ThreatFox IOCs for 2025-07-08
ThreatFox IOCs for 2025-07-08
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on July 8, 2025, by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), network activity, and payload delivery. The data appears to be a collection of threat intelligence indicators rather than a description of a specific vulnerability or exploit. No affected software versions or products are listed, and there are no known exploits in the wild associated with these IOCs. The threat level is indicated as medium with a threatLevel score of 2 and distribution score of 3, suggesting moderate dissemination potential. The absence of patch availability and exploit details implies that these IOCs are primarily for detection and monitoring purposes rather than immediate active threats. The tags and categories emphasize the role of these IOCs in identifying network-based malicious activities and payload delivery mechanisms, which are typical in malware campaigns. However, the lack of technical specifics, such as malware family, attack vectors, or targeted systems, limits the ability to provide a detailed technical breakdown of the threat. Overall, this entry serves as an intelligence update to assist security teams in recognizing potential malicious network behaviors and payloads through OSINT methods.
Potential Impact
For European organizations, the impact of these IOCs depends largely on their integration into security monitoring and incident response workflows. Since the IOCs relate to network activity and payload delivery, organizations that rely heavily on network perimeter defenses and endpoint protection can benefit from early detection of suspicious activities. The medium severity suggests a moderate risk of intrusion or compromise if these indicators correspond to active malware campaigns. However, without specific exploit details or affected products, the direct impact remains uncertain. European entities in sectors with high exposure to network threats, such as finance, critical infrastructure, and government, should consider these IOCs as part of their broader threat intelligence to enhance situational awareness. The lack of known exploits in the wild reduces immediate risk but does not eliminate the possibility of future exploitation. Therefore, the impact is primarily in the realm of improved detection capabilities rather than an urgent operational threat.
Mitigation Recommendations
To effectively utilize these IOCs, European organizations should integrate them into their Security Information and Event Management (SIEM) systems and threat intelligence platforms to enable automated detection and alerting. Network traffic should be monitored for the presence of these indicators, and any matches should trigger incident response procedures including containment and forensic analysis. Organizations should ensure that their endpoint detection and response (EDR) tools are updated to recognize related payload delivery methods. Regular threat hunting exercises using these IOCs can help identify latent infections or ongoing campaigns. Additionally, sharing findings with national Computer Security Incident Response Teams (CSIRTs) and participating in information sharing communities can enhance collective defense. Since no patches are available, emphasis should be placed on proactive detection and network segmentation to limit potential lateral movement. User training on recognizing phishing or social engineering attempts that could lead to payload delivery remains a critical complementary measure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
Indicators of Compromise
- domain: qeel.xyz
- domain: lnofi.xyz
- domain: ryxpq.xyz
- domain: dzyzb.xyz
- domain: dkkig.xyz
- domain: lodib.xyz
- domain: genmkh.xyz
- file: 115.190.147.158
- hash: 8001
- file: 45.154.98.13
- hash: 2404
- file: 80.64.19.202
- hash: 9000
- file: 178.128.204.138
- hash: 7443
- file: 128.199.152.169
- hash: 443
- file: 159.223.21.58
- hash: 443
- file: 148.66.21.236
- hash: 80
- file: 121.41.113.184
- hash: 8443
- file: 34.42.252.91
- hash: 80
- url: http://a1143266.xsph.ru/64e9d1b1.php
- file: 147.45.218.49
- hash: 443
- file: 78.128.112.206
- hash: 9999
- file: 176.9.34.165
- hash: 443
- file: 147.45.218.3
- hash: 443
- url: https://leehpfe.shop/uhbv
- file: 194.156.79.202
- hash: 5647
- domain: api.regpad.net
- domain: apiprod.regpad.net
- domain: cdn.bitttrrix.ru
- domain: personal.regpad.net
- file: 118.112.10.110
- hash: 443
- file: 143.110.175.226
- hash: 8443
- file: 171.43.169.243
- hash: 443
- file: 196.251.87.191
- hash: 443
- file: 61.160.192.88
- hash: 443
- url: http://cz27224.tw1.ru/80e9378c.php
- file: 47.122.80.99
- hash: 80
- file: 106.53.52.127
- hash: 4433
- file: 113.44.252.170
- hash: 80
- file: 49.65.96.18
- hash: 9999
- file: 165.154.225.50
- hash: 8443
- file: 172.98.23.21
- hash: 80
- file: 172.98.23.73
- hash: 80
- file: 91.232.103.206
- hash: 5000
- file: 194.59.31.128
- hash: 8808
- file: 172.86.105.40
- hash: 80
- file: 23.227.199.118
- hash: 12443
- file: 148.66.21.237
- hash: 80
- file: 86.54.42.116
- hash: 8855
- domain: net-2-45-246-28.cust.vodafonedsl.it
- file: 103.201.130.85
- hash: 60000
- file: 98.70.57.40
- hash: 8080
- file: 34.229.94.154
- hash: 3333
- file: 38.56.209.142
- hash: 443
- file: 83.229.122.24
- hash: 5700
- file: 20.96.168.68
- hash: 443
- file: 94.102.8.83
- hash: 3333
- file: 78.12.5.9
- hash: 3390
- file: 3.127.89.233
- hash: 443
- file: 50.16.93.216
- hash: 80
- file: 176.46.157.64
- hash: 1911
- file: 8.139.5.62
- hash: 54681
- file: 118.107.244.105
- hash: 10001
- domain: page4work.mywire.org
- file: 5.101.81.63
- hash: 1515
- domain: mokveid.duckdns.org
- file: 101.182.12.32
- hash: 1703
- file: 5.181.171.222
- hash: 53
- file: 1.15.25.148
- hash: 9080
- file: 13.60.104.211
- hash: 31337
- file: 107.150.20.224
- hash: 31337
- file: 64.227.142.218
- hash: 31337
- file: 77.51.219.187
- hash: 3333
- file: 18.219.22.52
- hash: 8589
- file: 205.185.114.104
- hash: 18107
- file: 192.121.16.196
- hash: 54984
- file: 91.228.113.199
- hash: 9035
- file: 61.3.107.155
- hash: 45555
- file: 27.102.138.169
- hash: 80
- domain: vaykhon.ddns.net
- file: 192.140.166.27
- hash: 443
- file: 123.56.252.42
- hash: 5555
- file: 213.209.150.216
- hash: 8080
- file: 213.209.150.216
- hash: 443
- file: 91.99.174.2
- hash: 443
- file: 91.99.201.76
- hash: 443
- file: 8.137.80.215
- hash: 80
- file: 18.162.56.61
- hash: 8888
- file: 176.46.157.34
- hash: 443
- file: 1.197.72.42
- hash: 40000
- file: 206.123.145.154
- hash: 8082
- file: 13.38.84.98
- hash: 50994
- file: 95.179.130.254
- hash: 443
- file: 172.105.24.242
- hash: 8080
- file: 18.254.197.10
- hash: 443
- file: 67.71.30.106
- hash: 2222
- file: 68.106.44.135
- hash: 443
- file: 147.45.198.44
- hash: 5555
- file: 66.179.10.197
- hash: 5610
- file: 91.204.224.232
- hash: 6666
- url: https://aliondrifdions.com/work/
- url: https://gorahripliys.com/work/
- file: 185.149.233.28
- hash: 2405
- file: 61.245.10.155
- hash: 443
- domain: idrnmk.top
- domain: whitfmz.top
- domain: anfdfq.pics
- domain: perkoj.shop
- domain: metopypv.top
- domain: security-malware.com
- domain: citadelcdn.pro
- domain: hotroutingcdn.asia
- domain: filedisterbuter.icu
- file: 45.125.66.123
- hash: 443
- file: 115.29.162.71
- hash: 443
- file: 115.29.162.71
- hash: 8088
- url: https://posbym.top/xldf
- file: 196.251.69.245
- hash: 2404
- file: 142.147.97.173
- hash: 2404
- domain: webdevs.vip
- file: 198.135.51.107
- hash: 6751
- file: 107.172.44.146
- hash: 45456
- file: 38.60.208.184
- hash: 443
- file: 134.122.183.217
- hash: 8808
- file: 16.171.147.206
- hash: 8808
- file: 134.199.166.195
- hash: 7443
- file: 71.175.176.100
- hash: 4782
- file: 27.254.164.212
- hash: 443
- file: 18.191.218.224
- hash: 4582
- file: 179.95.204.243
- hash: 9990
- file: 124.156.166.6
- hash: 80
- url: https://matfqht.lat/auwq
- file: 85.209.195.214
- hash: 10001
- file: 62.210.113.45
- hash: 10001
- file: 54.219.186.229
- hash: 443
- file: 154.37.214.53
- hash: 4080
- file: 154.37.214.53
- hash: 4090
- file: 154.37.214.53
- hash: 1123
- file: 134.122.189.56
- hash: 6666
- file: 134.122.189.56
- hash: 8888
- file: 134.122.189.56
- hash: 80
- domain: hunterbry.no-ip.biz
- file: 146.70.226.130
- hash: 42475
- url: https://dkkig.xyz/xjau
- url: https://dzyzb.xyz/anby
- url: https://genmkh.xyz/towq
- url: https://lnofi.xyz/qoei
- url: https://lodib.xyz/towq
- url: https://ryxpq.xyz/tpaz
- url: https://t.me/fhsdf6
- file: 202.79.173.94
- hash: 9090
- file: 160.153.178.204
- hash: 80
- file: 160.153.178.204
- hash: 443
- url: https://www.thelist2win.com/viewdashboard
- domain: www.thelist2win.com
- url: https://reckdp.pics/xiar
- url: https://t.me/baibai9054
- domain: bruconriz72.futurox.store
- file: 45.133.174.35
- hash: 2404
- domain: jareyo.duckdns.org
- file: 156.229.125.160
- hash: 3778
- file: 95.216.69.187
- hash: 5555
- domain: hitmanzok.net
- file: 147.124.215.2
- hash: 5577
- domain: relay.colonjars.xyz
- domain: mail.operationesim.com
- file: 107.150.0.234
- hash: 8041
- domain: xiaoshihou13.top
- file: 154.82.85.102
- hash: 8083
- file: 107.150.0.218
- hash: 8041
- domain: draw.treetrauma.com
- file: 107.172.232.83
- hash: 13047
- file: 185.185.71.66
- hash: 80
- domain: gbotupdate19xx.com
- domain: iwine.top
- url: https://iwine.top/kll/index.php
- url: https://iwine.top/kll/buf.js
- url: http://cc81860.tw1.ru/b2e12f58.php
- file: 101.43.62.241
- hash: 443
- file: 8.149.137.211
- hash: 8808
- file: 156.238.243.16
- hash: 80
- file: 156.238.243.16
- hash: 8089
- domain: 116b1bac-dcea-42f0-befb-e4383be4037a.k8s.ondigitalocean.com
- domain: technovisionpromaxx.com
- file: 51.195.123.116
- hash: 8041
- file: 87.120.113.179
- hash: 7000
- domain: hciagriitec.ddns.net
- file: 104.131.57.194
- hash: 5577
- file: 51.38.29.129
- hash: 7000
- domain: google-com-site-backup.duckdns.org
- domain: codingoffensive.duckdns.org
- file: 194.26.192.233
- hash: 4781
- url: https://ngbmrq.pics/xozh
- url: https://sciezka.sbs/api
- url: https://bedazq.pics/toow
- file: 45.207.39.135
- hash: 6666
- file: 45.207.39.135
- hash: 8888
- file: 47.76.115.9
- hash: 443
- domain: www.dddddddguashjdka.top
- domain: hosts32.no-ip.biz
- file: 217.60.39.163
- hash: 38242
- file: 217.60.248.199
- hash: 38242
- file: 194.113.37.21
- hash: 38242
- file: 217.60.249.53
- hash: 38242
- file: 31.59.120.38
- hash: 38242
- file: 212.192.221.236
- hash: 38242
- file: 217.60.248.115
- hash: 38242
- file: 45.88.9.32
- hash: 7874
- file: 62.60.226.204
- hash: 7705
- file: 124.70.86.82
- hash: 443
- file: 27.17.188.137
- hash: 56245
- file: 115.126.83.252
- hash: 443
- file: 39.100.86.107
- hash: 8443
- file: 43.226.79.54
- hash: 8000
- file: 212.23.222.49
- hash: 4040
- file: 47.245.126.17
- hash: 8443
- file: 156.246.2.188
- hash: 9397
- file: 156.246.2.169
- hash: 9397
- file: 156.246.2.166
- hash: 9397
- file: 156.246.2.185
- hash: 9397
- file: 156.246.3.165
- hash: 9397
- file: 45.146.253.150
- hash: 80
- domain: www.bonusnewmember.fyi
- file: 82.66.75.169
- hash: 443
- file: 52.63.73.110
- hash: 443
- file: 35.180.37.142
- hash: 443
- file: 181.235.10.10
- hash: 8010
- file: 192.140.188.34
- hash: 808
- file: 2.56.127.153
- hash: 80
- file: 104.193.69.173
- hash: 443
- file: 39.98.204.142
- hash: 80
- file: 83.255.8.92
- hash: 443
- file: 89.168.126.249
- hash: 10001
- file: 213.209.150.11
- hash: 19086
- file: 87.120.126.122
- hash: 5900
- file: 109.120.137.42
- hash: 443
- file: 159.0.45.255
- hash: 443
- file: 45.77.231.137
- hash: 443
- file: 88.129.151.109
- hash: 8080
- file: 94.49.43.20
- hash: 995
- file: 51.89.166.173
- hash: 6522
- domain: edge3.bsqb.ru
- domain: test10.scacasdxc.love
- file: 116.203.96.2
- hash: 53
- file: 85.209.128.97
- hash: 5001
ThreatFox IOCs for 2025-07-08
Description
ThreatFox IOCs for 2025-07-08
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on July 8, 2025, by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), network activity, and payload delivery. The data appears to be a collection of threat intelligence indicators rather than a description of a specific vulnerability or exploit. No affected software versions or products are listed, and there are no known exploits in the wild associated with these IOCs. The threat level is indicated as medium with a threatLevel score of 2 and distribution score of 3, suggesting moderate dissemination potential. The absence of patch availability and exploit details implies that these IOCs are primarily for detection and monitoring purposes rather than immediate active threats. The tags and categories emphasize the role of these IOCs in identifying network-based malicious activities and payload delivery mechanisms, which are typical in malware campaigns. However, the lack of technical specifics, such as malware family, attack vectors, or targeted systems, limits the ability to provide a detailed technical breakdown of the threat. Overall, this entry serves as an intelligence update to assist security teams in recognizing potential malicious network behaviors and payloads through OSINT methods.
Potential Impact
For European organizations, the impact of these IOCs depends largely on their integration into security monitoring and incident response workflows. Since the IOCs relate to network activity and payload delivery, organizations that rely heavily on network perimeter defenses and endpoint protection can benefit from early detection of suspicious activities. The medium severity suggests a moderate risk of intrusion or compromise if these indicators correspond to active malware campaigns. However, without specific exploit details or affected products, the direct impact remains uncertain. European entities in sectors with high exposure to network threats, such as finance, critical infrastructure, and government, should consider these IOCs as part of their broader threat intelligence to enhance situational awareness. The lack of known exploits in the wild reduces immediate risk but does not eliminate the possibility of future exploitation. Therefore, the impact is primarily in the realm of improved detection capabilities rather than an urgent operational threat.
Mitigation Recommendations
To effectively utilize these IOCs, European organizations should integrate them into their Security Information and Event Management (SIEM) systems and threat intelligence platforms to enable automated detection and alerting. Network traffic should be monitored for the presence of these indicators, and any matches should trigger incident response procedures including containment and forensic analysis. Organizations should ensure that their endpoint detection and response (EDR) tools are updated to recognize related payload delivery methods. Regular threat hunting exercises using these IOCs can help identify latent infections or ongoing campaigns. Additionally, sharing findings with national Computer Security Incident Response Teams (CSIRTs) and participating in information sharing communities can enhance collective defense. Since no patches are available, emphasis should be placed on proactive detection and network segmentation to limit potential lateral movement. User training on recognizing phishing or social engineering attempts that could lead to payload delivery remains a critical complementary measure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- b371c0d7-76a4-4e01-b096-4d94563d5598
- Original Timestamp
- 1752019387
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainqeel.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlnofi.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainryxpq.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaindzyzb.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaindkkig.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlodib.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaingenmkh.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainapi.regpad.net | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainapiprod.regpad.net | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaincdn.bitttrrix.ru | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainpersonal.regpad.net | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainnet-2-45-246-28.cust.vodafonedsl.it | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainpage4work.mywire.org | XWorm botnet C2 domain (confidence level: 100%) | |
domainmokveid.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainvaykhon.ddns.net | Quasar RAT botnet C2 domain (confidence level: 50%) | |
domainidrnmk.top | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainwhitfmz.top | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainanfdfq.pics | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainperkoj.shop | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainmetopypv.top | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainsecurity-malware.com | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domaincitadelcdn.pro | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainhotroutingcdn.asia | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainfiledisterbuter.icu | Lumma Stealer botnet C2 domain (confidence level: 50%) | |
domainwebdevs.vip | Remcos botnet C2 domain (confidence level: 100%) | |
domainhunterbry.no-ip.biz | CyberGate botnet C2 domain (confidence level: 100%) | |
domainwww.thelist2win.com | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domainbruconriz72.futurox.store | Umbral payload delivery domain (confidence level: 100%) | |
domainjareyo.duckdns.org | STRRAT botnet C2 domain (confidence level: 100%) | |
domainhitmanzok.net | NetSupportManager RAT botnet C2 domain (confidence level: 100%) | |
domainrelay.colonjars.xyz | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainmail.operationesim.com | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainxiaoshihou13.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domaindraw.treetrauma.com | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domaingbotupdate19xx.com | StrelaStealer botnet C2 domain (confidence level: 100%) | |
domainiwine.top | FAKEUPDATES payload delivery domain (confidence level: 100%) | |
domain116b1bac-dcea-42f0-befb-e4383be4037a.k8s.ondigitalocean.com | Havoc botnet C2 domain (confidence level: 100%) | |
domaintechnovisionpromaxx.com | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainhciagriitec.ddns.net | XWorm botnet C2 domain (confidence level: 100%) | |
domaingoogle-com-site-backup.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaincodingoffensive.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainwww.dddddddguashjdka.top | ValleyRAT botnet C2 domain (confidence level: 100%) | |
domainhosts32.no-ip.biz | CyberGate botnet C2 domain (confidence level: 100%) | |
domainwww.bonusnewmember.fyi | Havoc botnet C2 domain (confidence level: 100%) | |
domainedge3.bsqb.ru | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaintest10.scacasdxc.love | Cobalt Strike botnet C2 domain (confidence level: 75%) |
File
Value | Description | Copy |
---|---|---|
file115.190.147.158 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.154.98.13 | Remcos botnet C2 server (confidence level: 100%) | |
file80.64.19.202 | SectopRAT botnet C2 server (confidence level: 100%) | |
file178.128.204.138 | Unknown malware botnet C2 server (confidence level: 100%) | |
file128.199.152.169 | Havoc botnet C2 server (confidence level: 100%) | |
file159.223.21.58 | Havoc botnet C2 server (confidence level: 100%) | |
file148.66.21.236 | DCRat botnet C2 server (confidence level: 100%) | |
file121.41.113.184 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file34.42.252.91 | Empire Downloader botnet C2 server (confidence level: 100%) | |
file147.45.218.49 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file78.128.112.206 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file176.9.34.165 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file147.45.218.3 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file194.156.79.202 | XWorm botnet C2 server (confidence level: 100%) | |
file118.112.10.110 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file143.110.175.226 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file171.43.169.243 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file196.251.87.191 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file61.160.192.88 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file47.122.80.99 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file106.53.52.127 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file113.44.252.170 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file49.65.96.18 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file165.154.225.50 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file172.98.23.21 | Ghost RAT botnet C2 server (confidence level: 75%) | |
file172.98.23.73 | Ghost RAT botnet C2 server (confidence level: 75%) | |
file91.232.103.206 | DarkComet botnet C2 server (confidence level: 100%) | |
file194.59.31.128 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file172.86.105.40 | Hook botnet C2 server (confidence level: 100%) | |
file23.227.199.118 | Havoc botnet C2 server (confidence level: 100%) | |
file148.66.21.237 | DCRat botnet C2 server (confidence level: 100%) | |
file86.54.42.116 | DCRat botnet C2 server (confidence level: 100%) | |
file103.201.130.85 | Unknown malware botnet C2 server (confidence level: 100%) | |
file98.70.57.40 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.229.94.154 | Unknown malware botnet C2 server (confidence level: 100%) | |
file38.56.209.142 | Unknown malware botnet C2 server (confidence level: 100%) | |
file83.229.122.24 | Unknown malware botnet C2 server (confidence level: 100%) | |
file20.96.168.68 | Unknown malware botnet C2 server (confidence level: 100%) | |
file94.102.8.83 | Unknown malware botnet C2 server (confidence level: 100%) | |
file78.12.5.9 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file3.127.89.233 | Unknown malware botnet C2 server (confidence level: 100%) | |
file50.16.93.216 | Unknown malware botnet C2 server (confidence level: 100%) | |
file176.46.157.64 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file8.139.5.62 | Chaos botnet C2 server (confidence level: 100%) | |
file118.107.244.105 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
file5.101.81.63 | Remcos botnet C2 server (confidence level: 100%) | |
file101.182.12.32 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file5.181.171.222 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file1.15.25.148 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file13.60.104.211 | Sliver botnet C2 server (confidence level: 50%) | |
file107.150.20.224 | Sliver botnet C2 server (confidence level: 50%) | |
file64.227.142.218 | Sliver botnet C2 server (confidence level: 50%) | |
file77.51.219.187 | Unknown malware botnet C2 server (confidence level: 50%) | |
file18.219.22.52 | Unknown malware botnet C2 server (confidence level: 50%) | |
file205.185.114.104 | Unknown malware botnet C2 server (confidence level: 50%) | |
file192.121.16.196 | Nanocore RAT botnet C2 server (confidence level: 50%) | |
file91.228.113.199 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
file61.3.107.155 | Mozi botnet C2 server (confidence level: 50%) | |
file27.102.138.169 | Kimsuky botnet C2 server (confidence level: 50%) | |
file192.140.166.27 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file123.56.252.42 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file213.209.150.216 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file213.209.150.216 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file91.99.174.2 | Vidar botnet C2 server (confidence level: 100%) | |
file91.99.201.76 | Vidar botnet C2 server (confidence level: 100%) | |
file8.137.80.215 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file18.162.56.61 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file176.46.157.34 | Remcos botnet C2 server (confidence level: 100%) | |
file1.197.72.42 | Sliver botnet C2 server (confidence level: 100%) | |
file206.123.145.154 | Hook botnet C2 server (confidence level: 100%) | |
file13.38.84.98 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file95.179.130.254 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file172.105.24.242 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
file18.254.197.10 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file67.71.30.106 | QakBot botnet C2 server (confidence level: 75%) | |
file68.106.44.135 | QakBot botnet C2 server (confidence level: 75%) | |
file147.45.198.44 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file66.179.10.197 | STRRAT botnet C2 server (confidence level: 100%) | |
file91.204.224.232 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file185.149.233.28 | Remcos botnet C2 server (confidence level: 100%) | |
file61.245.10.155 | Meterpreter botnet C2 server (confidence level: 75%) | |
file45.125.66.123 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file115.29.162.71 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file115.29.162.71 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file196.251.69.245 | Remcos botnet C2 server (confidence level: 100%) | |
file142.147.97.173 | Remcos botnet C2 server (confidence level: 100%) | |
file198.135.51.107 | Remcos botnet C2 server (confidence level: 100%) | |
file107.172.44.146 | Remcos botnet C2 server (confidence level: 100%) | |
file38.60.208.184 | ShadowPad botnet C2 server (confidence level: 90%) | |
file134.122.183.217 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file16.171.147.206 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file134.199.166.195 | Unknown malware botnet C2 server (confidence level: 100%) | |
file71.175.176.100 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file27.254.164.212 | Havoc botnet C2 server (confidence level: 100%) | |
file18.191.218.224 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file179.95.204.243 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file124.156.166.6 | Nimplant botnet C2 server (confidence level: 100%) | |
file85.209.195.214 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
file62.210.113.45 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
file54.219.186.229 | BianLian botnet C2 server (confidence level: 100%) | |
file154.37.214.53 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file154.37.214.53 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file154.37.214.53 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file134.122.189.56 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file134.122.189.56 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file134.122.189.56 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file146.70.226.130 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file202.79.173.94 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file160.153.178.204 | Umbral payload delivery server (confidence level: 100%) | |
file160.153.178.204 | Umbral payload delivery server (confidence level: 100%) | |
file45.133.174.35 | Remcos botnet C2 server (confidence level: 100%) | |
file156.229.125.160 | Mirai botnet C2 server (confidence level: 100%) | |
file95.216.69.187 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
file147.124.215.2 | Remcos botnet C2 server (confidence level: 75%) | |
file107.150.0.234 | Unknown RAT botnet C2 server (confidence level: 75%) | |
file154.82.85.102 | Unknown RAT botnet C2 server (confidence level: 75%) | |
file107.150.0.218 | Unknown RAT botnet C2 server (confidence level: 75%) | |
file107.172.232.83 | Remcos botnet C2 server (confidence level: 75%) | |
file185.185.71.66 | StrelaStealer botnet C2 server (confidence level: 75%) | |
file101.43.62.241 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.149.137.211 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file156.238.243.16 | Hook botnet C2 server (confidence level: 100%) | |
file156.238.243.16 | Hook botnet C2 server (confidence level: 100%) | |
file51.195.123.116 | Unknown RAT botnet C2 server (confidence level: 75%) | |
file87.120.113.179 | XWorm botnet C2 server (confidence level: 100%) | |
file104.131.57.194 | Remcos botnet C2 server (confidence level: 100%) | |
file51.38.29.129 | Remcos botnet C2 server (confidence level: 100%) | |
file194.26.192.233 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file45.207.39.135 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file45.207.39.135 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file47.76.115.9 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file217.60.39.163 | Mirai botnet C2 server (confidence level: 100%) | |
file217.60.248.199 | Mirai botnet C2 server (confidence level: 100%) | |
file194.113.37.21 | Mirai botnet C2 server (confidence level: 100%) | |
file217.60.249.53 | Mirai botnet C2 server (confidence level: 100%) | |
file31.59.120.38 | Mirai botnet C2 server (confidence level: 100%) | |
file212.192.221.236 | Mirai botnet C2 server (confidence level: 100%) | |
file217.60.248.115 | Mirai botnet C2 server (confidence level: 100%) | |
file45.88.9.32 | XWorm botnet C2 server (confidence level: 100%) | |
file62.60.226.204 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
file124.70.86.82 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file27.17.188.137 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file115.126.83.252 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.100.86.107 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.226.79.54 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file212.23.222.49 | Remcos botnet C2 server (confidence level: 100%) | |
file47.245.126.17 | Sliver botnet C2 server (confidence level: 100%) | |
file156.246.2.188 | Unknown malware botnet C2 server (confidence level: 100%) | |
file156.246.2.169 | Unknown malware botnet C2 server (confidence level: 100%) | |
file156.246.2.166 | Unknown malware botnet C2 server (confidence level: 100%) | |
file156.246.2.185 | Unknown malware botnet C2 server (confidence level: 100%) | |
file156.246.3.165 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.146.253.150 | Hook botnet C2 server (confidence level: 100%) | |
file82.66.75.169 | Havoc botnet C2 server (confidence level: 100%) | |
file52.63.73.110 | Havoc botnet C2 server (confidence level: 100%) | |
file35.180.37.142 | Havoc botnet C2 server (confidence level: 100%) | |
file181.235.10.10 | DCRat botnet C2 server (confidence level: 100%) | |
file192.140.188.34 | Kaiji botnet C2 server (confidence level: 100%) | |
file2.56.127.153 | Stealc botnet C2 server (confidence level: 100%) | |
file104.193.69.173 | Unknown malware botnet C2 server (confidence level: 100%) | |
file39.98.204.142 | MimiKatz botnet C2 server (confidence level: 100%) | |
file83.255.8.92 | Empire Downloader botnet C2 server (confidence level: 100%) | |
file89.168.126.249 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
file213.209.150.11 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file87.120.126.122 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file109.120.137.42 | WarmCookie botnet C2 server (confidence level: 100%) | |
file159.0.45.255 | QakBot botnet C2 server (confidence level: 75%) | |
file45.77.231.137 | Havoc botnet C2 server (confidence level: 75%) | |
file88.129.151.109 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file94.49.43.20 | QakBot botnet C2 server (confidence level: 75%) | |
file51.89.166.173 | NjRAT botnet C2 server (confidence level: 100%) | |
file116.203.96.2 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file85.209.128.97 | XWorm botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash8001 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash9000 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | DCRat botnet C2 server (confidence level: 100%) | |
hash8443 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash80 | Empire Downloader botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash9999 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash5647 | XWorm botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4433 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Ghost RAT botnet C2 server (confidence level: 75%) | |
hash80 | Ghost RAT botnet C2 server (confidence level: 75%) | |
hash5000 | DarkComet botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash12443 | Havoc botnet C2 server (confidence level: 100%) | |
hash80 | DCRat botnet C2 server (confidence level: 100%) | |
hash8855 | DCRat botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash5700 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3390 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash1911 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash54681 | Chaos botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
hash1515 | Remcos botnet C2 server (confidence level: 100%) | |
hash1703 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash53 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash9080 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash31337 | Sliver botnet C2 server (confidence level: 50%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash8589 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash18107 | Unknown malware botnet C2 server (confidence level: 50%) | |
hash54984 | Nanocore RAT botnet C2 server (confidence level: 50%) | |
hash9035 | NetSupportManager RAT botnet C2 server (confidence level: 50%) | |
hash45555 | Mozi botnet C2 server (confidence level: 50%) | |
hash80 | Kimsuky botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash5555 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Remcos botnet C2 server (confidence level: 100%) | |
hash40000 | Sliver botnet C2 server (confidence level: 100%) | |
hash8082 | Hook botnet C2 server (confidence level: 100%) | |
hash50994 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8080 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash2222 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash5555 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash5610 | STRRAT botnet C2 server (confidence level: 100%) | |
hash6666 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash2405 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8088 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash6751 | Remcos botnet C2 server (confidence level: 100%) | |
hash45456 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | ShadowPad botnet C2 server (confidence level: 90%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash4582 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash9990 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | Nimplant botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
hash443 | BianLian botnet C2 server (confidence level: 100%) | |
hash4080 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash4090 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash1123 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash6666 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash8888 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash80 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash42475 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash9090 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash80 | Umbral payload delivery server (confidence level: 100%) | |
hash443 | Umbral payload delivery server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash3778 | Mirai botnet C2 server (confidence level: 100%) | |
hash5555 | NetSupportManager RAT botnet C2 server (confidence level: 75%) | |
hash5577 | Remcos botnet C2 server (confidence level: 75%) | |
hash8041 | Unknown RAT botnet C2 server (confidence level: 75%) | |
hash8083 | Unknown RAT botnet C2 server (confidence level: 75%) | |
hash8041 | Unknown RAT botnet C2 server (confidence level: 75%) | |
hash13047 | Remcos botnet C2 server (confidence level: 75%) | |
hash80 | StrelaStealer botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash8089 | Hook botnet C2 server (confidence level: 100%) | |
hash8041 | Unknown RAT botnet C2 server (confidence level: 75%) | |
hash7000 | XWorm botnet C2 server (confidence level: 100%) | |
hash5577 | Remcos botnet C2 server (confidence level: 100%) | |
hash7000 | Remcos botnet C2 server (confidence level: 100%) | |
hash4781 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash6666 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash8888 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash443 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash38242 | Mirai botnet C2 server (confidence level: 100%) | |
hash38242 | Mirai botnet C2 server (confidence level: 100%) | |
hash38242 | Mirai botnet C2 server (confidence level: 100%) | |
hash38242 | Mirai botnet C2 server (confidence level: 100%) | |
hash38242 | Mirai botnet C2 server (confidence level: 100%) | |
hash38242 | Mirai botnet C2 server (confidence level: 100%) | |
hash38242 | Mirai botnet C2 server (confidence level: 100%) | |
hash7874 | XWorm botnet C2 server (confidence level: 100%) | |
hash7705 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash56245 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8000 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash4040 | Remcos botnet C2 server (confidence level: 100%) | |
hash8443 | Sliver botnet C2 server (confidence level: 100%) | |
hash9397 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9397 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9397 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9397 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9397 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash8010 | DCRat botnet C2 server (confidence level: 100%) | |
hash808 | Kaiji botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | MimiKatz botnet C2 server (confidence level: 100%) | |
hash443 | Empire Downloader botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
hash19086 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash5900 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash443 | WarmCookie botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | Havoc botnet C2 server (confidence level: 75%) | |
hash8080 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash995 | QakBot botnet C2 server (confidence level: 75%) | |
hash6522 | NjRAT botnet C2 server (confidence level: 100%) | |
hash53 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash5001 | XWorm botnet C2 server (confidence level: 100%) |
Url
Value | Description | Copy |
---|---|---|
urlhttp://a1143266.xsph.ru/64e9d1b1.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://leehpfe.shop/uhbv | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://cz27224.tw1.ru/80e9378c.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://aliondrifdions.com/work/ | Latrodectus botnet C2 (confidence level: 75%) | |
urlhttps://gorahripliys.com/work/ | Latrodectus botnet C2 (confidence level: 75%) | |
urlhttps://posbym.top/xldf | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://matfqht.lat/auwq | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://dkkig.xyz/xjau | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://dzyzb.xyz/anby | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://genmkh.xyz/towq | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://lnofi.xyz/qoei | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://lodib.xyz/towq | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://ryxpq.xyz/tpaz | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://t.me/fhsdf6 | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://www.thelist2win.com/viewdashboard | FAKEUPDATES botnet C2 (confidence level: 100%) | |
urlhttps://reckdp.pics/xiar | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://t.me/baibai9054 | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://iwine.top/kll/index.php | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttps://iwine.top/kll/buf.js | FAKEUPDATES payload delivery URL (confidence level: 100%) | |
urlhttp://cc81860.tw1.ru/b2e12f58.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://ngbmrq.pics/xozh | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://sciezka.sbs/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://bedazq.pics/toow | Lumma Stealer botnet C2 (confidence level: 100%) |
Threat ID: 686db32e6f40f0eb72fcbb4f
Added to database: 7/9/2025, 12:09:18 AM
Last enriched: 7/9/2025, 12:24:29 AM
Last updated: 8/21/2025, 11:39:33 AM
Views: 36
Related Threats
Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign
MediumThreatFox IOCs for 2025-08-22
MediumCOOKIE SPIDER's Malvertising Attack Drops New SHAMOS macOS Malware
MediumProxyware Malware Being Distributed on YouTube Video Download Site
MediumInvestigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.