 server (confidence level: 75%) | |
file150.158.110.197 | Unknown malware botnet C2 server (confidence level: 50%) | |
file117.205.172.44 | Mozi botnet C2 server (confidence level: 50%) | |
file147.185.221.26 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file18.197.94.4 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file147.185.221.25 | DCRat botnet C2 server (confidence level: 50%) | |
file147.185.221.25 | DCRat botnet C2 server (confidence level: 50%) | |
file194.36.26.109 | DCRat botnet C2 server (confidence level: 50%) | |
file3.127.121.101 | DCRat botnet C2 server (confidence level: 50%) | |
file3.127.121.101 | DCRat botnet C2 server (confidence level: 50%) | |
file176.65.144.200 | Remcos botnet C2 server (confidence level: 50%) | |
file113.45.7.54 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file2.58.56.217 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.108.158.237 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file159.75.26.73 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file65.20.70.235 | Remcos botnet C2 server (confidence level: 100%) | |
file27.124.6.49 | Remcos botnet C2 server (confidence level: 100%) | |
file104.250.169.68 | Remcos botnet C2 server (confidence level: 100%) | |
file199.231.167.54 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file120.24.250.89 | Unknown malware botnet C2 server (confidence level: 100%) | |
file42.116.59.138 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file172.86.97.13 | Havoc botnet C2 server (confidence level: 100%) | |
file43.129.41.152 | Havoc botnet C2 server (confidence level: 100%) | |
file18.175.56.117 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file18.175.56.117 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file18.175.56.117 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file115.233.60.197 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.98.153.84 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file42.51.40.85 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.231.12.252 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.146.210.125 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.93.25.72 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.39.140.34 | Meterpreter botnet C2 server (confidence level: 75%) | |
file34.245.175.187 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
file78.46.253.51 | Vidar botnet C2 server (confidence level: 100%) | |
file95.216.180.148 | Vidar botnet C2 server (confidence level: 100%) | |
file103.140.154.73 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.74.192.189 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file206.206.77.88 | Unknown malware botnet C2 server (confidence level: 100%) | |
file41.188.124.175 | Havoc botnet C2 server (confidence level: 100%) | |
file196.251.86.90 | Havoc botnet C2 server (confidence level: 100%) | |
file154.205.145.133 | Havoc botnet C2 server (confidence level: 100%) | |
file94.250.249.129 | DeimosC2 botnet C2 server (confidence level: 100%) | |
file103.12.149.85 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file58.87.94.202 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file58.87.94.202 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file115.120.251.188 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file205.198.65.161 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.147.7.149 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file192.227.220.27 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file91.99.23.89 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.85.11.163 | Unknown malware botnet C2 server (confidence level: 100%) | |
file102.117.175.16 | Unknown malware botnet C2 server (confidence level: 100%) | |
file188.166.56.10 | Unknown malware botnet C2 server (confidence level: 100%) | |
file154.90.63.65 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file38.180.141.143 | Havoc botnet C2 server (confidence level: 100%) | |
file45.76.97.76 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file62.234.27.146 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file47.92.125.40 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file192.46.223.134 | Sliver botnet C2 server (confidence level: 50%) | |
file157.173.112.131 | Sliver botnet C2 server (confidence level: 50%) | |
file172.86.80.221 | Sliver botnet C2 server (confidence level: 50%) | |
file95.131.202.38 | Brute Ratel C4 botnet C2 server (confidence level: 50%) | |
file212.69.167.73 | Brute Ratel C4 botnet C2 server (confidence level: 50%) | |
file34.219.107.81 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file176.82.217.48 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file166.167.30.196 | Ghost RAT botnet C2 server (confidence level: 50%) | |
file13.58.46.246 | Unknown malware botnet C2 server (confidence level: 50%) | |
file108.61.187.67 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file206.123.152.103 | XWorm botnet C2 server (confidence level: 75%) | |
file4.234.110.221 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file196.251.70.183 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file120.55.169.128 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file176.65.142.27 | Remcos botnet C2 server (confidence level: 100%) | |
file46.105.31.193 | Sliver botnet C2 server (confidence level: 100%) | |
file35.159.245.137 | Havoc botnet C2 server (confidence level: 100%) | |
file173.212.208.95 | Havoc botnet C2 server (confidence level: 100%) | |
file23.160.168.165 | Orcus RAT botnet C2 server (confidence level: 100%) | |
file46.246.82.12 | DCRat botnet C2 server (confidence level: 100%) | |
file18.183.153.54 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file154.205.148.129 | ERMAC botnet C2 server (confidence level: 100%) | |
file175.178.169.151 | Unknown malware botnet C2 server (confidence level: 75%) | |
file2.88.86.152 | QakBot botnet C2 server (confidence level: 75%) | |
file216.245.184.116 | Broomstick botnet C2 server (confidence level: 75%) | |
file139.9.135.76 | Cobalt Strike botnet C2 server (confidence level: 75%) |
Hash
Value | Description | Copy |
---|---|---|
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash10001 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1313 | Remcos botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash53 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash1995 | Mirai botnet C2 server (confidence level: 75%) | |
hash5552 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash8081 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash4449 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash27017 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash7088 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4443 | Havoc botnet C2 server (confidence level: 100%) | |
hash8825 | DCRat botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7777 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash2345 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash50050 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 50%) | |
hash7775 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash48001 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash8151 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash2087 | Brute Ratel C4 botnet C2 server (confidence level: 50%) | |
hash8089 | Brute Ratel C4 botnet C2 server (confidence level: 50%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash1177 | NjRAT botnet C2 server (confidence level: 50%) | |
hash80 | Ghost RAT botnet C2 server (confidence level: 50%) | |
hash636 | BlackShades botnet C2 server (confidence level: 50%) | |
hash57090 | Remcos botnet C2 server (confidence level: 75%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash47080 | Mozi botnet C2 server (confidence level: 50%) | |
hash28568 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash3064 | DCRat botnet C2 server (confidence level: 50%) | |
hash80 | DCRat botnet C2 server (confidence level: 50%) | |
hash25514 | DCRat botnet C2 server (confidence level: 50%) | |
hash3064 | DCRat botnet C2 server (confidence level: 50%) | |
hash80 | DCRat botnet C2 server (confidence level: 50%) | |
hash6426 | Remcos botnet C2 server (confidence level: 50%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8010 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash1962 | Remcos botnet C2 server (confidence level: 100%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash17450 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash60000 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash250 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1234 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash808 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash801 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash82 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash80 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash2096 | Havoc botnet C2 server (confidence level: 100%) | |
hash8443 | DeimosC2 botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash2246f3653b24eb50f8e43be528270178d8b9576b72fce298d97dda6b5865aced | Unknown Stealer payload (confidence level: 100%) | |
hash28080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash2065c11664a7a30b693a8334a37fa049f7221ec39bdad401ebae9c453d453edb | Unknown Stealer payload (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash3306 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash8085 | Brute Ratel C4 botnet C2 server (confidence level: 50%) | |
hash8089 | Brute Ratel C4 botnet C2 server (confidence level: 50%) | |
hash6633 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash6001 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash443 | Ghost RAT botnet C2 server (confidence level: 50%) | |
hash32764 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash3911 | XWorm botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash1b48785b6098f696992c1f65e814ad9f4e2fe3f61ce57bdf0477c05c19661217 | Unknown Stealer payload (confidence level: 100%) | |
hasha4ef61a4c32010e87894ad322b87d9f24b9b64c20da5b8b53a1545bbcd16e810 | Unknown Stealer payload (confidence level: 100%) | |
hash6deae0104a84d93f5d2e4fd4c8fb3ae218b77129771bd6c5c79bd7a31e621fd2 | Unknown Stealer payload (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4054 | Remcos botnet C2 server (confidence level: 100%) | |
hash8000 | Sliver botnet C2 server (confidence level: 100%) | |
hash80 | Havoc botnet C2 server (confidence level: 100%) | |
hash40056 | Havoc botnet C2 server (confidence level: 100%) | |
hash7058 | Orcus RAT botnet C2 server (confidence level: 100%) | |
hash2000 | DCRat botnet C2 server (confidence level: 100%) | |
hash20546 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8082 | ERMAC botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash80 | Broomstick botnet C2 server (confidence level: 75%) | |
hash18443 | Cobalt Strike botnet C2 server (confidence level: 75%) |
Url
Value | Description | Copy |
---|---|---|
urlhttp://91.211.248.206/ | Hook botnet C2 (confidence level: 50%) | |
urlhttp://176.65.141.187/ | Hook botnet C2 (confidence level: 50%) | |
urlhttps://pastebin.com/raw/jd8cp7b0 | AsyncRAT botnet C2 (confidence level: 50%) | |
urlhttps://pastebin.com/raw/lbtbvbyi | AsyncRAT botnet C2 (confidence level: 50%) | |
urlhttps://pastebin.com/raw/j5bthnrr | XWorm botnet C2 (confidence level: 50%) | |
urlhttps://h.p.formaxprime.co.uk/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://4ad74aab.xyz/index.php | DarkWatchman botnet C2 (confidence level: 100%) | |
urlhttps://compralibri.com/1q2w.js | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://compralibri.com/js.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://steamcommunity.com/profiles/76561199839170361 | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://t.me/lw25chm | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://se.app.formaxprime.co.uk/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://95.216.180.148/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://higerson.shop/playlandmusic.mp3 | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://elcctrum.com/download/index.php | Unknown Stealer payload delivery URL (confidence level: 100%) | |
urlhttps://367524bins7923.b-cdn.net/electrum-4.5.8-setup.exe | Unknown Stealer payload delivery URL (confidence level: 100%) | |
urlhttp://54.173.207.199:443/mpj6 | Cobalt Strike botnet C2 (confidence level: 100%) | |
urlhttps://t5impactsupport.world/api | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://jmucha.fun/g5vppphc/index.php | Amadey botnet C2 (confidence level: 50%) | |
urlhttp://213.176.72.47/api/ytasodysodisowqsytesodgsotasotusnjusn2qs | SmartLoader botnet C2 (confidence level: 75%) | |
urlhttps://check.dymab.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.ledax.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://check.cohor.icu/gkcxv.google | ClearFake payload delivery URL (confidence level: 100%) |
Threat ID: 682acdc3bbaf20d303f1fef2
Added to database: 5/19/2025, 6:20:51 AM
Last enriched: 6/18/2025, 8:20:38 AM
Last updated: 8/14/2025, 3:35:06 PM
Views: 14
Related Threats
ThreatFox IOCs for 2025-08-14
MediumOn Going Malvertising Attack Spreads New Crypto Stealing PS1Bot Malware
MediumA Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode
MediumPhantomCard: New NFC-driven Android malware emerging in Brazil
MediumThreatFox IOCs for 2025-08-13
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.