ThreatFox IOCs for 2025-05-15
ThreatFox IOCs for 2025-05-15
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2025-05-15 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), network activity, and payload delivery. The data appears to be a collection of threat intelligence indicators rather than a description of a specific malware family or exploit. No affected software versions are listed, no patches are available, and no known exploits are currently observed in the wild. The threat level is rated as medium with a threatLevel metric of 2 (on an unspecified scale), analysis level of 1, and distribution level of 3, indicating moderate dissemination of these IOCs. The absence of technical details such as specific malware behavior, attack vectors, or vulnerabilities limits the depth of technical analysis. The indicators are tagged with TLP:white, suggesting they are intended for broad sharing within the community. Overall, this entry represents a threat intelligence update providing OSINT-related network activity and payload delivery indicators that could be used by security teams to detect or investigate potential malicious activity but does not describe an active or novel exploit or vulnerability.
Potential Impact
For European organizations, the impact of these IOCs depends on their integration into security monitoring and incident response processes. Since these are OSINT-based indicators related to network activity and payload delivery, they can help identify malicious communications or payloads in network traffic. The medium severity suggests a moderate risk, likely indicating that these IOCs could be associated with malware campaigns or threat actors that might target organizations indiscriminately or sector-specifically. Without specific affected products or vulnerabilities, the direct impact on confidentiality, integrity, or availability is uncertain but could involve detection of malware infections or network intrusions. Organizations lacking robust threat intelligence ingestion or network monitoring capabilities may miss early signs of compromise. Conversely, those with mature security operations can leverage these IOCs to enhance detection and reduce dwell time of threats. The lack of known exploits in the wild reduces immediate risk but does not eliminate potential future exploitation or targeted attacks using these indicators.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems and threat intelligence platforms to enable automated detection and alerting on matching network activity or payload signatures. 2. Conduct regular network traffic analysis and endpoint monitoring to identify suspicious communications or payload deliveries matching these indicators. 3. Enhance collaboration with threat intelligence sharing communities to receive timely updates and context around these IOCs. 4. Implement network segmentation and strict egress filtering to limit the impact of potential payload delivery and lateral movement. 5. Train security analysts to interpret OSINT-based indicators and correlate them with internal telemetry for effective incident response. 6. Maintain up-to-date endpoint protection and network security controls to reduce the risk of successful payload execution, even if specific patches are unavailable. 7. Continuously review and update detection rules based on evolving threat intelligence to adapt to changes in attacker tactics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: saxecocnak.live
- domain: emphatakpn.bet
- domain: laminaflbx.shop
- domain: brandenfrancseet.sbs
- file: 47.96.114.159
- hash: 443
- file: 159.65.9.106
- hash: 443
- file: 47.115.202.126
- hash: 9998
- file: 205.198.88.140
- hash: 80
- url: https://fmovies123.top/fix/select.js
- domain: fmovies123.top
- url: https://fmovies123.top/fix/his.php
- url: https://probuildgroupusa.com/xsxs.zip
- file: 39.100.76.142
- hash: 8086
- file: 134.175.229.167
- hash: 443
- file: 196.251.85.128
- hash: 9090
- file: 172.111.244.102
- hash: 37830
- file: 3.17.164.16
- hash: 443
- file: 8.218.254.239
- hash: 8888
- file: 186.169.82.245
- hash: 9999
- file: 3.215.185.215
- hash: 8808
- file: 45.141.84.229
- hash: 15647
- file: 206.206.126.216
- hash: 8082
- file: 37.252.19.120
- hash: 443
- file: 194.195.251.227
- hash: 4000
- domain: ndgpt.ru
- file: 182.16.26.210
- hash: 56105
- domain: zdqdc.ru
- domain: ec2-54-183-101-23.us-west-1.compute.amazonaws.com
- domain: flowergrandeseen.sbs
- domain: console24.online
- url: http://ck92448.tw1.ru/5d8ad51b.php
- url: https://7lancery.digital/goj
- domain: dvwct.ru
- file: 193.124.41.54
- hash: 80
- file: 175.27.250.248
- hash: 8888
- file: 128.90.106.147
- hash: 2000
- file: 128.90.113.220
- hash: 8808
- file: 196.251.116.59
- hash: 2222
- file: 196.251.116.59
- hash: 7777
- file: 54.36.114.72
- hash: 3001
- file: 35.227.3.131
- hash: 7443
- domain: mahsa2283qt9.mahsaaminivpn.com
- file: 156.208.9.253
- hash: 4445
- file: 217.18.210.142
- hash: 1995
- domain: webpanel.elementfx.com
- file: 80.74.28.101
- hash: 80
- file: 45.249.244.192
- hash: 60000
- file: 5.129.200.87
- hash: 3434
- file: 49.12.113.198
- hash: 3333
- file: 132.220.9.187
- hash: 3333
- file: 18.141.207.185
- hash: 8443
- file: 209.74.83.112
- hash: 80
- file: 134.199.174.247
- hash: 8080
- file: 191.252.214.71
- hash: 3333
- file: 34.93.255.12
- hash: 3000
- file: 172.189.165.37
- hash: 3333
- file: 147.135.75.234
- hash: 3333
- file: 203.177.95.83
- hash: 80
- file: 194.206.75.137
- hash: 443
- file: 185.181.8.193
- hash: 8080
- file: 13.51.128.227
- hash: 443
- file: 13.51.246.31
- hash: 443
- file: 4.180.175.67
- hash: 443
- file: 172.190.97.151
- hash: 3333
- file: 52.29.87.239
- hash: 80
- file: 52.29.87.239
- hash: 443
- file: 46.36.41.35
- hash: 9876
- file: 35.182.126.131
- hash: 833
- domain: ecs-113-44-39-1.compute.hwclouds-dns.com
- file: 45.66.248.239
- hash: 443
- url: https://files.catbox.moe/olyfi3.001
- hash: bf3b43f5e4398ac810f005200519e096349b2237587d920d3c9b83525bb6bafc
- hash: 9940de30f3930cf0d0e9e9c8769148594240d11242fcd6c9dd9e9f572f68ac01
- hash: 30738450f69c3de74971368192a4a647e4ed9c658f076459e42683b110baf371
- hash: 1269c968258999930b573682699fe72de72d96401e3beb314ae91baf0e0e49e8
- file: 8.134.70.73
- hash: 7777
- file: 113.45.137.206
- hash: 80
- file: 212.162.155.38
- hash: 443
- file: 139.9.197.63
- hash: 8888
- file: 18.167.69.145
- hash: 443
- file: 47.92.142.110
- hash: 1234
- file: 66.181.36.218
- hash: 80
- url: http://206.206.126.216/
- url: https://onedrive.live.com/download?cid=74f1199a49c3215b&resid=74f1199a49c3215b%21122&authkey=aagy326uc3bhn_ks
- domain: silver-map.gl.at.ply.gg
- domain: frederichoms.com
- domain: tool.municipiodechepo.org
- domain: api.incapdns.kz
- domain: blog.jasonlees.com
- domain: report.monicabellucci.kz
- domain: developer.master.org.kz
- domain: cast.voxcdn.kz
- domain: host.moresecurity.kz
- domain: ryanberardi.com
- domain: onlinemail.kz
- domain: contactlistsagregator.com
- domain: blameaowi.run
- domain: changenwg.run
- domain: flamingof.run
- url: http://crackarithmetic.icu/glo.php
- domain: bootplate.info
- domain: sistertable.xyz
- url: https://mflowerexju.bet/lanz
- url: https://nposseswsnc.top/akds
- url: https://ycornerdurv.top/adwq
- file: 45.133.180.138
- hash: 6432
- url: https://4featurlyin.top/pdal
- url: https://demphatakpn.bet/ladk
- url: https://o9cornerdurv.top/adwq
- url: https://ylaminaflbx.shop/twoq
- file: 216.9.224.158
- hash: 13403
- file: 216.9.224.158
- hash: 13404
- url: https://raraucahkbm.live/baneb
- url: https://wfeaturlyin.top/pdal
- file: 166.88.182.216
- hash: 443
- url: https://steamcommunity.com/profiles/76561199855598339
- url: https://t.me/eom25h
- url: https://16.16.4t.com/
- url: https://49.12.106.231/
- domain: 16.16.4t.com
- file: 78.47.78.115
- hash: 443
- file: 49.12.106.231
- hash: 443
- file: 156.238.233.94
- hash: 8888
- file: 193.43.91.117
- hash: 443
- file: 124.70.25.169
- hash: 80
- file: 198.55.102.43
- hash: 2404
- file: 172.94.9.180
- hash: 1962
- file: 120.55.126.188
- hash: 8443
- file: 121.127.33.197
- hash: 8888
- file: 172.81.135.7
- hash: 8000
- domain: anna-akhmatova.com
- file: 23.145.40.108
- hash: 7443
- file: 192.227.209.49
- hash: 7443
- file: 47.128.228.209
- hash: 3260
- file: 47.128.228.209
- hash: 8010
- file: 45.150.34.16
- hash: 80
- file: 111.230.6.33
- hash: 443
- file: 192.227.128.8
- hash: 2082
- file: 143.198.86.20
- hash: 443
- file: 205.185.122.202
- hash: 8000
- file: 81.69.17.187
- hash: 8000
- file: 47.92.218.188
- hash: 80
- file: 101.126.136.95
- hash: 443
- file: 34.237.228.97
- hash: 443
- url: https://pub-d4469a7a24f7423989c5026116ada945.r2.dev/vpncmgr.exe
- file: 106.225.242.93
- hash: 4506
- url: https://12.innospark.cloud/vpnmcg.txt
- file: 164.90.170.149
- hash: 8000
- file: 191.112.19.228
- hash: 443
- hash: 4ebd79e8935076a7916e19650f98cc8c20aef4fb5c9da57807b472ee012d6d8c
- file: 44.197.118.25
- hash: 443
- file: 70.27.138.240
- hash: 2222
- file: 112.121.172.10
- hash: 6666
- domain: jerusd.digital
- domain: golconz.digital
- domain: cladwybn.digital
- url: https://eqcobwuxr.digital/mnf
- url: https://7meteorplyp.live/lekp
- url: https://milkwevvmw.run/gakz
- url: https://winterpwthc.digital/juab
- file: 206.238.115.155
- hash: 6606
- file: 206.238.115.155
- hash: 7707
- domain: ou.qymj.ru
- domain: fanclubsemantics.sbs
- file: 156.243.1.71
- hash: 443
- url: http://a0651821.xsph.ru/multiasync.php
- file: 54.90.144.239
- hash: 11112
- url: https://anna-akhmatova.com/login
- domain: aneesh-technomakest.duckdns.org
- domain: aneesh-technomakestbk.duckdns.org
- file: 148.113.214.176
- hash: 4090
- file: 191.96.39.104
- hash: 23083
- file: 47.109.177.97
- hash: 88
- file: 8.153.206.206
- hash: 80
- file: 1.15.174.189
- hash: 8896
- file: 154.92.15.53
- hash: 81
- file: 118.178.189.206
- hash: 80
- file: 118.178.188.203
- hash: 80
- file: 120.27.197.246
- hash: 8081
- file: 51.89.204.11
- hash: 64387
- file: 142.171.3.163
- hash: 8888
- file: 128.90.106.147
- hash: 4000
- file: 144.172.104.135
- hash: 6606
- file: 196.251.116.59
- hash: 222
- file: 196.251.116.59
- hash: 888
- file: 3.226.74.199
- hash: 80
- file: 34.148.218.89
- hash: 4443
- file: 20.67.242.112
- hash: 443
- file: 47.121.30.118
- hash: 8082
- domain: wss.telegrma.app
- file: 120.70.25.169
- hash: 80
- url: https://lovingcaredisabilityservices.com.au/up/
- url: https://ch1.s3.fr-par.scw.cloud/two-factor-auth-challenge-next-v6b7.html
- url: https://payment-verify.com/
- url: http://103.171.35.26:9443/dot.gif
- domain: stealer.cy
- url: https://stealer.cy
- url: https://16testcawepr.run/dsap
- url: https://6laminaflbx.shop/twoq
- url: https://www.rivercitymech.biz/profilelayout
- domain: www.rivercitymech.biz
- domain: awndsjkduiukekwltdadjwadawds.ru
- domain: pentagonstealer.ru
- domain: pentagon.cy
- domain: testwebsite01-70h.pages.dev
- url: https://8jugulagklc.live/roek
- url: https://jemphatakpn.bet/ladk
- url: https://zsaxecocnak.live/manj
- url: https://chiasmymnb.live/godk
- url: https://regopramide.top/lav/xf_addon.js
- url: https://regopramide.top/lav/select.js
- url: https://regopramide.top/lav/lll.php
- url: https://badgervolleyball.org/fsos.zip
- domain: badgervolleyball.org
- file: 104.223.123.147
- hash: 80
- file: 134.175.229.167
- hash: 10002
- file: 85.239.52.195
- hash: 443
- file: 45.86.230.235
- hash: 443
- file: 141.98.6.13
- hash: 80
- file: 159.89.17.182
- hash: 443
- file: 47.128.236.179
- hash: 80
- url: https://qfeaturlyin.top/pdal
- domain: qv.gahq.ru
- file: 185.222.57.92
- hash: 55615
- url: http://77.246.158.103/securetrafficpublic.php
- url: https://8r.czlw.ru/2f5a9e85-ee81-41df-8f15-e83a4ffac6c2
- domain: 8r.czlw.ru
- file: 60.204.169.16
- hash: 9999
- file: 119.28.116.34
- hash: 443
- file: 179.12.116.83
- hash: 2404
- file: 103.79.76.40
- hash: 8444
- file: 5.35.125.78
- hash: 8443
- file: 5.35.125.78
- hash: 31337
- file: 156.244.7.77
- hash: 11949
- file: 176.65.140.223
- hash: 8089
- file: 172.86.110.114
- hash: 443
- file: 37.252.19.120
- hash: 80
- file: 5.12.198.153
- hash: 8080
- file: 139.59.242.226
- hash: 80
- file: 185.146.232.235
- hash: 4000
- file: 13.209.225.120
- hash: 443
- url: https://2otestcawepr.run/dsap
- url: https://psearchilyo.run/gsna
- file: 172.86.110.114
- hash: 8443
- file: 18.142.54.122
- hash: 443
- file: 194.219.251.137
- hash: 995
- file: 35.239.145.98
- hash: 443
- file: 45.134.62.106
- hash: 2376
- file: 70.27.138.240
- hash: 2078
- file: 75.2.11.125
- hash: 8127
ThreatFox IOCs for 2025-05-15
Description
ThreatFox IOCs for 2025-05-15
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2025-05-15 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), network activity, and payload delivery. The data appears to be a collection of threat intelligence indicators rather than a description of a specific malware family or exploit. No affected software versions are listed, no patches are available, and no known exploits are currently observed in the wild. The threat level is rated as medium with a threatLevel metric of 2 (on an unspecified scale), analysis level of 1, and distribution level of 3, indicating moderate dissemination of these IOCs. The absence of technical details such as specific malware behavior, attack vectors, or vulnerabilities limits the depth of technical analysis. The indicators are tagged with TLP:white, suggesting they are intended for broad sharing within the community. Overall, this entry represents a threat intelligence update providing OSINT-related network activity and payload delivery indicators that could be used by security teams to detect or investigate potential malicious activity but does not describe an active or novel exploit or vulnerability.
Potential Impact
For European organizations, the impact of these IOCs depends on their integration into security monitoring and incident response processes. Since these are OSINT-based indicators related to network activity and payload delivery, they can help identify malicious communications or payloads in network traffic. The medium severity suggests a moderate risk, likely indicating that these IOCs could be associated with malware campaigns or threat actors that might target organizations indiscriminately or sector-specifically. Without specific affected products or vulnerabilities, the direct impact on confidentiality, integrity, or availability is uncertain but could involve detection of malware infections or network intrusions. Organizations lacking robust threat intelligence ingestion or network monitoring capabilities may miss early signs of compromise. Conversely, those with mature security operations can leverage these IOCs to enhance detection and reduce dwell time of threats. The lack of known exploits in the wild reduces immediate risk but does not eliminate potential future exploitation or targeted attacks using these indicators.
Mitigation Recommendations
1. Integrate the provided IOCs into existing Security Information and Event Management (SIEM) systems and threat intelligence platforms to enable automated detection and alerting on matching network activity or payload signatures. 2. Conduct regular network traffic analysis and endpoint monitoring to identify suspicious communications or payload deliveries matching these indicators. 3. Enhance collaboration with threat intelligence sharing communities to receive timely updates and context around these IOCs. 4. Implement network segmentation and strict egress filtering to limit the impact of potential payload delivery and lateral movement. 5. Train security analysts to interpret OSINT-based indicators and correlate them with internal telemetry for effective incident response. 6. Maintain up-to-date endpoint protection and network security controls to reduce the risk of successful payload execution, even if specific patches are unavailable. 7. Continuously review and update detection rules based on evolving threat intelligence to adapt to changes in attacker tactics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- f50b8cca-387f-4f85-9417-4d0b7524c63f
- Original Timestamp
- 1747353786
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainsaxecocnak.live | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainemphatakpn.bet | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlaminaflbx.shop | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainbrandenfrancseet.sbs | Unknown Loader payload delivery domain (confidence level: 100%) | |
domainfmovies123.top | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainndgpt.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzdqdc.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainec2-54-183-101-23.us-west-1.compute.amazonaws.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainflowergrandeseen.sbs | Unknown Loader payload delivery domain (confidence level: 100%) | |
domainconsole24.online | Unknown Loader payload delivery domain (confidence level: 100%) | |
domaindvwct.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainmahsa2283qt9.mahsaaminivpn.com | Hook botnet C2 domain (confidence level: 100%) | |
domainwebpanel.elementfx.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainecs-113-44-39-1.compute.hwclouds-dns.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainsilver-map.gl.at.ply.gg | Remcos botnet C2 domain (confidence level: 50%) | |
domainfrederichoms.com | FAKEUPDATES payload delivery domain (confidence level: 50%) | |
domaintool.municipiodechepo.org | Unknown malware botnet C2 domain (confidence level: 50%) | |
domainapi.incapdns.kz | Unknown malware botnet C2 domain (confidence level: 50%) | |
domainblog.jasonlees.com | Unknown malware botnet C2 domain (confidence level: 50%) | |
domainreport.monicabellucci.kz | Unknown malware botnet C2 domain (confidence level: 50%) | |
domaindeveloper.master.org.kz | Unknown malware botnet C2 domain (confidence level: 50%) | |
domaincast.voxcdn.kz | Unknown malware botnet C2 domain (confidence level: 50%) | |
domainhost.moresecurity.kz | Unknown malware botnet C2 domain (confidence level: 50%) | |
domainryanberardi.com | Unknown malware botnet C2 domain (confidence level: 50%) | |
domainonlinemail.kz | Unknown malware botnet C2 domain (confidence level: 50%) | |
domaincontactlistsagregator.com | Unknown malware botnet C2 domain (confidence level: 50%) | |
domainblameaowi.run | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainchangenwg.run | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainflamingof.run | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainbootplate.info | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainsistertable.xyz | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domain16.16.4t.com | Vidar botnet C2 domain (confidence level: 100%) | |
domainanna-akhmatova.com | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainjerusd.digital | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaingolconz.digital | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincladwybn.digital | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainou.qymj.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainfanclubsemantics.sbs | Unknown Loader payload delivery domain (confidence level: 100%) | |
domainaneesh-technomakest.duckdns.org | Remcos botnet C2 domain (confidence level: 50%) | |
domainaneesh-technomakestbk.duckdns.org | Remcos botnet C2 domain (confidence level: 50%) | |
domainwss.telegrma.app | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainstealer.cy | Unknown Stealer payload delivery domain (confidence level: 50%) | |
domainwww.rivercitymech.biz | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domainawndsjkduiukekwltdadjwadawds.ru | Unknown Stealer botnet C2 domain (confidence level: 50%) | |
domainpentagonstealer.ru | Unknown Stealer botnet C2 domain (confidence level: 50%) | |
domainpentagon.cy | Unknown Stealer botnet C2 domain (confidence level: 50%) | |
domaintestwebsite01-70h.pages.dev | Unknown Stealer botnet C2 domain (confidence level: 50%) | |
domainbadgervolleyball.org | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainqv.gahq.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain8r.czlw.ru | ClearFake payload delivery domain (confidence level: 100%) |
File
| Value | Description | Copy |
|---|---|---|
file47.96.114.159 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file159.65.9.106 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.115.202.126 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file205.198.88.140 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.100.76.142 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file134.175.229.167 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file196.251.85.128 | Remcos botnet C2 server (confidence level: 100%) | |
file172.111.244.102 | Remcos botnet C2 server (confidence level: 100%) | |
file3.17.164.16 | Sliver botnet C2 server (confidence level: 100%) | |
file8.218.254.239 | Unknown malware botnet C2 server (confidence level: 100%) | |
file186.169.82.245 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file3.215.185.215 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.141.84.229 | SectopRAT botnet C2 server (confidence level: 100%) | |
file206.206.126.216 | Hook botnet C2 server (confidence level: 100%) | |
file37.252.19.120 | Havoc botnet C2 server (confidence level: 100%) | |
file194.195.251.227 | Unknown malware botnet C2 server (confidence level: 100%) | |
file182.16.26.210 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file193.124.41.54 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file175.27.250.248 | Unknown malware botnet C2 server (confidence level: 100%) | |
file128.90.106.147 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file128.90.113.220 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file196.251.116.59 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file196.251.116.59 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file54.36.114.72 | Unknown malware botnet C2 server (confidence level: 100%) | |
file35.227.3.131 | Unknown malware botnet C2 server (confidence level: 100%) | |
file156.208.9.253 | DCRat botnet C2 server (confidence level: 100%) | |
file217.18.210.142 | DCRat botnet C2 server (confidence level: 100%) | |
file80.74.28.101 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.249.244.192 | Unknown malware botnet C2 server (confidence level: 100%) | |
file5.129.200.87 | Unknown malware botnet C2 server (confidence level: 100%) | |
file49.12.113.198 | Unknown malware botnet C2 server (confidence level: 100%) | |
file132.220.9.187 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.141.207.185 | Unknown malware botnet C2 server (confidence level: 100%) | |
file209.74.83.112 | Unknown malware botnet C2 server (confidence level: 100%) | |
file134.199.174.247 | Unknown malware botnet C2 server (confidence level: 100%) | |
file191.252.214.71 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.93.255.12 | Unknown malware botnet C2 server (confidence level: 100%) | |
file172.189.165.37 | Unknown malware botnet C2 server (confidence level: 100%) | |
file147.135.75.234 | Unknown malware botnet C2 server (confidence level: 100%) | |
file203.177.95.83 | Unknown malware botnet C2 server (confidence level: 100%) | |
file194.206.75.137 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.181.8.193 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.51.128.227 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.51.246.31 | Unknown malware botnet C2 server (confidence level: 100%) | |
file4.180.175.67 | Unknown malware botnet C2 server (confidence level: 100%) | |
file172.190.97.151 | Unknown malware botnet C2 server (confidence level: 100%) | |
file52.29.87.239 | Unknown malware botnet C2 server (confidence level: 100%) | |
file52.29.87.239 | Unknown malware botnet C2 server (confidence level: 100%) | |
file46.36.41.35 | Unknown malware botnet C2 server (confidence level: 100%) | |
file35.182.126.131 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file45.66.248.239 | Latrodectus botnet C2 server (confidence level: 90%) | |
file8.134.70.73 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file113.45.137.206 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file212.162.155.38 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file139.9.197.63 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file18.167.69.145 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.92.142.110 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file66.181.36.218 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.133.180.138 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file216.9.224.158 | Remcos botnet C2 server (confidence level: 75%) | |
file216.9.224.158 | Remcos botnet C2 server (confidence level: 75%) | |
file166.88.182.216 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
file78.47.78.115 | Vidar botnet C2 server (confidence level: 100%) | |
file49.12.106.231 | Vidar botnet C2 server (confidence level: 100%) | |
file156.238.233.94 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file193.43.91.117 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.70.25.169 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file198.55.102.43 | Remcos botnet C2 server (confidence level: 100%) | |
file172.94.9.180 | Remcos botnet C2 server (confidence level: 100%) | |
file120.55.126.188 | Sliver botnet C2 server (confidence level: 100%) | |
file121.127.33.197 | Unknown malware botnet C2 server (confidence level: 100%) | |
file172.81.135.7 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file23.145.40.108 | Unknown malware botnet C2 server (confidence level: 100%) | |
file192.227.209.49 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.128.228.209 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file47.128.228.209 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file45.150.34.16 | MooBot botnet C2 server (confidence level: 100%) | |
file111.230.6.33 | Unknown malware botnet C2 server (confidence level: 100%) | |
file192.227.128.8 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file143.198.86.20 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file205.185.122.202 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file81.69.17.187 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.92.218.188 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file101.126.136.95 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file34.237.228.97 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file106.225.242.93 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file164.90.170.149 | Havoc botnet C2 server (confidence level: 75%) | |
file191.112.19.228 | QakBot botnet C2 server (confidence level: 75%) | |
file44.197.118.25 | Havoc botnet C2 server (confidence level: 75%) | |
file70.27.138.240 | QakBot botnet C2 server (confidence level: 75%) | |
file112.121.172.10 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file206.238.115.155 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file206.238.115.155 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file156.243.1.71 | Meterpreter botnet C2 server (confidence level: 75%) | |
file54.90.144.239 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file148.113.214.176 | Remcos botnet C2 server (confidence level: 50%) | |
file191.96.39.104 | Remcos botnet C2 server (confidence level: 50%) | |
file47.109.177.97 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.153.206.206 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file1.15.174.189 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.92.15.53 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.178.189.206 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file118.178.188.203 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file120.27.197.246 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file51.89.204.11 | Remcos botnet C2 server (confidence level: 100%) | |
file142.171.3.163 | Unknown malware botnet C2 server (confidence level: 100%) | |
file128.90.106.147 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file144.172.104.135 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file196.251.116.59 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file196.251.116.59 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file3.226.74.199 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.148.218.89 | Havoc botnet C2 server (confidence level: 100%) | |
file20.67.242.112 | Havoc botnet C2 server (confidence level: 100%) | |
file47.121.30.118 | Vshell botnet C2 server (confidence level: 100%) | |
file120.70.25.169 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file104.223.123.147 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file134.175.229.167 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file85.239.52.195 | Latrodectus botnet C2 server (confidence level: 90%) | |
file45.86.230.235 | Latrodectus botnet C2 server (confidence level: 90%) | |
file141.98.6.13 | Hook botnet C2 server (confidence level: 100%) | |
file159.89.17.182 | Havoc botnet C2 server (confidence level: 100%) | |
file47.128.236.179 | MimiKatz botnet C2 server (confidence level: 100%) | |
file185.222.57.92 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file60.204.169.16 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file119.28.116.34 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file179.12.116.83 | Remcos botnet C2 server (confidence level: 100%) | |
file103.79.76.40 | pupy botnet C2 server (confidence level: 100%) | |
file5.35.125.78 | Sliver botnet C2 server (confidence level: 100%) | |
file5.35.125.78 | Sliver botnet C2 server (confidence level: 100%) | |
file156.244.7.77 | Unknown malware botnet C2 server (confidence level: 100%) | |
file176.65.140.223 | Hook botnet C2 server (confidence level: 100%) | |
file172.86.110.114 | Havoc botnet C2 server (confidence level: 100%) | |
file37.252.19.120 | Havoc botnet C2 server (confidence level: 100%) | |
file5.12.198.153 | Orcus RAT botnet C2 server (confidence level: 100%) | |
file139.59.242.226 | MooBot botnet C2 server (confidence level: 100%) | |
file185.146.232.235 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.209.225.120 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file172.86.110.114 | Havoc botnet C2 server (confidence level: 75%) | |
file18.142.54.122 | BianLian botnet C2 server (confidence level: 75%) | |
file194.219.251.137 | QakBot botnet C2 server (confidence level: 75%) | |
file35.239.145.98 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file45.134.62.106 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file70.27.138.240 | QakBot botnet C2 server (confidence level: 75%) | |
file75.2.11.125 | DeimosC2 botnet C2 server (confidence level: 75%) |
Hash
| Value | Description | Copy |
|---|---|---|
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9998 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8086 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9090 | Remcos botnet C2 server (confidence level: 100%) | |
hash37830 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9999 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash15647 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash8082 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash4000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash56105 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash2000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash2222 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7777 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash3001 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4445 | DCRat botnet C2 server (confidence level: 100%) | |
hash1995 | DCRat botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3434 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9876 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash833 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 90%) | |
hashbf3b43f5e4398ac810f005200519e096349b2237587d920d3c9b83525bb6bafc | DarkCloud Stealer payload (confidence level: 50%) | |
hash9940de30f3930cf0d0e9e9c8769148594240d11242fcd6c9dd9e9f572f68ac01 | DarkCloud Stealer payload (confidence level: 50%) | |
hash30738450f69c3de74971368192a4a647e4ed9c658f076459e42683b110baf371 | DarkCloud Stealer payload (confidence level: 50%) | |
hash1269c968258999930b573682699fe72de72d96401e3beb314ae91baf0e0e49e8 | DarkCloud Stealer payload (confidence level: 50%) | |
hash7777 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1234 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash6432 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash13403 | Remcos botnet C2 server (confidence level: 75%) | |
hash13404 | Remcos botnet C2 server (confidence level: 75%) | |
hash443 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash1962 | Remcos botnet C2 server (confidence level: 100%) | |
hash8443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3260 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8010 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash2082 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8000 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8000 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4506 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash8000 | Havoc botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash4ebd79e8935076a7916e19650f98cc8c20aef4fb5c9da57807b472ee012d6d8c | Lumma Stealer payload (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 75%) | |
hash2222 | QakBot botnet C2 server (confidence level: 75%) | |
hash6666 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash443 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash11112 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash4090 | Remcos botnet C2 server (confidence level: 50%) | |
hash23083 | Remcos botnet C2 server (confidence level: 50%) | |
hash88 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8896 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash81 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash64387 | Remcos botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash222 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash888 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash8082 | Vshell botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash10002 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 90%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 90%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash55615 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash8444 | pupy botnet C2 server (confidence level: 100%) | |
hash8443 | Sliver botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash11949 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8089 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | Havoc botnet C2 server (confidence level: 100%) | |
hash8080 | Orcus RAT botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash4000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash8443 | Havoc botnet C2 server (confidence level: 75%) | |
hash443 | BianLian botnet C2 server (confidence level: 75%) | |
hash995 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash2376 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash2078 | QakBot botnet C2 server (confidence level: 75%) | |
hash8127 | DeimosC2 botnet C2 server (confidence level: 75%) |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://fmovies123.top/fix/select.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://fmovies123.top/fix/his.php | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://probuildgroupusa.com/xsxs.zip | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttp://ck92448.tw1.ru/5d8ad51b.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://7lancery.digital/goj | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://files.catbox.moe/olyfi3.001 | DarkCloud Stealer payload delivery URL (confidence level: 50%) | |
urlhttp://206.206.126.216/ | Hook botnet C2 (confidence level: 50%) | |
urlhttps://onedrive.live.com/download?cid=74f1199a49c3215b&resid=74f1199a49c3215b%21122&authkey=aagy326uc3bhn_ks | Unknown Loader payload delivery URL (confidence level: 50%) | |
urlhttp://crackarithmetic.icu/glo.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttps://mflowerexju.bet/lanz | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://nposseswsnc.top/akds | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://ycornerdurv.top/adwq | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://4featurlyin.top/pdal | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://demphatakpn.bet/ladk | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://o9cornerdurv.top/adwq | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://ylaminaflbx.shop/twoq | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://raraucahkbm.live/baneb | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://wfeaturlyin.top/pdal | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://steamcommunity.com/profiles/76561199855598339 | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://t.me/eom25h | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://16.16.4t.com/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://49.12.106.231/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://pub-d4469a7a24f7423989c5026116ada945.r2.dev/vpncmgr.exe | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://12.innospark.cloud/vpnmcg.txt | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://eqcobwuxr.digital/mnf | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://7meteorplyp.live/lekp | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://milkwevvmw.run/gakz | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://winterpwthc.digital/juab | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://a0651821.xsph.ru/multiasync.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://anna-akhmatova.com/login | Lumma Stealer botnet C2 (confidence level: 50%) | |
urlhttps://lovingcaredisabilityservices.com.au/up/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://ch1.s3.fr-par.scw.cloud/two-factor-auth-challenge-next-v6b7.html | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttps://payment-verify.com/ | Unknown malware payload delivery URL (confidence level: 50%) | |
urlhttp://103.171.35.26:9443/dot.gif | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttps://stealer.cy | Unknown Stealer botnet C2 (confidence level: 50%) | |
urlhttps://16testcawepr.run/dsap | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://6laminaflbx.shop/twoq | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://www.rivercitymech.biz/profilelayout | FAKEUPDATES botnet C2 (confidence level: 100%) | |
urlhttps://8jugulagklc.live/roek | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://jemphatakpn.bet/ladk | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://zsaxecocnak.live/manj | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://chiasmymnb.live/godk | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://regopramide.top/lav/xf_addon.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://regopramide.top/lav/select.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://regopramide.top/lav/lll.php | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://badgervolleyball.org/fsos.zip | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://qfeaturlyin.top/pdal | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://77.246.158.103/securetrafficpublic.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://8r.czlw.ru/2f5a9e85-ee81-41df-8f15-e83a4ffac6c2 | ClearFake payload delivery URL (confidence level: 50%) | |
urlhttps://2otestcawepr.run/dsap | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://psearchilyo.run/gsna | Lumma Stealer botnet C2 (confidence level: 75%) |
Threat ID: 68367c97182aa0cae231d120
Added to database: 5/28/2025, 3:01:43 AM
Last enriched: 6/27/2025, 11:06:17 AM
Last updated: 11/20/2025, 8:28:00 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
MediumNew Eternidade Stealer Spreads Via WhatsApp to Steal Banking and Crypto Data
MediumNew Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
MediumThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves
MediumEternidade Stealer: WhatsApp Hijacking for Banking Fraud
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.