ThreatFox IOCs for 2025-05-08
ThreatFox IOCs for 2025-05-08
AI Analysis
Technical Summary
The provided threat intelligence relates to a malware-type threat identified as 'ThreatFox IOCs for 2025-05-08,' sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The threat is categorized under 'osint' (open-source intelligence) and tagged with 'type:osint' and 'tlp:white,' indicating that the information is intended for broad sharing without restrictions. There are no specific affected product versions or CWE (Common Weakness Enumeration) identifiers listed, and no patch links or known exploits in the wild have been reported. The technical details include a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, suggesting moderate dissemination or presence. The absence of concrete IOCs or detailed technical indicators limits the granularity of the analysis. The threat appears to be a medium-severity malware-related intelligence report, likely aggregating or sharing IOCs relevant for OSINT practitioners or security teams to enhance detection capabilities. Given the lack of specific affected software or vulnerabilities, this threat likely represents a general malware campaign or emerging malware family rather than a targeted zero-day or exploit. The information is dated May 8, 2025, indicating it is current and relevant for proactive defense measures. Overall, this threat intelligence serves as a situational awareness update rather than a detailed technical exploit or vulnerability disclosure.
Potential Impact
For European organizations, the impact of this threat is currently assessed as medium due to the lack of specific exploit details or known active campaigns. However, malware threats disseminated through OSINT channels can lead to increased risk of infection if organizations do not update their detection and response mechanisms accordingly. Potential impacts include unauthorized access, data exfiltration, disruption of services, or lateral movement within networks if the malware is successfully deployed. Given the absence of known exploits in the wild, immediate large-scale impact is unlikely, but the presence of distributed indicators suggests that threat actors may be preparing or conducting reconnaissance. European organizations with mature cybersecurity operations that integrate OSINT feeds into their threat hunting and detection workflows will be better positioned to mitigate risks. Conversely, organizations lacking such capabilities may face delayed detection and response, increasing potential damage. The medium severity reflects a moderate risk that warrants attention but does not indicate an imminent critical threat.
Mitigation Recommendations
1. Integrate ThreatFox and similar OSINT feeds into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) platforms to enhance detection of emerging malware indicators. 2. Conduct regular threat hunting exercises focused on newly published IOCs, even if no active exploit is reported, to identify potential early signs of compromise. 3. Maintain up-to-date endpoint and network security solutions with behavioral analysis capabilities to detect anomalous activities associated with unknown or emerging malware. 4. Implement strict network segmentation and least privilege access controls to limit potential lateral movement if malware is introduced. 5. Educate security teams on interpreting and operationalizing OSINT-based threat intelligence to improve proactive defense measures. 6. Establish incident response playbooks that include procedures for handling malware infections identified through OSINT indicators. 7. Monitor relevant threat intelligence communities and update detection rules promptly as more detailed information or exploits emerge. These recommendations go beyond generic advice by emphasizing the operational integration of OSINT feeds and proactive threat hunting tailored to the nature of this intelligence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: ntmmh.run
- url: https://aimpes.com/6t4g.js
- domain: aimpes.com
- url: https://aimpes.com/js.php
- url: https://tchmitt.live/log/in
- domain: tchmitt.live
- domain: gfddx.run
- domain: df-www.com
- domain: en-koinly.com
- domain: metatradar5.com
- domain: optislgns.com
- domain: paychex-us.com
- domain: bbvanetcashs.com
- domain: www.qik.su
- domain: 4kdownloadl.com
- domain: techsmlth.store
- domain: ccieaner.com
- domain: koinly-en.com
- domain: zoho-us.com
- domain: dv-www.com
- domain: en-payroll.com
- domain: easycrypto.su
- domain: www.dp-www.com
- domain: www.cisco-us.com
- domain: audacltyteam.org
- domain: cllcktime.com
- domain: quantower.site
- domain: quantower.pw
- domain: adoobes.store
- domain: sportsenginec.com
- domain: apachefrlends.com
- domain: dk-www.com
- domain: xrpscan-en.com
- domain: coinomi.pw
- domain: en-sdccu.com
- domain: monadls.com
- domain: web-chatgpt.com
- domain: ccieaner.store
- domain: www.drr-www.com
- domain: metatradar5.store
- domain: keepassw.info
- domain: web.guarda.pw
- domain: floridarealestatechool.com
- domain: www.dq-www.com
- domain: www.dy-www.com
- domain: bot.installs.pro
- domain: web-silkai.com
- domain: wasabiwallet.pw
- domain: moblsystems.com
- domain: openofflce.com
- domain: manageenglne.com
- domain: dg-www.com
- domain: newrelic-en.com
- domain: tlger.store
- domain: sultecrm.com
- domain: do-www.com
- domain: www.bawag-web.com
- domain: openofflce.store
- domain: ninjaone-en.com
- domain: du-www.com
- domain: admin.prompasport.ru
- domain: techsmlth.com
- domain: apachefrlends.store
- domain: brightdata-en.com
- domain: sysaid-en.com
- domain: www.shopmeyxchange.com
- domain: coreidraw.com
- domain: cllcktime.store
- domain: ion-login.com
- domain: blendrer.org
- domain: www-yoast.com
- domain: quantower.su
- domain: 3cx-en.com
- domain: moblerecharges.com
- domain: ultraviewer-en.com
- domain: tlger.com
- domain: ultravlewer.com
- domain: 4kdownloadl.store
- domain: testerscrypto.com
- domain: bitpay.pw
- domain: sportsenginec.store
- domain: jam-softwarec.com
- domain: password-en.com
- domain: dx-www.com
- domain: ledgers.su
- domain: manageenglne.store
- domain: bamboohr-en.com
- domain: web-goodcrypto.com
- domain: symblosis.com
- domain: testerscrypto.store
- domain: bbssj.run
- domain: hspmj.run
- file: 101.126.144.111
- hash: 80
- file: 156.245.27.240
- hash: 505
- file: 104.37.4.100
- hash: 2404
- file: 161.132.68.248
- hash: 31337
- file: 196.251.73.133
- hash: 7777
- file: 176.65.142.198
- hash: 6606
- file: 176.65.142.198
- hash: 7707
- file: 196.251.117.82
- hash: 8808
- file: 85.192.48.2
- hash: 50555
- file: 212.224.107.135
- hash: 2053
- file: 192.121.246.166
- hash: 443
- file: 191.13.208.53
- hash: 8081
- file: 192.227.217.227
- hash: 53018
- file: 139.84.132.65
- hash: 10001
- file: 185.208.159.141
- hash: 443
- url: http://23.27.48.113:443/jquery-3.3.2.slim.min.js
- domain: h1.glitzyentire.top
- file: 101.35.235.124
- hash: 123
- file: 1.13.156.116
- hash: 443
- file: 111.230.212.37
- hash: 80
- url: http://137.184.35.179:8888/supershell/login/
- url: https://rocketlump.com/hdz
- url: https://fanpuy.com/zxod
- url: https://medikalbitkisel.org/pek
- url: https://victoreqs.run/xapw
- url: https://viridisw.top/qwed
- url: https://toptalentw.top/qena
- url: https://crocodilefg.top/qeji
- url: https://wolverineas.top/xadw
- url: https://steamcommunity.com/profiles/76561199845513035
- url: https://t.me/kubasex
- file: 80.64.18.161
- hash: 80
- domain: improvxf.run
- domain: tribunap.run
- domain: tremelzxiy.live
- domain: thinkellk.run
- domain: apronsxrum.digital
- url: http://chongmei33.myddns.rocks:7046/is-ready
- file: 46.246.84.12
- hash: 7046
- file: 46.246.84.12
- hash: 2703
- file: 152.42.199.84
- hash: 1089
- file: 192.3.12.168
- hash: 43256
- file: 192.3.12.168
- hash: 80
- url: https://2vecturar.top/zsia
- url: https://agrizzlqzuk.live/qhbu
- url: https://insidegrah.run/ieop
- domain: ec2-18-166-31-74.ap-east-1.compute.amazonaws.com
- domain: nl-2.193.27.90.134.nip.io
- file: 3.236.12.85
- hash: 443
- file: 186.169.63.68
- hash: 9999
- file: 94.26.90.245
- hash: 8808
- file: 176.65.142.198
- hash: 8808
- file: 196.251.71.236
- hash: 5555
- domain: ec2-44-246-89-112.us-west-2.compute.amazonaws.com
- domain: razesec.com
- domain: dotfoods.socalmediazone.com
- domain: sci.socalmediazone.com
- file: 89.40.31.57
- hash: 9373
- file: 45.11.229.12
- hash: 80
- file: 159.69.199.17
- hash: 8443
- file: 3.141.231.53
- hash: 8080
- file: 15.164.18.179
- hash: 80
- file: 203.193.174.94
- hash: 3333
- file: 46.38.254.23
- hash: 443
- file: 4.237.239.110
- hash: 3333
- file: 34.249.182.250
- hash: 443
- file: 52.210.91.186
- hash: 443
- file: 146.190.118.96
- hash: 1234
- file: 38.55.198.29
- hash: 443
- file: 124.71.7.106
- hash: 10002
- file: 192.241.135.51
- hash: 1234
- file: 43.135.76.103
- hash: 9999
- file: 1.92.158.252
- hash: 8080
- file: 117.88.102.214
- hash: 3333
- file: 37.27.242.2
- hash: 3333
- file: 188.166.255.201
- hash: 1724
- file: 103.175.217.17
- hash: 3333
- file: 3.39.87.72
- hash: 80
- file: 13.124.234.4
- hash: 80
- url: http://a1106686.xsph.ru/l1nc0in.php
- domain: xmlvm.run
- file: 8.138.46.58
- hash: 443
- file: 20.205.16.222
- hash: 443
- url: http://baleturn.com/front.php
- url: https://fmecoutsm.com/diagnostics.php
- domain: djrtt.run
- url: https://brotherreligion.xyz/art.php
- url: http://troublesisters.xyz/oils.php
- domain: persongiants.icu
- domain: preyinthewild.online
- url: https://9octalfbsh.bet/mben
- url: https://apronsxrum.digital/pwq
- url: https://egrizzlqzuk.live/qhbu
- url: https://grizzlqzuk.live/qhbu
- url: https://oorijinalecza.net/kazd
- url: https://tremelzxiy.live/atok
- file: 150.158.108.220
- hash: 443
- file: 43.251.100.146
- hash: 8086
- file: 47.92.216.212
- hash: 8080
- file: 101.37.80.173
- hash: 8888
- file: 147.79.20.62
- hash: 80
- url: http://51.195.229.85/pages/login.php
- domain: rkblm.run
- url: https://ctortoisgfe.top/paxk
- domain: egiftshop.cloud
- domain: highcouncipl.live
- domain: tapandshop.shop
- domain: tavernfolkk.run
- domain: towerstozne.run
- domain: unmutezcx.live
- domain: viscosityobserving.shop
- url: https://mariosefqcu.shop/wrqo
- url: https://ohomewappzb.top/tqba
- domain: pmglw.run
- file: 176.65.141.210
- hash: 15390
- url: https://3k0monemiltxny.shop/tqiw
- url: https://3yoctalfbsh.bet/mben
- file: 43.132.216.81
- hash: 635
- url: https://joctalfbsh.bet/mben
- url: https://mstuffgull.top/qwio
- domain: xkpdf.run
- file: 185.196.11.181
- hash: 9922
- file: 24.199.73.199
- hash: 31337
- file: 158.247.218.220
- hash: 31337
- file: 15.168.9.236
- hash: 2002
- file: 176.82.189.27
- hash: 6001
- file: 37.72.168.146
- hash: 10443
- file: 169.150.155.228
- hash: 55553
- file: 51.21.245.196
- hash: 12284
- file: 158.247.202.109
- hash: 443
- file: 158.247.207.197
- hash: 443
- file: 220.71.102.113
- hash: 54984
- file: 15.222.3.45
- hash: 12112
- file: 117.209.241.134
- hash: 49682
- url: http://85.192.48.2:50555/
- url: http://103.74.101.88/
- url: http://kruasanpcs.mywebcommunity.org/providerjavascriptupdategamebigloaddblinux.php
- file: 91.200.14.226
- hash: 8443
- file: 121.36.228.26
- hash: 8080
- file: 154.219.119.63
- hash: 888
- file: 27.102.127.136
- hash: 443
- file: 89.40.31.225
- hash: 9373
- file: 66.42.44.50
- hash: 53
- file: 120.26.243.135
- hash: 8080
- file: 167.172.94.208
- hash: 8888
- domain: qmzks.run
- file: 134.199.169.177
- hash: 7443
- file: 47.129.144.57
- hash: 636
- domain: jamesrockky.ydns.eu
- domain: riches20.kozow.com
- domain: steveswiths.freemyip.com
- domain: botnet.ethoneservices.xyz
- file: 46.101.236.176
- hash: 1853
- file: 79.110.62.113
- hash: 4836
- domain: spec.gl.at.ply.gg
- domain: lenovo-sync.com
- domain: life.judyfay.com
- domain: npknn.run
- file: 95.135.153.175
- hash: 443
- file: 110.41.60.33
- hash: 80
- domain: nshpd.run
- domain: snhnv.run
- domain: noxajb.top
- domain: voznessxyy.life
- domain: clatteqrpq.digital
- domain: ninepicchf.bet
- url: https://colliel.live/log/in
- domain: colliel.live
- domain: fhtnt.run
- domain: xtkdt.run
- file: 81.17.20.66
- hash: 4431
- domain: mzrln.run
- file: 202.95.12.160
- hash: 80
- file: 116.62.205.141
- hash: 443
- file: 103.140.154.238
- hash: 443
- file: 47.107.49.44
- hash: 80
- file: 139.224.30.125
- hash: 443
- file: 43.139.240.201
- hash: 80
- file: 92.63.100.74
- hash: 33949
- file: 45.61.165.249
- hash: 4782
- domain: setup.bestoffersfortoday.store
- domain: 37-72-168-146.static.hvvc.us
- file: 75.119.159.249
- hash: 8000
- file: 31.220.44.127
- hash: 443
- file: 15.152.54.240
- hash: 20547
- file: 23.26.201.169
- hash: 7443
- file: 154.201.90.76
- hash: 80
- domain: wizardly-cannon.51-195-229-85.plesk.page
- url: https://taskrunp.run/xnzbd
- file: 111.230.233.129
- hash: 443
- domain: mobile-cff.app
- url: https://johnoton.live/log/in
- domain: johnoton.live
- url: https://motocyclenews.top/jse/minjs.js
- domain: motocyclenews.top
- url: https://motocyclenews.top/jse/select.js
- url: https://motocyclenews.top/jse/lll.php
- url: https://territoirespaysagistes.com/buts.zip
- domain: territoirespaysagistes.com
- domain: ttxch.run
- domain: www.thefertilemine.com
- domain: 53d6c5e5e04f7e079df5d5d77bc259ea.us
- file: 77.90.153.228
- hash: 443
- file: 160.30.44.124
- hash: 2023
- file: 160.30.44.174
- hash: 2023
- domain: daqev.run
- url: https://www.thefertilemine.com/profilelayout
- file: 166.88.164.201
- hash: 443
- domain: cagom.run
- domain: appli-cff.com
- url: https://wishspy.xyz/art.php
- domain: mehig.run
- url: https://3homewappzb.top/tqba
- url: https://clatteqrpq.digital/kljz
- url: https://ninepicchf.bet/lznd
- url: https://tclatteqrpq.digital/kljz
- url: https://voznessxyy.life/bnaz
- url: https://8stuffgull.top/qwio
- url: https://finsidegrah.run/ieop
- url: https://ggrizzlqzuk.live/qhbu
- file: 196.251.117.50
- hash: 5213
- url: http://92.63.102.85/2providertemporaryprivate/httpapitemporary6/4publicsecureauth/lowwindows/9/lowjsvoiddb/temporaryproton/videojavascripthttpserverprotectflowergeneratortrafficuploadsdownloads.php
- domain: jodob.run
- file: 137.220.135.67
- hash: 6064
- domain: sihen.run
- hash: a539275d837cf5501e0d98abce56f16ca8f97c9d06662162278c0dffb783d7de
- hash: bec378cef9cbb85f127691385517b659
- hash: b92960006ed39ecd4a7a403b44064c01
- hash: d99840757365a6c5045a870980e5fdf8
- domain: myspecialdot.com
- hash: c402f62212873f3a7e6fce5d490f6ddb
- hash: b03211f6feccd3a62273368b52f6079d
- hash: 2fde001f4c17c8613480091fa48b55a0
- domain: sohaeidacademy.com
- hash: a3d8e4f55c50bc916f6410f31a811e2d
- domain: genow.run
- file: 149.88.71.241
- hash: 443
- file: 154.204.35.210
- hash: 443
- file: 166.88.100.85
- hash: 8001
- domain: fanpuy.com
- file: 185.49.126.223
- hash: 2404
- file: 45.13.38.142
- hash: 2404
- file: 89.111.173.134
- hash: 443
- file: 196.251.71.236
- hash: 2222
- file: 202.95.14.161
- hash: 8848
- file: 18.133.246.144
- hash: 1244
- domain: minak.run
- file: 113.44.132.115
- hash: 80
- file: 39.105.6.249
- hash: 80
- domain: fecif.run
- file: 77.232.38.204
- hash: 37215
- file: 103.12.149.123
- hash: 8080
- file: 47.109.190.151
- hash: 80
- file: 212.69.86.8
- hash: 5061
- file: 5.35.125.77
- hash: 443
- file: 116.62.30.120
- hash: 8888
- file: 196.251.118.253
- hash: 8808
- file: 176.65.134.77
- hash: 8808
- file: 45.80.158.238
- hash: 80
- file: 52.79.126.186
- hash: 11872
- file: 54.187.139.165
- hash: 113
- file: 172.171.241.227
- hash: 8787
- domain: mskisdakw.top
- domain: fsdlaowaa.top
- file: 199.247.6.61
- hash: 80
- file: 101.226.27.147
- hash: 4506
- file: 103.159.50.30
- hash: 443
- file: 185.195.64.68
- hash: 443
- file: 116.26.10.55
- hash: 36166
- file: 158.160.26.151
- hash: 1720
- file: 189.140.41.58
- hash: 443
- file: 43.141.130.132
- hash: 10250
- file: 70.31.125.238
- hash: 2078
- url: https://raeneasq.live/nmgj
- domain: olympusgo.com
- file: 167.86.109.240
- hash: 8888
- file: 213.226.113.235
- hash: 1912
ThreatFox IOCs for 2025-05-08
Description
ThreatFox IOCs for 2025-05-08
AI-Powered Analysis
Technical Analysis
The provided threat intelligence relates to a malware-type threat identified as 'ThreatFox IOCs for 2025-05-08,' sourced from ThreatFox, a platform known for sharing Indicators of Compromise (IOCs) and threat intelligence data. The threat is categorized under 'osint' (open-source intelligence) and tagged with 'type:osint' and 'tlp:white,' indicating that the information is intended for broad sharing without restrictions. There are no specific affected product versions or CWE (Common Weakness Enumeration) identifiers listed, and no patch links or known exploits in the wild have been reported. The technical details include a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, suggesting moderate dissemination or presence. The absence of concrete IOCs or detailed technical indicators limits the granularity of the analysis. The threat appears to be a medium-severity malware-related intelligence report, likely aggregating or sharing IOCs relevant for OSINT practitioners or security teams to enhance detection capabilities. Given the lack of specific affected software or vulnerabilities, this threat likely represents a general malware campaign or emerging malware family rather than a targeted zero-day or exploit. The information is dated May 8, 2025, indicating it is current and relevant for proactive defense measures. Overall, this threat intelligence serves as a situational awareness update rather than a detailed technical exploit or vulnerability disclosure.
Potential Impact
For European organizations, the impact of this threat is currently assessed as medium due to the lack of specific exploit details or known active campaigns. However, malware threats disseminated through OSINT channels can lead to increased risk of infection if organizations do not update their detection and response mechanisms accordingly. Potential impacts include unauthorized access, data exfiltration, disruption of services, or lateral movement within networks if the malware is successfully deployed. Given the absence of known exploits in the wild, immediate large-scale impact is unlikely, but the presence of distributed indicators suggests that threat actors may be preparing or conducting reconnaissance. European organizations with mature cybersecurity operations that integrate OSINT feeds into their threat hunting and detection workflows will be better positioned to mitigate risks. Conversely, organizations lacking such capabilities may face delayed detection and response, increasing potential damage. The medium severity reflects a moderate risk that warrants attention but does not indicate an imminent critical threat.
Mitigation Recommendations
1. Integrate ThreatFox and similar OSINT feeds into existing Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) platforms to enhance detection of emerging malware indicators. 2. Conduct regular threat hunting exercises focused on newly published IOCs, even if no active exploit is reported, to identify potential early signs of compromise. 3. Maintain up-to-date endpoint and network security solutions with behavioral analysis capabilities to detect anomalous activities associated with unknown or emerging malware. 4. Implement strict network segmentation and least privilege access controls to limit potential lateral movement if malware is introduced. 5. Educate security teams on interpreting and operationalizing OSINT-based threat intelligence to improve proactive defense measures. 6. Establish incident response playbooks that include procedures for handling malware infections identified through OSINT indicators. 7. Monitor relevant threat intelligence communities and update detection rules promptly as more detailed information or exploits emerge. These recommendations go beyond generic advice by emphasizing the operational integration of OSINT feeds and proactive threat hunting tailored to the nature of this intelligence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 6e9703ed-8197-4e8f-b731-1f14206a51b9
- Original Timestamp
- 1746748985
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainntmmh.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainaimpes.com | KongTuke payload delivery domain (confidence level: 100%) | |
domaintchmitt.live | KongTuke payload delivery domain (confidence level: 100%) | |
domaingfddx.run | ClearFake payload delivery domain (confidence level: 100%) | |
domaindf-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainen-koinly.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainmetatradar5.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainoptislgns.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainpaychex-us.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainbbvanetcashs.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.qik.su | Unknown Loader payload delivery domain (confidence level: 90%) | |
domain4kdownloadl.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaintechsmlth.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainccieaner.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainkoinly-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainzoho-us.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaindv-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainen-payroll.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaineasycrypto.su | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.dp-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.cisco-us.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainaudacltyteam.org | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaincllcktime.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainquantower.site | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainquantower.pw | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainadoobes.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainsportsenginec.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainapachefrlends.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaindk-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainxrpscan-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaincoinomi.pw | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainen-sdccu.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainmonadls.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainweb-chatgpt.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainccieaner.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.drr-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainmetatradar5.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainkeepassw.info | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainweb.guarda.pw | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainfloridarealestatechool.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.dq-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.dy-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainbot.installs.pro | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainweb-silkai.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwasabiwallet.pw | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainmoblsystems.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainopenofflce.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainmanageenglne.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaindg-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainnewrelic-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaintlger.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainsultecrm.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaindo-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.bawag-web.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainopenofflce.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainninjaone-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaindu-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainadmin.prompasport.ru | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaintechsmlth.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainapachefrlends.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainbrightdata-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainsysaid-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.shopmeyxchange.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaincoreidraw.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaincllcktime.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainion-login.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainblendrer.org | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww-yoast.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainquantower.su | Unknown Loader payload delivery domain (confidence level: 90%) | |
domain3cx-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainmoblerecharges.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainultraviewer-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaintlger.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainultravlewer.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domain4kdownloadl.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaintesterscrypto.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainbitpay.pw | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainsportsenginec.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainjam-softwarec.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainpassword-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaindx-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainledgers.su | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainmanageenglne.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainbamboohr-en.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainweb-goodcrypto.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainsymblosis.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaintesterscrypto.store | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainbbssj.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainhspmj.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainh1.glitzyentire.top | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainimprovxf.run | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintribunap.run | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintremelzxiy.live | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainthinkellk.run | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainapronsxrum.digital | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainec2-18-166-31-74.ap-east-1.compute.amazonaws.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainnl-2.193.27.90.134.nip.io | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainec2-44-246-89-112.us-west-2.compute.amazonaws.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainrazesec.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domaindotfoods.socalmediazone.com | Hook botnet C2 domain (confidence level: 100%) | |
domainsci.socalmediazone.com | Hook botnet C2 domain (confidence level: 100%) | |
domainxmlvm.run | ClearFake payload delivery domain (confidence level: 100%) | |
domaindjrtt.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainpersongiants.icu | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainpreyinthewild.online | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainrkblm.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainegiftshop.cloud | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainhighcouncipl.live | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintapandshop.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintavernfolkk.run | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintowerstozne.run | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainunmutezcx.live | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainviscosityobserving.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpmglw.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainxkpdf.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainqmzks.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainjamesrockky.ydns.eu | AsyncRAT botnet C2 domain (confidence level: 50%) | |
domainriches20.kozow.com | AsyncRAT botnet C2 domain (confidence level: 50%) | |
domainsteveswiths.freemyip.com | AsyncRAT botnet C2 domain (confidence level: 50%) | |
domainbotnet.ethoneservices.xyz | Mirai botnet C2 domain (confidence level: 50%) | |
domainspec.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 50%) | |
domainlenovo-sync.com | Unknown Stealer payload delivery domain (confidence level: 50%) | |
domainlife.judyfay.com | FAKEUPDATES payload delivery domain (confidence level: 50%) | |
domainnpknn.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainnshpd.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainsnhnv.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainnoxajb.top | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainvoznessxyy.life | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainclatteqrpq.digital | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainninepicchf.bet | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincolliel.live | KongTuke payload delivery domain (confidence level: 100%) | |
domainfhtnt.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainxtkdt.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainmzrln.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainsetup.bestoffersfortoday.store | Havoc botnet C2 domain (confidence level: 100%) | |
domain37-72-168-146.static.hvvc.us | Havoc botnet C2 domain (confidence level: 100%) | |
domainwizardly-cannon.51-195-229-85.plesk.page | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainmobile-cff.app | Coper payload delivery domain (confidence level: 100%) | |
domainjohnoton.live | KongTuke payload delivery domain (confidence level: 100%) | |
domainmotocyclenews.top | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainterritoirespaysagistes.com | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainttxch.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainwww.thefertilemine.com | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domain53d6c5e5e04f7e079df5d5d77bc259ea.us | Coper botnet C2 domain (confidence level: 100%) | |
domaindaqev.run | ClearFake payload delivery domain (confidence level: 100%) | |
domaincagom.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainappli-cff.com | Coper payload delivery domain (confidence level: 100%) | |
domainmehig.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainjodob.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainsihen.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainmyspecialdot.com | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainsohaeidacademy.com | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaingenow.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainfanpuy.com | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainminak.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainfecif.run | ClearFake payload delivery domain (confidence level: 100%) | |
domainmskisdakw.top | SpyNote botnet C2 domain (confidence level: 100%) | |
domainfsdlaowaa.top | SpyNote botnet C2 domain (confidence level: 100%) | |
domainolympusgo.com | Cobalt Strike botnet C2 domain (confidence level: 75%) |
Url
Value | Description | Copy |
---|---|---|
urlhttps://aimpes.com/6t4g.js | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://aimpes.com/js.php | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://tchmitt.live/log/in | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttp://23.27.48.113:443/jquery-3.3.2.slim.min.js | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttp://137.184.35.179:8888/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://rocketlump.com/hdz | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://fanpuy.com/zxod | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://medikalbitkisel.org/pek | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://victoreqs.run/xapw | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://viridisw.top/qwed | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://toptalentw.top/qena | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://crocodilefg.top/qeji | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://wolverineas.top/xadw | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://steamcommunity.com/profiles/76561199845513035 | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://t.me/kubasex | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://chongmei33.myddns.rocks:7046/is-ready | Houdini botnet C2 (confidence level: 100%) | |
urlhttps://2vecturar.top/zsia | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://agrizzlqzuk.live/qhbu | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://insidegrah.run/ieop | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://a1106686.xsph.ru/l1nc0in.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://baleturn.com/front.php | Satacom botnet C2 (confidence level: 100%) | |
urlhttps://fmecoutsm.com/diagnostics.php | Satacom botnet C2 (confidence level: 100%) | |
urlhttps://brotherreligion.xyz/art.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttp://troublesisters.xyz/oils.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttps://9octalfbsh.bet/mben | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://apronsxrum.digital/pwq | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://egrizzlqzuk.live/qhbu | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://grizzlqzuk.live/qhbu | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://oorijinalecza.net/kazd | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://tremelzxiy.live/atok | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://51.195.229.85/pages/login.php | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://ctortoisgfe.top/paxk | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://mariosefqcu.shop/wrqo | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://ohomewappzb.top/tqba | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://3k0monemiltxny.shop/tqiw | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://3yoctalfbsh.bet/mben | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://joctalfbsh.bet/mben | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://mstuffgull.top/qwio | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://85.192.48.2:50555/ | Hook botnet C2 (confidence level: 50%) | |
urlhttp://103.74.101.88/ | Hook botnet C2 (confidence level: 50%) | |
urlhttp://kruasanpcs.mywebcommunity.org/providerjavascriptupdategamebigloaddblinux.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://colliel.live/log/in | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://taskrunp.run/xnzbd | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://johnoton.live/log/in | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://motocyclenews.top/jse/minjs.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://motocyclenews.top/jse/select.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://motocyclenews.top/jse/lll.php | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://territoirespaysagistes.com/buts.zip | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://www.thefertilemine.com/profilelayout | FAKEUPDATES botnet C2 (confidence level: 100%) | |
urlhttps://wishspy.xyz/art.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttps://3homewappzb.top/tqba | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://clatteqrpq.digital/kljz | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://ninepicchf.bet/lznd | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://tclatteqrpq.digital/kljz | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://voznessxyy.life/bnaz | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://8stuffgull.top/qwio | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://finsidegrah.run/ieop | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://ggrizzlqzuk.live/qhbu | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://92.63.102.85/2providertemporaryprivate/httpapitemporary6/4publicsecureauth/lowwindows/9/lowjsvoiddb/temporaryproton/videojavascripthttpserverprotectflowergeneratortrafficuploadsdownloads.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://raeneasq.live/nmgj | Lumma Stealer botnet C2 (confidence level: 75%) |
File
Value | Description | Copy |
---|---|---|
file101.126.144.111 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.245.27.240 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file104.37.4.100 | Remcos botnet C2 server (confidence level: 100%) | |
file161.132.68.248 | Sliver botnet C2 server (confidence level: 100%) | |
file196.251.73.133 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file176.65.142.198 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file176.65.142.198 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file196.251.117.82 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file85.192.48.2 | Hook botnet C2 server (confidence level: 100%) | |
file212.224.107.135 | Hook botnet C2 server (confidence level: 100%) | |
file192.121.246.166 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file191.13.208.53 | Havoc botnet C2 server (confidence level: 100%) | |
file192.227.217.227 | Venom RAT botnet C2 server (confidence level: 100%) | |
file139.84.132.65 | MimiKatz botnet C2 server (confidence level: 100%) | |
file185.208.159.141 | Latrodectus botnet C2 server (confidence level: 90%) | |
file101.35.235.124 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file1.13.156.116 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file111.230.212.37 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file80.64.18.161 | Lumma Stealer botnet C2 server (confidence level: 50%) | |
file46.246.84.12 | Vjw0rm botnet C2 server (confidence level: 100%) | |
file46.246.84.12 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file152.42.199.84 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file192.3.12.168 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file192.3.12.168 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file3.236.12.85 | Sliver botnet C2 server (confidence level: 90%) | |
file186.169.63.68 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file94.26.90.245 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file176.65.142.198 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file196.251.71.236 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file89.40.31.57 | Remcos botnet C2 server (confidence level: 100%) | |
file45.11.229.12 | MooBot botnet C2 server (confidence level: 100%) | |
file159.69.199.17 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.141.231.53 | Unknown malware botnet C2 server (confidence level: 100%) | |
file15.164.18.179 | Unknown malware botnet C2 server (confidence level: 100%) | |
file203.193.174.94 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.38.254.23 | Unknown malware botnet C2 server (confidence level: 100%) | |
file4.237.239.110 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.249.182.250 | Unknown malware botnet C2 server (confidence level: 100%) | |
file52.210.91.186 | Unknown malware botnet C2 server (confidence level: 100%) | |
file146.190.118.96 | Unknown malware botnet C2 server (confidence level: 100%) | |
file38.55.198.29 | Unknown malware botnet C2 server (confidence level: 100%) | |
file124.71.7.106 | Unknown malware botnet C2 server (confidence level: 100%) | |
file192.241.135.51 | Unknown malware botnet C2 server (confidence level: 100%) | |
file43.135.76.103 | Unknown malware botnet C2 server (confidence level: 100%) | |
file1.92.158.252 | Unknown malware botnet C2 server (confidence level: 100%) | |
file117.88.102.214 | Unknown malware botnet C2 server (confidence level: 100%) | |
file37.27.242.2 | Unknown malware botnet C2 server (confidence level: 100%) | |
file188.166.255.201 | Unknown malware botnet C2 server (confidence level: 100%) | |
file103.175.217.17 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.39.87.72 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.124.234.4 | Unknown malware botnet C2 server (confidence level: 100%) | |
file8.138.46.58 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file20.205.16.222 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file150.158.108.220 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.251.100.146 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.92.216.212 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file101.37.80.173 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file147.79.20.62 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file176.65.141.210 | Mirai botnet C2 server (confidence level: 75%) | |
file43.132.216.81 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file185.196.11.181 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file24.199.73.199 | Sliver botnet C2 server (confidence level: 50%) | |
file158.247.218.220 | Sliver botnet C2 server (confidence level: 50%) | |
file15.168.9.236 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file176.82.189.27 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file37.72.168.146 | Havoc botnet C2 server (confidence level: 50%) | |
file169.150.155.228 | Havoc botnet C2 server (confidence level: 50%) | |
file51.21.245.196 | Unknown malware botnet C2 server (confidence level: 50%) | |
file158.247.202.109 | Kimsuky botnet C2 server (confidence level: 50%) | |
file158.247.207.197 | Kimsuky botnet C2 server (confidence level: 50%) | |
file220.71.102.113 | Nanocore RAT botnet C2 server (confidence level: 50%) | |
file15.222.3.45 | BlackShades botnet C2 server (confidence level: 50%) | |
file117.209.241.134 | Mozi botnet C2 server (confidence level: 50%) | |
file91.200.14.226 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file121.36.228.26 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.219.119.63 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file27.102.127.136 | Remcos botnet C2 server (confidence level: 100%) | |
file89.40.31.225 | Remcos botnet C2 server (confidence level: 100%) | |
file66.42.44.50 | pupy botnet C2 server (confidence level: 100%) | |
file120.26.243.135 | Sliver botnet C2 server (confidence level: 100%) | |
file167.172.94.208 | Unknown malware botnet C2 server (confidence level: 100%) | |
file134.199.169.177 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.129.144.57 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file46.101.236.176 | Remcos botnet C2 server (confidence level: 50%) | |
file79.110.62.113 | Remcos botnet C2 server (confidence level: 50%) | |
file95.135.153.175 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file110.41.60.33 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file81.17.20.66 | Meterpreter botnet C2 server (confidence level: 75%) | |
file202.95.12.160 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file116.62.205.141 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.140.154.238 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.107.49.44 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file139.224.30.125 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.139.240.201 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file92.63.100.74 | Sliver botnet C2 server (confidence level: 100%) | |
file45.61.165.249 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file75.119.159.249 | Havoc botnet C2 server (confidence level: 100%) | |
file31.220.44.127 | Havoc botnet C2 server (confidence level: 100%) | |
file15.152.54.240 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file23.26.201.169 | Unknown malware botnet C2 server (confidence level: 100%) | |
file154.201.90.76 | MooBot botnet C2 server (confidence level: 100%) | |
file111.230.233.129 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file77.90.153.228 | Coper botnet C2 server (confidence level: 75%) | |
file160.30.44.124 | MooBot botnet C2 server (confidence level: 100%) | |
file160.30.44.174 | MooBot botnet C2 server (confidence level: 100%) | |
file166.88.164.201 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
file196.251.117.50 | Ave Maria botnet C2 server (confidence level: 100%) | |
file137.220.135.67 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file149.88.71.241 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.204.35.210 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file166.88.100.85 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.49.126.223 | Remcos botnet C2 server (confidence level: 100%) | |
file45.13.38.142 | Remcos botnet C2 server (confidence level: 100%) | |
file89.111.173.134 | Sliver botnet C2 server (confidence level: 100%) | |
file196.251.71.236 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file202.95.14.161 | DCRat botnet C2 server (confidence level: 100%) | |
file18.133.246.144 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file113.44.132.115 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file39.105.6.249 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file77.232.38.204 | Mirai botnet C2 server (confidence level: 100%) | |
file103.12.149.123 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file47.109.190.151 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file212.69.86.8 | Remcos botnet C2 server (confidence level: 100%) | |
file5.35.125.77 | Sliver botnet C2 server (confidence level: 100%) | |
file116.62.30.120 | Unknown malware botnet C2 server (confidence level: 100%) | |
file196.251.118.253 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file176.65.134.77 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.80.158.238 | Hook botnet C2 server (confidence level: 100%) | |
file52.79.126.186 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file54.187.139.165 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file172.171.241.227 | MimiKatz botnet C2 server (confidence level: 100%) | |
file199.247.6.61 | SpyNote botnet C2 server (confidence level: 100%) | |
file101.226.27.147 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file103.159.50.30 | Havoc botnet C2 server (confidence level: 75%) | |
file185.195.64.68 | WarmCookie botnet C2 server (confidence level: 100%) | |
file116.26.10.55 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file158.160.26.151 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file189.140.41.58 | QakBot botnet C2 server (confidence level: 75%) | |
file43.141.130.132 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file70.31.125.238 | QakBot botnet C2 server (confidence level: 75%) | |
file167.86.109.240 | Meterpreter botnet C2 server (confidence level: 75%) | |
file213.226.113.235 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash505 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash7777 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash50555 | Hook botnet C2 server (confidence level: 100%) | |
hash2053 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8081 | Havoc botnet C2 server (confidence level: 100%) | |
hash53018 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash10001 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 90%) | |
hash123 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Lumma Stealer botnet C2 server (confidence level: 50%) | |
hash7046 | Vjw0rm botnet C2 server (confidence level: 100%) | |
hash2703 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash1089 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash43256 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Sliver botnet C2 server (confidence level: 90%) | |
hash9999 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash5555 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash9373 | Remcos botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1234 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash10002 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1234 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9999 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1724 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8086 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash15390 | Mirai botnet C2 server (confidence level: 75%) | |
hash635 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash9922 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash2002 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash6001 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash10443 | Havoc botnet C2 server (confidence level: 50%) | |
hash55553 | Havoc botnet C2 server (confidence level: 50%) | |
hash12284 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash443 | Kimsuky botnet C2 server (confidence level: 50%) | |
hash443 | Kimsuky botnet C2 server (confidence level: 50%) | |
hash54984 | Nanocore RAT botnet C2 server (confidence level: 50%) | |
hash12112 | BlackShades botnet C2 server (confidence level: 50%) | |
hash49682 | Mozi botnet C2 server (confidence level: 50%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Remcos botnet C2 server (confidence level: 100%) | |
hash9373 | Remcos botnet C2 server (confidence level: 100%) | |
hash53 | pupy botnet C2 server (confidence level: 100%) | |
hash8080 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash636 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash1853 | Remcos botnet C2 server (confidence level: 50%) | |
hash4836 | Remcos botnet C2 server (confidence level: 50%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash4431 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash33949 | Sliver botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8000 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash20547 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Coper botnet C2 server (confidence level: 75%) | |
hash2023 | MooBot botnet C2 server (confidence level: 100%) | |
hash2023 | MooBot botnet C2 server (confidence level: 100%) | |
hash443 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
hash5213 | Ave Maria botnet C2 server (confidence level: 100%) | |
hash6064 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hasha539275d837cf5501e0d98abce56f16ca8f97c9d06662162278c0dffb783d7de | Unknown malware payload (confidence level: 50%) | |
hashbec378cef9cbb85f127691385517b659 | AMOS payload (confidence level: 100%) | |
hashb92960006ed39ecd4a7a403b44064c01 | AMOS payload (confidence level: 100%) | |
hashd99840757365a6c5045a870980e5fdf8 | AMOS payload (confidence level: 100%) | |
hashc402f62212873f3a7e6fce5d490f6ddb | Unknown malware payload (confidence level: 100%) | |
hashb03211f6feccd3a62273368b52f6079d | Unknown malware payload (confidence level: 100%) | |
hash2fde001f4c17c8613480091fa48b55a0 | Unknown malware payload (confidence level: 100%) | |
hasha3d8e4f55c50bc916f6410f31a811e2d | Unknown malware payload (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8001 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash2222 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8848 | DCRat botnet C2 server (confidence level: 100%) | |
hash1244 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash37215 | Mirai botnet C2 server (confidence level: 100%) | |
hash8080 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash5061 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash11872 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash113 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8787 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash80 | SpyNote botnet C2 server (confidence level: 100%) | |
hash4506 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | Havoc botnet C2 server (confidence level: 75%) | |
hash443 | WarmCookie botnet C2 server (confidence level: 100%) | |
hash36166 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash1720 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash10250 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash2078 | QakBot botnet C2 server (confidence level: 75%) | |
hash8888 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash1912 | RedLine Stealer botnet C2 server (confidence level: 100%) |
Threat ID: 682c7db2e8347ec82d2a0b30
Added to database: 5/20/2025, 1:03:46 PM
Last enriched: 6/19/2025, 2:48:55 PM
Last updated: 8/10/2025, 12:53:24 PM
Views: 13
Related Threats
From ClickFix to Command: A Full PowerShell Attack Chain
MediumNorth Korean Group ScarCruft Expands From Spying to Ransomware Attacks
MediumMedusaLocker ransomware group is looking for pentesters
MediumThreatFox IOCs for 2025-08-10
MediumThreatFox IOCs for 2025-08-09
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.