ThreatFox IOCs for 2025-06-10
ThreatFox IOCs for 2025-06-10
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on June 10, 2025, by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data appears to be a collection of threat intelligence indicators rather than a description of a specific malware variant or vulnerability. There are no affected product versions listed, no known exploits in the wild, and no patches available, indicating this is likely an intelligence update rather than a newly discovered vulnerability or active exploit. The threat level is rated as medium with a threatLevel score of 2, analysis score of 1, and distribution score of 3, suggesting moderate concern but limited immediate impact or exploitation. The absence of concrete technical details such as attack vectors, payload specifics, or exploitation methods limits the ability to provide a detailed technical breakdown. The focus on OSINT and network activity implies that these IOCs are intended to aid in detection and monitoring of potential malicious activity related to payload delivery mechanisms, possibly through network traffic analysis or forensic investigations. The lack of CWEs and patch information further supports that this is intelligence data rather than a vulnerability requiring remediation. Overall, this entry serves as a situational awareness update for security teams to incorporate into their detection and response workflows rather than an active threat demanding immediate mitigation.
Potential Impact
For European organizations, the impact of this threat intelligence update is primarily in enhancing situational awareness and improving detection capabilities against potential malware payload delivery and network-based attacks. Since no active exploits or vulnerabilities are identified, the direct risk to confidentiality, integrity, or availability is limited at this stage. However, failure to integrate these IOCs into security monitoring tools could result in missed detection opportunities, allowing adversaries to operate undetected. Organizations with mature security operations centers (SOCs) and threat hunting teams can leverage this intelligence to fine-tune network monitoring, intrusion detection systems, and endpoint detection and response (EDR) solutions. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in sectors with high-value targets or sensitive data. European entities involved in critical infrastructure, finance, or government may benefit most from incorporating these IOCs to preemptively identify suspicious activity related to payload delivery attempts or network intrusions.
Mitigation Recommendations
1. Integrate the provided IOCs into existing security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) platforms to enhance detection capabilities. 2. Conduct regular threat hunting exercises using these IOCs to identify any signs of compromise or suspicious network activity. 3. Maintain updated network segmentation and strict access controls to limit the potential spread of malware payloads if detected. 4. Employ network traffic analysis tools to monitor for anomalous payload delivery patterns or unusual network communications that match the IOC profiles. 5. Ensure that incident response teams are aware of this intelligence update and prepared to investigate alerts triggered by these indicators. 6. Collaborate with information sharing and analysis centers (ISACs) relevant to the organization's sector to exchange additional context and updates related to these IOCs. 7. Since no patches are available, focus on detection and containment strategies rather than remediation of a vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- url: https://ncmtraders.com/3s7j.js
- domain: ncmtraders.com
- url: https://ncmtraders.com/js.php
- url: http://a82523.top/12
- domain: a82523.top
- url: https://a82523.top/zfyg.h
- domain: security.garsecflae.com
- domain: losaz.com
- url: https://losaz.com/flare.msi
- url: https://841932-tmo.com/
- url: https://841932-verizion.com/
- url: https://841932-spectrumwireless.com/
- url: https://cetus-zone.network/
- url: https://841932-sasktels.com/
- url: https://841932-comcast.com/
- url: https://app-axiom.trade/
- url: https://894721-att.com/
- url: https://panel-comcast.com/
- url: https://cloud891.com/
- url: https://panel-spectrum.net/
- url: https://spectrum-ticket.net/
- domain: cloudproc.net
- domain: cf-verifi.pages.dev
- file: 183.6.20.32
- hash: 443
- file: 120.25.121.197
- hash: 443
- file: 111.229.121.53
- hash: 443
- file: 43.139.178.211
- hash: 443
- file: 156.238.230.57
- hash: 443
- file: 111.230.8.147
- hash: 443
- file: 45.155.220.44
- hash: 443
- file: 139.224.103.84
- hash: 443
- domain: 841932-tmo.com
- domain: 841932-verizion.com
- domain: 841932-spectrumwireless.com
- domain: cetus-zone.network
- domain: 841932-sasktels.com
- domain: 841932-comcast.com
- domain: app-axiom.trade
- domain: 894721-att.com
- domain: panel-comcast.com
- domain: cloud891.com
- domain: panel-spectrum.net
- domain: spectrum-ticket.net
- domain: pahther-confins.com
- domain: extraanet-groups.com
- domain: reviewe-statusofpay.com
- domain: partnet72k23id.com
- domain: reservhub764574.com
- domain: rsvn-extrnt.com
- domain: parthera-ruelsd.com
- domain: proccess-extranet.com
- domain: status-confirmedpay.com
- domain: rewiewqproperty.com
- domain: guestalerthelp.com
- url: https://pahther-confins.com
- url: https://extraanet-groups.com/
- url: https://reviewe-statusofpay.com/
- url: https://partnet72k23id.com/
- url: https://reservhub764574.com/
- url: https://rsvn-extrnt.com/
- url: https://parthera-ruelsd.com/
- url: https://proccess-extranet.com/
- url: https://status-confirmedpay.com/
- url: https://rewiewqproperty.com/
- url: https://guestalerthelp.com/
- url: https://financementure.com/
- url: https://macosxapp.com/
- url: https://macosapp-apple.com/
- domain: financementure.com
- domain: appmacosx.com
- domain: macosxapp.com
- domain: macosapp-apple.com
- file: 154.37.213.233
- hash: 80
- file: 50.16.129.49
- hash: 443
- domain: b9c17ffc.host.njalla.net
- file: 104.243.35.242
- hash: 8000
- file: 16.24.67.226
- hash: 16423
- file: 193.233.113.0
- hash: 8080
- file: 144.172.112.27
- hash: 80
- domain: s16.service-tiktok.cam
- file: 35.87.129.75
- hash: 443
- file: 23.227.203.190
- hash: 43211
- file: 185.244.29.181
- hash: 1604
- domain: 38y1qea3nzt8e.cfc-execute.bj.baidubce.com
- domain: api.cdn-zoom-cloudflare.live
- file: 154.90.49.202
- hash: 443
- file: 92.65.104.212
- hash: 80
- url: https://downloadfreak.top/lg/index.js
- domain: downloadfreak.top
- url: https://jazzcafeposk.org//headis.php
- url: https://jazzcafeposk.org/wp-content/zswsstws.zip
- domain: jazzcafeposk.org
- domain: msfed.optimumcs.org
- domain: id.optimumcs.org
- domain: cloud.optimumcs.org
- file: 64.176.59.40
- hash: 8888
- file: 182.254.228.115
- hash: 443
- file: 111.124.203.18
- hash: 8080
- file: 102.32.83.117
- hash: 3390
- file: 154.223.21.162
- hash: 43211
- file: 54.175.156.40
- hash: 443
- file: 78.161.6.158
- hash: 888
- file: 45.141.215.201
- hash: 8808
- file: 124.198.132.30
- hash: 6606
- file: 128.90.113.229
- hash: 4000
- file: 35.188.91.172
- hash: 80
- file: 35.244.101.227
- hash: 4443
- file: 18.116.195.248
- hash: 443
- file: 45.207.207.222
- hash: 808
- file: 154.9.253.92
- hash: 60000
- file: 37.9.170.224
- hash: 3333
- file: 3.1.126.171
- hash: 443
- file: 34.241.32.238
- hash: 443
- file: 42.193.239.63
- hash: 3333
- file: 93.99.225.116
- hash: 3333
- file: 200.187.67.103
- hash: 3333
- file: 172.104.17.210
- hash: 3333
- file: 43.139.236.87
- hash: 8080
- file: 181.32.55.63
- hash: 8080
- file: 49.233.251.158
- hash: 2222
- file: 65.2.30.8
- hash: 9146
- file: 15.207.106.110
- hash: 860
- file: 35.178.181.119
- hash: 6362
- file: 198.55.98.4
- hash: 1911
- file: 45.153.34.171
- hash: 19000
- domain: afdprox.icu
- file: 101.226.8.163
- hash: 1521
- file: 52.70.128.50
- hash: 443
- file: 43.100.93.39
- hash: 31337
- file: 13.221.115.68
- hash: 8126
- file: 27.102.138.222
- hash: 443
- url: http://1.117.77.166:8888/supershell/login/
- url: http://67.205.163.232:8080/
- url: http://217.119.129.92/
- file: 196.251.80.13
- hash: 7777
- url: http://avangardecity.ro/dstu_bkxchuyze125.bin
- url: https://drive.google.com/uc?export=download&id=1zs8dtti5_wmj-76xq2wmobnkdizyljak
- domain: dooom.ddns.net
- domain: shortenskinne.top
- domain: nowqx.xyz
- domain: swenku.xyz
- domain: exodhr.xyz
- domain: britnuq.xyz
- domain: dolmxn.xyz
- domain: downbmn.xyz
- domain: fecymm.xyz
- domain: heryam.xyz
- domain: boxmc.xyz
- domain: depjjda.xyz
- file: 176.46.157.24
- hash: 7777
- file: 185.156.72.59
- hash: 7777
- file: 176.65.144.169
- hash: 7702
- domain: mxcnss.dns04.com
- url: http://co22720.tw1.ru/0d81958a.php
- url: http://a1104725.xsph.ru/l1nc0in.php
- url: https://17.0.4t.com/
- url: https://31.0.4t.com/
- file: 159.69.100.234
- hash: 443
- domain: 17.0.4t.com
- domain: 31.0.4t.com
- file: 101.201.153.90
- hash: 443
- file: 156.238.233.76
- hash: 808
- file: 34.71.157.217
- hash: 443
- file: 198.135.50.90
- hash: 17241
- file: 192.142.0.51
- hash: 8808
- domain: registry.gitlab.paps.pro
- file: 54.221.20.76
- hash: 1995
- file: 209.141.39.243
- hash: 80
- file: 144.172.103.74
- hash: 4443
- file: 156.238.233.76
- hash: 8888
- file: 185.158.249.231
- hash: 8080
- file: 176.65.143.144
- hash: 5200
- file: 154.223.21.162
- hash: 8888
- file: 188.49.91.110
- hash: 995
- hash: 452cd18570471e80dd6bf34addede334
- hash: d5a3766e744a563278b18267d6bd7113
- hash: c763ecf315481525afcd47c5f32c1fd7
- hash: 68fbe197c62a3777d2299f9eabed2c70
- hash: 43e4260c595b20e357be75c0c1fbec29
- hash: d24c797f94933a3ec5227a6f57e15358
- hash: c8c21b4642f12c28f6e5e0389bbf8c36
- hash: e429ebfbc827ac8a865dce20470d3e8b
- hash: fe7bb6d0835879043e4b9fef7fa59375
- hash: 1a17955be2f99813c03d9f4970131593
- hash: 2d9fb9303512a6b6e9a67c4d956a0e07
- url: https://drive.google.com/uc?export=download&id=1zrembuude-f2zlwweo2fniku7i7v7ase
- url: https://drive.google.com/uc?export=download&id=1mjb0yafvutrefafkapypajdrmhso_fp-
- url: https://drive.google.com/uc?export=download&id=1ptsxcizbyamtpv9qvdayrvv87o0nf0ml
- url: https://drive.google.com/uc?export=download&id=1s8vj_ix5k-hspwaiwyjmd6trclwytzqi
- url: https://drive.google.com/uc?export=download&id=1hxrn-aqlvepenhkjldw-cj6uuz1sniwr
- url: https://drive.usercontent.google.com/download?id=1iyptg9y_j2buutiimtn0bmhgyu3zrm6n
- url: https://drive.google.com/uc?export=download&id=1mzqe1kio6q5ei2cq0o8dgwhxgvizzbm4
- url: https://drive.google.com/uc?export=download&id=1kk45pyzbf5cf6ho_iw0mmmpzueiy4fr7
- url: https://saadac3.accesscam.org/meshagents?id=jev2ywgy8a5qg5mkayrgqgvzlpxkeceybgdya2nkwch8vioarsqtv3cbsshbfnb4&installfl
- url: https://saadac2.mywire.org/meshagents?script=1
- url: https://drive.usercontent.google.com/download?id=1tqpzjwvrirb5u_v9nnjhpyc53hytd4qu&export=download&authuser=0&confirm=t&uuid=cd9cfd85-7c03-477a-9fb0-4ad21f57&at=aez70l609i4dmbunvtllppytmqa-%3a1742974814202
- url: http://46.202.153.236/cookies-handler.php
- url: https://plkensnaije.top/api
- url: https://localtonet.com/api
- url: http://ck68098.tw1.ru/c9ba8cc0.php
- file: 172.96.137.157
- hash: 443
- url: https://1sou.top/lgs/track_is.js
- domain: 1sou.top
- url: https://1sou.top/lgs/index.js
- url: https://apex-consultant.com/head.php
- url: https://apex-consultant.com/fswsmwis.zip
- domain: apex-consultant.com
- file: 193.161.193.99
- hash: 20375
- file: 193.233.254.54
- hash: 5555
- file: 5.252.155.14
- hash: 443
- domain: uzlehalo.duckdns.org
- file: 185.167.61.79
- hash: 3933
- file: 101.43.127.152
- hash: 443
- file: 1.94.172.68
- hash: 443
- file: 154.89.152.16
- hash: 82
- file: 103.140.186.173
- hash: 443
- file: 77.83.207.163
- hash: 5001
- file: 79.55.104.179
- hash: 2404
- file: 3.92.24.26
- hash: 443
- file: 15.161.185.204
- hash: 443
- file: 184.73.148.10
- hash: 8000
- file: 145.223.68.184
- hash: 80
- file: 45.77.255.25
- hash: 443
- file: 23.26.108.141
- hash: 8808
- file: 78.161.6.158
- hash: 222
- file: 128.90.113.229
- hash: 2000
- file: 128.90.113.229
- hash: 2021
- file: 144.202.26.74
- hash: 7443
- file: 172.111.131.228
- hash: 4443
- file: 94.156.189.233
- hash: 443
- file: 173.249.29.108
- hash: 8000
- file: 51.17.42.240
- hash: 20845
- file: 192.3.95.227
- hash: 11409
- file: 194.190.152.62
- hash: 443
- file: 167.88.168.160
- hash: 8443
- file: 94.26.90.65
- hash: 443
- url: https://t.me/akamambadada
- url: https://quokkauy.live/aoidu
- url: https://scooyp.run/znba/api
- url: https://lenienhywi.run/xlal
- url: https://anteceflwq.live/tauq
- url: https://cnjxok.run/zpql/api
- url: https://disstqr.run/xlad
- url: https://citywo.live/tequ/api
- url: https://intelhube.live/api
- url: https://s1gn1fyh0se.cyou/api
- url: https://invertdbdi.top/xjit
- url: https://abubhj.digital/nbf/api
- url: https://digitaldreams101.top/api
- domain: venecia.club
- file: 31.42.177.160
- hash: 443
- file: 5.8.11.114
- hash: 443
- file: 91.92.247.116
- hash: 443
- file: 89.185.80.189
- hash: 443
- file: 77.91.76.17
- hash: 443
- file: 154.216.19.169
- hash: 443
- file: 80.76.49.166
- hash: 443
- file: 185.122.171.132
- hash: 443
- file: 87.121.221.124
- hash: 443
- file: 77.221.149.162
- hash: 443
- file: 45.156.25.118
- hash: 443
- file: 85.192.42.115
- hash: 443
- file: 196.251.86.101
- hash: 443
- file: 185.150.24.103
- hash: 443
- file: 196.251.87.252
- hash: 443
- file: 45.134.173.86
- hash: 443
- file: 77.239.99.248
- hash: 443
- file: 62.60.226.158
- hash: 443
- file: 91.92.244.118
- hash: 443
- file: 196.251.86.102
- hash: 443
- file: 188.124.59.28
- hash: 443
- file: 149.28.127.237
- hash: 443
- file: 77.239.101.139
- hash: 443
- domain: zzylos.ddns.net
- domain: crazydns.bumbleshrimp.com
- domain: xeilodaa-38185.portmap.io
- url: http://46.175.147.105/9f36e6c137704dc0.php
- file: 87.121.84.50
- hash: 38361
- file: 86.54.42.125
- hash: 38242
- url: https://dev.couplesparks.com/ajaxaction
- domain: dev.couplesparks.com
- domain: date-enclosed.gl.at.ply.gg
- domain: huge-description.gl.at.ply.gg
- domain: auto-london.gl.at.ply.gg
- url: https://advertipros.com//?u=script
- domain: advertipros.com
- url: http://93.123.84.204/universaleternaltest/sqlexternal7/5/low/1cdnhttp/cpu/requestprocesscpuphp/trackgamelongpolldle/0temporarylinux/1phpdatalifevideo/5/api/7/privatedlelinepoll/securetouniversaltraffic/localjslongpolldle/requestupdate/1/tempapicentral/uploadspoll/processauthasyncwppublictempcdndownloads.php
- file: 167.88.186.143
- hash: 443
- file: 20.41.73.175
- hash: 8080
- file: 8.155.0.238
- hash: 443
- file: 43.136.118.94
- hash: 8906
- file: 94.131.111.131
- hash: 2405
- file: 3.89.72.140
- hash: 443
- file: 101.201.174.160
- hash: 8888
- file: 196.251.88.18
- hash: 8808
- file: 193.26.115.210
- hash: 3000
- file: 124.198.132.30
- hash: 7707
- file: 128.90.113.229
- hash: 1018
- file: 23.26.108.141
- hash: 6606
- file: 46.101.83.145
- hash: 443
- file: 95.111.221.102
- hash: 7443
- file: 154.29.148.19
- hash: 443
- file: 8.153.205.30
- hash: 1234
- file: 185.193.127.252
- hash: 443
- file: 16.51.153.12
- hash: 18246
- file: 45.207.207.195
- hash: 808
- file: 62.109.28.147
- hash: 1337
- domain: cjfrde8g2386q.cfc-execute.bj.baidubce.com
- url: http://merilcraft.ru/polllowsql.php
- file: 144.172.104.222
- hash: 80
- file: 111.230.99.190
- hash: 80
- file: 111.230.99.190
- hash: 443
- file: 129.204.24.135
- hash: 80
- file: 94.237.96.182
- hash: 443
- file: 144.172.116.93
- hash: 443
- file: 89.22.161.133
- hash: 53835
- file: 78.161.6.158
- hash: 8808
- file: 92.118.56.54
- hash: 5552
- file: 18.223.88.214
- hash: 443
- file: 31.57.219.133
- hash: 5938
- file: 196.251.118.72
- hash: 4444
- file: 207.180.231.197
- hash: 443
- file: 62.60.226.193
- hash: 19000
- domain: labina.work.gd
- file: 110.54.136.143
- hash: 4782
- file: 193.233.237.189
- hash: 6775
- file: 196.251.117.107
- hash: 1602
- file: 37.120.156.182
- hash: 2829
- file: 45.146.81.147
- hash: 5552
- file: 170.130.55.107
- hash: 443
- file: 185.161.208.83
- hash: 2829
- domain: mylol-28375.portmap.io
- file: 188.49.91.110
- hash: 443
- domain: microsoftdatacenter-57447.portmap.io
- file: 64.23.129.58
- hash: 49644
- file: 88.232.103.158
- hash: 443
- file: 94.99.34.46
- hash: 443
- domain: ns1.stack-drive.com
- domain: ns2.stack-drive.com
- file: 47.91.78.252
- hash: 53
- domain: tao081018.ddnsfree.com
- file: 193.68.89.191
- hash: 8848
- file: 196.251.72.191
- hash: 5001
- domain: 7d5gec7hyer83.cfc-execute.gz.baidubce.com
- domain: a89kswn22cnkn.cfc-execute.bj.baidubce.com
- domain: e6y14fa81bd39.cfc-execute.bj.baidubce.com
- domain: fa5jcmr0dn2m9.cfc-execute.su.baidubce.com
- file: 106.12.174.164
- hash: 443
- file: 106.12.174.164
- hash: 80
- file: 113.45.175.15
- hash: 80
- file: 124.221.64.229
- hash: 1443
ThreatFox IOCs for 2025-06-10
Description
ThreatFox IOCs for 2025-06-10
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on June 10, 2025, by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data appears to be a collection of threat intelligence indicators rather than a description of a specific malware variant or vulnerability. There are no affected product versions listed, no known exploits in the wild, and no patches available, indicating this is likely an intelligence update rather than a newly discovered vulnerability or active exploit. The threat level is rated as medium with a threatLevel score of 2, analysis score of 1, and distribution score of 3, suggesting moderate concern but limited immediate impact or exploitation. The absence of concrete technical details such as attack vectors, payload specifics, or exploitation methods limits the ability to provide a detailed technical breakdown. The focus on OSINT and network activity implies that these IOCs are intended to aid in detection and monitoring of potential malicious activity related to payload delivery mechanisms, possibly through network traffic analysis or forensic investigations. The lack of CWEs and patch information further supports that this is intelligence data rather than a vulnerability requiring remediation. Overall, this entry serves as a situational awareness update for security teams to incorporate into their detection and response workflows rather than an active threat demanding immediate mitigation.
Potential Impact
For European organizations, the impact of this threat intelligence update is primarily in enhancing situational awareness and improving detection capabilities against potential malware payload delivery and network-based attacks. Since no active exploits or vulnerabilities are identified, the direct risk to confidentiality, integrity, or availability is limited at this stage. However, failure to integrate these IOCs into security monitoring tools could result in missed detection opportunities, allowing adversaries to operate undetected. Organizations with mature security operations centers (SOCs) and threat hunting teams can leverage this intelligence to fine-tune network monitoring, intrusion detection systems, and endpoint detection and response (EDR) solutions. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in sectors with high-value targets or sensitive data. European entities involved in critical infrastructure, finance, or government may benefit most from incorporating these IOCs to preemptively identify suspicious activity related to payload delivery attempts or network intrusions.
Mitigation Recommendations
1. Integrate the provided IOCs into existing security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) platforms to enhance detection capabilities. 2. Conduct regular threat hunting exercises using these IOCs to identify any signs of compromise or suspicious network activity. 3. Maintain updated network segmentation and strict access controls to limit the potential spread of malware payloads if detected. 4. Employ network traffic analysis tools to monitor for anomalous payload delivery patterns or unusual network communications that match the IOC profiles. 5. Ensure that incident response teams are aware of this intelligence update and prepared to investigate alerts triggered by these indicators. 6. Collaborate with information sharing and analysis centers (ISACs) relevant to the organization's sector to exchange additional context and updates related to these IOCs. 7. Since no patches are available, focus on detection and containment strategies rather than remediation of a vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 338d5dd5-5c96-4492-87f9-cf2f62eacbee
- Original Timestamp
- 1749600186
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttps://ncmtraders.com/3s7j.js | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://ncmtraders.com/js.php | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttp://a82523.top/12 | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://a82523.top/zfyg.h | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://losaz.com/flare.msi | Unknown malware payload delivery URL (confidence level: 100%) | |
urlhttps://841932-tmo.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://841932-verizion.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://841932-spectrumwireless.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://cetus-zone.network/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://841932-sasktels.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://841932-comcast.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://app-axiom.trade/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://894721-att.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://panel-comcast.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://cloud891.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://panel-spectrum.net/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://spectrum-ticket.net/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://pahther-confins.com | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://extraanet-groups.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://reviewe-statusofpay.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://partnet72k23id.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://reservhub764574.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://rsvn-extrnt.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://parthera-ruelsd.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://proccess-extranet.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://status-confirmedpay.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://rewiewqproperty.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://guestalerthelp.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://financementure.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://macosxapp.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://macosapp-apple.com/ | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://downloadfreak.top/lg/index.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://jazzcafeposk.org//headis.php | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://jazzcafeposk.org/wp-content/zswsstws.zip | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttp://1.117.77.166:8888/supershell/login/ | Unknown malware botnet C2 (confidence level: 50%) | |
urlhttp://67.205.163.232:8080/ | Chaos botnet C2 (confidence level: 50%) | |
urlhttp://217.119.129.92/ | Unknown Stealer botnet C2 (confidence level: 50%) | |
urlhttp://avangardecity.ro/dstu_bkxchuyze125.bin | Unknown Loader payload delivery URL (confidence level: 50%) | |
urlhttps://drive.google.com/uc?export=download&id=1zs8dtti5_wmj-76xq2wmobnkdizyljak | Unknown Loader payload delivery URL (confidence level: 50%) | |
urlhttp://co22720.tw1.ru/0d81958a.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://a1104725.xsph.ru/l1nc0in.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://17.0.4t.com/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://31.0.4t.com/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://drive.google.com/uc?export=download&id=1zrembuude-f2zlwweo2fniku7i7v7ase | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://drive.google.com/uc?export=download&id=1mjb0yafvutrefafkapypajdrmhso_fp- | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://drive.google.com/uc?export=download&id=1ptsxcizbyamtpv9qvdayrvv87o0nf0ml | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://drive.google.com/uc?export=download&id=1s8vj_ix5k-hspwaiwyjmd6trclwytzqi | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://drive.google.com/uc?export=download&id=1hxrn-aqlvepenhkjldw-cj6uuz1sniwr | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://drive.usercontent.google.com/download?id=1iyptg9y_j2buutiimtn0bmhgyu3zrm6n | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://drive.google.com/uc?export=download&id=1mzqe1kio6q5ei2cq0o8dgwhxgvizzbm4 | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://drive.google.com/uc?export=download&id=1kk45pyzbf5cf6ho_iw0mmmpzueiy4fr7 | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://saadac3.accesscam.org/meshagents?id=jev2ywgy8a5qg5mkayrgqgvzlpxkeceybgdya2nkwch8vioarsqtv3cbsshbfnb4&installfl | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://saadac2.mywire.org/meshagents?script=1 | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://drive.usercontent.google.com/download?id=1tqpzjwvrirb5u_v9nnjhpyc53hytd4qu&export=download&authuser=0&confirm=t&uuid=cd9cfd85-7c03-477a-9fb0-4ad21f57&at=aez70l609i4dmbunvtllppytmqa-%3a1742974814202 | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttp://46.202.153.236/cookies-handler.php | DISGOMOJI botnet C2 (confidence level: 100%) | |
urlhttps://plkensnaije.top/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://localtonet.com/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://ck68098.tw1.ru/c9ba8cc0.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://1sou.top/lgs/track_is.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://1sou.top/lgs/index.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://apex-consultant.com/head.php | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://apex-consultant.com/fswsmwis.zip | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://t.me/akamambadada | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://quokkauy.live/aoidu | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://scooyp.run/znba/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://lenienhywi.run/xlal | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://anteceflwq.live/tauq | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://cnjxok.run/zpql/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://disstqr.run/xlad | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://citywo.live/tequ/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://intelhube.live/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://s1gn1fyh0se.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://invertdbdi.top/xjit | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://abubhj.digital/nbf/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://digitaldreams101.top/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://46.175.147.105/9f36e6c137704dc0.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttps://dev.couplesparks.com/ajaxaction | FAKEUPDATES botnet C2 (confidence level: 100%) | |
urlhttps://advertipros.com//?u=script | Unknown Stealer payload delivery URL (confidence level: 100%) | |
urlhttp://93.123.84.204/universaleternaltest/sqlexternal7/5/low/1cdnhttp/cpu/requestprocesscpuphp/trackgamelongpolldle/0temporarylinux/1phpdatalifevideo/5/api/7/privatedlelinepoll/securetouniversaltraffic/localjslongpolldle/requestupdate/1/tempapicentral/uploadspoll/processauthasyncwppublictempcdndownloads.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://merilcraft.ru/polllowsql.php | DCRat botnet C2 (confidence level: 100%) |
Domain
Value | Description | Copy |
---|---|---|
domainncmtraders.com | KongTuke payload delivery domain (confidence level: 100%) | |
domaina82523.top | KongTuke payload delivery domain (confidence level: 100%) | |
domainsecurity.garsecflae.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainlosaz.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domaincloudproc.net | Unknown malware payload delivery domain (confidence level: 75%) | |
domaincf-verifi.pages.dev | Unknown malware payload delivery domain (confidence level: 75%) | |
domain841932-tmo.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domain841932-verizion.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domain841932-spectrumwireless.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domaincetus-zone.network | Unknown malware payload delivery domain (confidence level: 75%) | |
domain841932-sasktels.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domain841932-comcast.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainapp-axiom.trade | Unknown malware payload delivery domain (confidence level: 75%) | |
domain894721-att.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainpanel-comcast.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domaincloud891.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainpanel-spectrum.net | Unknown malware payload delivery domain (confidence level: 75%) | |
domainspectrum-ticket.net | Unknown malware payload delivery domain (confidence level: 75%) | |
domainpahther-confins.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainextraanet-groups.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainreviewe-statusofpay.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainpartnet72k23id.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainreservhub764574.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainrsvn-extrnt.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainparthera-ruelsd.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainproccess-extranet.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainstatus-confirmedpay.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainrewiewqproperty.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainguestalerthelp.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainfinancementure.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainappmacosx.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainmacosxapp.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainmacosapp-apple.com | Unknown malware payload delivery domain (confidence level: 75%) | |
domainb9c17ffc.host.njalla.net | Havoc botnet C2 domain (confidence level: 100%) | |
domains16.service-tiktok.cam | Unknown malware botnet C2 domain (confidence level: 100%) | |
domain38y1qea3nzt8e.cfc-execute.bj.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainapi.cdn-zoom-cloudflare.live | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaindownloadfreak.top | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainjazzcafeposk.org | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainmsfed.optimumcs.org | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainid.optimumcs.org | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domaincloud.optimumcs.org | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainafdprox.icu | Unknown malware botnet C2 domain (confidence level: 100%) | |
domaindooom.ddns.net | NjRAT botnet C2 domain (confidence level: 50%) | |
domainshortenskinne.top | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainnowqx.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainswenku.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainexodhr.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainbritnuq.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaindolmxn.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaindownbmn.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainfecymm.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainheryam.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainboxmc.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaindepjjda.xyz | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainmxcnss.dns04.com | PureLogs Stealer botnet C2 domain (confidence level: 80%) | |
domain17.0.4t.com | Vidar botnet C2 domain (confidence level: 100%) | |
domain31.0.4t.com | Vidar botnet C2 domain (confidence level: 100%) | |
domainregistry.gitlab.paps.pro | Havoc botnet C2 domain (confidence level: 100%) | |
domain1sou.top | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainapex-consultant.com | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainuzlehalo.duckdns.org | XWorm botnet C2 domain (confidence level: 100%) | |
domainvenecia.club | Ficker Stealer botnet C2 domain (confidence level: 100%) | |
domainzzylos.ddns.net | Quasar RAT botnet C2 domain (confidence level: 100%) | |
domaincrazydns.bumbleshrimp.com | Quasar RAT botnet C2 domain (confidence level: 100%) | |
domainxeilodaa-38185.portmap.io | Quasar RAT botnet C2 domain (confidence level: 100%) | |
domaindev.couplesparks.com | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domaindate-enclosed.gl.at.ply.gg | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainhuge-description.gl.at.ply.gg | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainauto-london.gl.at.ply.gg | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainadvertipros.com | Unknown Loader payload delivery domain (confidence level: 100%) | |
domaincjfrde8g2386q.cfc-execute.bj.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainlabina.work.gd | Quasar RAT botnet C2 domain (confidence level: 100%) | |
domainmylol-28375.portmap.io | XWorm botnet C2 domain (confidence level: 100%) | |
domainmicrosoftdatacenter-57447.portmap.io | Quasar RAT botnet C2 domain (confidence level: 100%) | |
domainns1.stack-drive.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainns2.stack-drive.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaintao081018.ddnsfree.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domain7d5gec7hyer83.cfc-execute.gz.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaina89kswn22cnkn.cfc-execute.bj.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaine6y14fa81bd39.cfc-execute.bj.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainfa5jcmr0dn2m9.cfc-execute.su.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) |
File
Value | Description | Copy |
---|---|---|
file183.6.20.32 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file120.25.121.197 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file111.229.121.53 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file43.139.178.211 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file156.238.230.57 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file111.230.8.147 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file45.155.220.44 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file139.224.103.84 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file154.37.213.233 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file50.16.129.49 | Sliver botnet C2 server (confidence level: 100%) | |
file104.243.35.242 | DCRat botnet C2 server (confidence level: 100%) | |
file16.24.67.226 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file193.233.113.0 | ERMAC botnet C2 server (confidence level: 100%) | |
file144.172.112.27 | MooBot botnet C2 server (confidence level: 100%) | |
file35.87.129.75 | Unknown malware botnet C2 server (confidence level: 100%) | |
file23.227.203.190 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file185.244.29.181 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file154.90.49.202 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file92.65.104.212 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file64.176.59.40 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file182.254.228.115 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file111.124.203.18 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file102.32.83.117 | DarkComet botnet C2 server (confidence level: 100%) | |
file154.223.21.162 | Sliver botnet C2 server (confidence level: 90%) | |
file54.175.156.40 | Sliver botnet C2 server (confidence level: 90%) | |
file78.161.6.158 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.141.215.201 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file124.198.132.30 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file128.90.113.229 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file35.188.91.172 | Unknown malware botnet C2 server (confidence level: 100%) | |
file35.244.101.227 | Havoc botnet C2 server (confidence level: 100%) | |
file18.116.195.248 | Havoc botnet C2 server (confidence level: 100%) | |
file45.207.207.222 | Kaiji botnet C2 server (confidence level: 100%) | |
file154.9.253.92 | Unknown malware botnet C2 server (confidence level: 100%) | |
file37.9.170.224 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.1.126.171 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.241.32.238 | Unknown malware botnet C2 server (confidence level: 100%) | |
file42.193.239.63 | Unknown malware botnet C2 server (confidence level: 100%) | |
file93.99.225.116 | Unknown malware botnet C2 server (confidence level: 100%) | |
file200.187.67.103 | Unknown malware botnet C2 server (confidence level: 100%) | |
file172.104.17.210 | Unknown malware botnet C2 server (confidence level: 100%) | |
file43.139.236.87 | Unknown malware botnet C2 server (confidence level: 100%) | |
file181.32.55.63 | Unknown malware botnet C2 server (confidence level: 100%) | |
file49.233.251.158 | Unknown malware botnet C2 server (confidence level: 100%) | |
file65.2.30.8 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file15.207.106.110 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file35.178.181.119 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file198.55.98.4 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file45.153.34.171 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file101.226.8.163 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file52.70.128.50 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file43.100.93.39 | Sliver botnet C2 server (confidence level: 50%) | |
file13.221.115.68 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file27.102.138.222 | Kimsuky botnet C2 server (confidence level: 50%) | |
file196.251.80.13 | AsyncRAT botnet C2 server (confidence level: 50%) | |
file176.46.157.24 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file185.156.72.59 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file176.65.144.169 | PureLogs Stealer botnet C2 server (confidence level: 80%) | |
file159.69.100.234 | Vidar botnet C2 server (confidence level: 100%) | |
file101.201.153.90 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.238.233.76 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file34.71.157.217 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file198.135.50.90 | Remcos botnet C2 server (confidence level: 100%) | |
file192.142.0.51 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file54.221.20.76 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file209.141.39.243 | Bashlite botnet C2 server (confidence level: 100%) | |
file144.172.103.74 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file156.238.233.76 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.158.249.231 | BianLian botnet C2 server (confidence level: 100%) | |
file176.65.143.144 | Remcos botnet C2 server (confidence level: 75%) | |
file154.223.21.162 | Sliver botnet C2 server (confidence level: 75%) | |
file188.49.91.110 | QakBot botnet C2 server (confidence level: 75%) | |
file172.96.137.157 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
file193.161.193.99 | PureLogs Stealer botnet C2 server (confidence level: 80%) | |
file193.233.254.54 | PureLogs Stealer botnet C2 server (confidence level: 50%) | |
file5.252.155.14 | NetSupportManager RAT botnet C2 server (confidence level: 80%) | |
file185.167.61.79 | XWorm botnet C2 server (confidence level: 100%) | |
file101.43.127.152 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file1.94.172.68 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.89.152.16 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.140.186.173 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file77.83.207.163 | Remcos botnet C2 server (confidence level: 100%) | |
file79.55.104.179 | Remcos botnet C2 server (confidence level: 100%) | |
file3.92.24.26 | Sliver botnet C2 server (confidence level: 100%) | |
file15.161.185.204 | Sliver botnet C2 server (confidence level: 100%) | |
file184.73.148.10 | Sliver botnet C2 server (confidence level: 100%) | |
file145.223.68.184 | Sliver botnet C2 server (confidence level: 100%) | |
file45.77.255.25 | ShadowPad botnet C2 server (confidence level: 90%) | |
file23.26.108.141 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file78.161.6.158 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file128.90.113.229 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file128.90.113.229 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file144.202.26.74 | Unknown malware botnet C2 server (confidence level: 100%) | |
file172.111.131.228 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file94.156.189.233 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file173.249.29.108 | DCRat botnet C2 server (confidence level: 100%) | |
file51.17.42.240 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file192.3.95.227 | Crimson RAT botnet C2 server (confidence level: 100%) | |
file194.190.152.62 | Unknown malware botnet C2 server (confidence level: 100%) | |
file167.88.168.160 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file94.26.90.65 | Latrodectus botnet C2 server (confidence level: 90%) | |
file31.42.177.160 | DanaBot botnet C2 server (confidence level: 100%) | |
file5.8.11.114 | DanaBot botnet C2 server (confidence level: 100%) | |
file91.92.247.116 | DanaBot botnet C2 server (confidence level: 100%) | |
file89.185.80.189 | DanaBot botnet C2 server (confidence level: 100%) | |
file77.91.76.17 | DanaBot botnet C2 server (confidence level: 100%) | |
file154.216.19.169 | DanaBot botnet C2 server (confidence level: 100%) | |
file80.76.49.166 | DanaBot botnet C2 server (confidence level: 100%) | |
file185.122.171.132 | DanaBot botnet C2 server (confidence level: 100%) | |
file87.121.221.124 | DanaBot botnet C2 server (confidence level: 100%) | |
file77.221.149.162 | DanaBot botnet C2 server (confidence level: 100%) | |
file45.156.25.118 | DanaBot botnet C2 server (confidence level: 100%) | |
file85.192.42.115 | DanaBot botnet C2 server (confidence level: 100%) | |
file196.251.86.101 | DanaBot botnet C2 server (confidence level: 100%) | |
file185.150.24.103 | DanaBot botnet C2 server (confidence level: 100%) | |
file196.251.87.252 | DanaBot botnet C2 server (confidence level: 100%) | |
file45.134.173.86 | DanaBot botnet C2 server (confidence level: 100%) | |
file77.239.99.248 | DanaBot botnet C2 server (confidence level: 100%) | |
file62.60.226.158 | DanaBot botnet C2 server (confidence level: 100%) | |
file91.92.244.118 | DanaBot botnet C2 server (confidence level: 100%) | |
file196.251.86.102 | DanaBot botnet C2 server (confidence level: 100%) | |
file188.124.59.28 | DanaBot botnet C2 server (confidence level: 100%) | |
file149.28.127.237 | DanaBot botnet C2 server (confidence level: 100%) | |
file77.239.101.139 | DanaBot botnet C2 server (confidence level: 100%) | |
file87.121.84.50 | Mirai botnet C2 server (confidence level: 100%) | |
file86.54.42.125 | Mirai botnet C2 server (confidence level: 100%) | |
file167.88.186.143 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file20.41.73.175 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.155.0.238 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.136.118.94 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file94.131.111.131 | Remcos botnet C2 server (confidence level: 100%) | |
file3.89.72.140 | Sliver botnet C2 server (confidence level: 100%) | |
file101.201.174.160 | Unknown malware botnet C2 server (confidence level: 100%) | |
file196.251.88.18 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file193.26.115.210 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file124.198.132.30 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file128.90.113.229 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file23.26.108.141 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file46.101.83.145 | Unknown malware botnet C2 server (confidence level: 100%) | |
file95.111.221.102 | Unknown malware botnet C2 server (confidence level: 100%) | |
file154.29.148.19 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file8.153.205.30 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file185.193.127.252 | Havoc botnet C2 server (confidence level: 100%) | |
file16.51.153.12 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file45.207.207.195 | Kaiji botnet C2 server (confidence level: 100%) | |
file62.109.28.147 | Bashlite botnet C2 server (confidence level: 100%) | |
file144.172.104.222 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file111.230.99.190 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file111.230.99.190 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file129.204.24.135 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file94.237.96.182 | Sliver botnet C2 server (confidence level: 100%) | |
file144.172.116.93 | Sliver botnet C2 server (confidence level: 100%) | |
file89.22.161.133 | Sliver botnet C2 server (confidence level: 100%) | |
file78.161.6.158 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file92.118.56.54 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file18.223.88.214 | Unknown malware botnet C2 server (confidence level: 100%) | |
file31.57.219.133 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file196.251.118.72 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file207.180.231.197 | Havoc botnet C2 server (confidence level: 100%) | |
file62.60.226.193 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file110.54.136.143 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file193.233.237.189 | XWorm botnet C2 server (confidence level: 100%) | |
file196.251.117.107 | XWorm botnet C2 server (confidence level: 100%) | |
file37.120.156.182 | XWorm botnet C2 server (confidence level: 100%) | |
file45.146.81.147 | NjRAT botnet C2 server (confidence level: 100%) | |
file170.130.55.107 | WarmCookie botnet C2 server (confidence level: 100%) | |
file185.161.208.83 | XWorm botnet C2 server (confidence level: 100%) | |
file188.49.91.110 | QakBot botnet C2 server (confidence level: 75%) | |
file64.23.129.58 | XWorm botnet C2 server (confidence level: 100%) | |
file88.232.103.158 | QakBot botnet C2 server (confidence level: 75%) | |
file94.99.34.46 | QakBot botnet C2 server (confidence level: 75%) | |
file47.91.78.252 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file193.68.89.191 | XWorm botnet C2 server (confidence level: 100%) | |
file196.251.72.191 | Remcos botnet C2 server (confidence level: 75%) | |
file106.12.174.164 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file106.12.174.164 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file113.45.175.15 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file124.221.64.229 | Cobalt Strike botnet C2 server (confidence level: 75%) |
Hash
Value | Description | Copy |
---|---|---|
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8000 | DCRat botnet C2 server (confidence level: 100%) | |
hash16423 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8080 | ERMAC botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash43211 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash1604 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash3390 | DarkComet botnet C2 server (confidence level: 100%) | |
hash43211 | Sliver botnet C2 server (confidence level: 90%) | |
hash443 | Sliver botnet C2 server (confidence level: 90%) | |
hash888 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash4000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash808 | Kaiji botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash2222 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9146 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash860 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash6362 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash1911 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash19000 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash1521 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash8126 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash443 | Kimsuky botnet C2 server (confidence level: 50%) | |
hash7777 | AsyncRAT botnet C2 server (confidence level: 50%) | |
hash7777 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash7777 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash7702 | PureLogs Stealer botnet C2 server (confidence level: 80%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash808 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash17241 | Remcos botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash1995 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | Bashlite botnet C2 server (confidence level: 100%) | |
hash4443 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | BianLian botnet C2 server (confidence level: 100%) | |
hash5200 | Remcos botnet C2 server (confidence level: 75%) | |
hash8888 | Sliver botnet C2 server (confidence level: 75%) | |
hash995 | QakBot botnet C2 server (confidence level: 75%) | |
hash452cd18570471e80dd6bf34addede334 | DISGOMOJI payload (confidence level: 100%) | |
hashd5a3766e744a563278b18267d6bd7113 | DISGOMOJI payload (confidence level: 100%) | |
hashc763ecf315481525afcd47c5f32c1fd7 | DISGOMOJI payload (confidence level: 100%) | |
hash68fbe197c62a3777d2299f9eabed2c70 | DISGOMOJI payload (confidence level: 100%) | |
hash43e4260c595b20e357be75c0c1fbec29 | DISGOMOJI payload (confidence level: 100%) | |
hashd24c797f94933a3ec5227a6f57e15358 | DISGOMOJI payload (confidence level: 100%) | |
hashc8c21b4642f12c28f6e5e0389bbf8c36 | DISGOMOJI payload (confidence level: 100%) | |
hashe429ebfbc827ac8a865dce20470d3e8b | DISGOMOJI payload (confidence level: 100%) | |
hashfe7bb6d0835879043e4b9fef7fa59375 | DISGOMOJI payload (confidence level: 100%) | |
hash1a17955be2f99813c03d9f4970131593 | DISGOMOJI payload (confidence level: 100%) | |
hash2d9fb9303512a6b6e9a67c4d956a0e07 | DISGOMOJI payload (confidence level: 100%) | |
hash443 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
hash20375 | PureLogs Stealer botnet C2 server (confidence level: 80%) | |
hash5555 | PureLogs Stealer botnet C2 server (confidence level: 50%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 80%) | |
hash3933 | XWorm botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash82 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash5001 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8000 | Sliver botnet C2 server (confidence level: 100%) | |
hash80 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash222 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash2000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash2021 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8000 | DCRat botnet C2 server (confidence level: 100%) | |
hash20845 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash11409 | Crimson RAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8443 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 90%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 100%) | |
hash38361 | Mirai botnet C2 server (confidence level: 100%) | |
hash38242 | Mirai botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8906 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2405 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash3000 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash1018 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash1234 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash18246 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash808 | Kaiji botnet C2 server (confidence level: 100%) | |
hash1337 | Bashlite botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash53835 | Sliver botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash5552 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash5938 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash4444 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash19000 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash6775 | XWorm botnet C2 server (confidence level: 100%) | |
hash1602 | XWorm botnet C2 server (confidence level: 100%) | |
hash2829 | XWorm botnet C2 server (confidence level: 100%) | |
hash5552 | NjRAT botnet C2 server (confidence level: 100%) | |
hash443 | WarmCookie botnet C2 server (confidence level: 100%) | |
hash2829 | XWorm botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash49644 | XWorm botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash53 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash8848 | XWorm botnet C2 server (confidence level: 100%) | |
hash5001 | Remcos botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash1443 | Cobalt Strike botnet C2 server (confidence level: 75%) |
Threat ID: 6848c9f93cd93dcca8313cca
Added to database: 6/11/2025, 12:12:41 AM
Last enriched: 7/11/2025, 10:05:06 AM
Last updated: 8/8/2025, 12:56:29 PM
Views: 27
Related Threats
ThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.