ThreatFox IOCs for 2025-08-19
ThreatFox IOCs for 2025-08-19
AI Analysis
Technical Summary
The provided information refers to a set of Indicators of Compromise (IOCs) published on 2025-08-19 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data appears to be a collection of threat intelligence artifacts rather than a specific vulnerability or exploit targeting a particular software or hardware product. There are no affected versions or specific products listed, and no patches or known exploits in the wild are reported. The threat level is indicated as medium, with a threatLevel metric of 2 (on an unspecified scale), analysis level 1, and distribution level 3, suggesting moderate dissemination or relevance. The absence of CWEs (Common Weakness Enumerations) and technical details about the malware payload or attack vectors limits the ability to provide a detailed technical breakdown of the malware's behavior or capabilities. The classification under OSINT and payload delivery implies that these IOCs are intended to assist in identifying malicious network activity or payload delivery mechanisms, potentially used by threat actors to facilitate further attacks. Since no specific exploitation method, vulnerability, or targeted software is identified, this represents a general threat intelligence update rather than a direct security vulnerability or active exploit campaign.
Potential Impact
For European organizations, the impact of this threat intelligence update is primarily in enhancing situational awareness and improving detection capabilities rather than responding to an immediate active threat. The medium severity suggests that while the IOCs may help identify malicious activity, they do not correspond to a critical or widespread exploit currently affecting systems. European entities that rely on threat intelligence feeds for network defense, incident response, and security monitoring can leverage these IOCs to better detect potential payload delivery attempts or network-based malware activity. However, since no specific vulnerabilities or exploits are detailed, the direct impact on confidentiality, integrity, or availability of systems is limited unless these IOCs correlate with ongoing or emerging attacks. Organizations with mature security operations centers (SOCs) and threat hunting teams can integrate these IOCs into their detection tools to preemptively identify suspicious activity. The lack of patch availability and known exploits in the wild reduces the urgency but underscores the importance of continuous monitoring and intelligence-driven defense.
Mitigation Recommendations
Given the nature of this threat intelligence update, practical mitigation steps for European organizations include: 1) Integrate the provided IOCs into existing security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools to enhance detection of related malicious activity. 2) Conduct regular threat hunting exercises using these IOCs to identify any signs of payload delivery or network activity associated with the malware. 3) Maintain up-to-date network segmentation and strict access controls to limit the potential spread of malware if detected. 4) Ensure that security teams are trained to interpret and act on OSINT-based threat intelligence feeds effectively. 5) Collaborate with national and European cybersecurity information sharing organizations to contextualize these IOCs within broader threat landscapes. 6) Since no patches are available, emphasize proactive detection and response rather than remediation of a specific vulnerability. 7) Continuously monitor for updates from ThreatFox or other intelligence sources that may provide further technical details or exploit information.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: is-www.com
- domain: www.is-www.com
- domain: in-www.com
- domain: www.in-www.com
- url: http://23.146.184.21/adb.sh
- domain: americovespucci.shop
- url: http://americovespucci.shop/45cc90de006049c9.php
- file: 116.203.166.184
- hash: 443
- url: https://venamst.top/ooaw
- domain: venamst.top
- url: http://196.251.80.130:4565/wget.sh
- file: 94.154.35.109
- hash: 4515
- domain: bootasactive.icu
- file: 94.154.35.109
- hash: 999
- domain: is-www.com
- domain: www.is-www.com
- domain: www.in-www.com
- domain: in-www.com
- file: 160.30.231.250
- hash: 8081
- file: 98.159.110.66
- hash: 80
- file: 112.196.218.3
- hash: 80
- file: 45.204.211.26
- hash: 80
- file: 172.111.137.67
- hash: 2889
- file: 94.154.35.190
- hash: 63288
- file: 198.135.50.115
- hash: 2404
- file: 85.192.40.185
- hash: 31337
- file: 95.216.183.76
- hash: 444
- file: 38.12.25.253
- hash: 8888
- file: 170.64.163.25
- hash: 7443
- file: 102.117.173.45
- hash: 7443
- file: 45.55.203.19
- hash: 80
- file: 178.221.72.11
- hash: 18080
- file: 178.221.72.11
- hash: 29406
- file: 178.221.72.11
- hash: 44409
- file: 178.221.72.11
- hash: 23
- file: 178.221.72.11
- hash: 222
- file: 178.221.72.11
- hash: 2281
- file: 178.221.72.11
- hash: 8013
- file: 178.221.72.11
- hash: 17629
- file: 187.201.97.119
- hash: 771
- file: 187.201.97.119
- hash: 2181
- file: 187.201.97.119
- hash: 2405
- file: 187.201.97.119
- hash: 2087
- file: 187.201.97.119
- hash: 2456
- file: 187.201.97.119
- hash: 591
- file: 187.201.97.119
- hash: 808
- file: 187.201.97.119
- hash: 1200
- file: 187.201.97.119
- hash: 1540
- file: 187.201.97.119
- hash: 1311
- file: 187.201.97.119
- hash: 2079
- file: 187.201.97.119
- hash: 2455
- file: 187.201.97.119
- hash: 2628
- file: 41.216.188.199
- hash: 80
- domain: logya.messager.my
- domain: sdk-api.messager.my
- file: 155.94.155.240
- hash: 6403
- url: https://falconmx.top/wwwap/sunnyday
- url: https://revise-akmo.com/ajax/pixi.min.js
- url: https://wi2ns.com/res/ratefeature
- file: 198.12.126.169
- hash: 8787
- file: 107.172.132.35
- hash: 1912
- domain: oficios2026.duckdns.org
- url: https://b.dev.drakeinternationalagency.com
- domain: b.dev.drakeinternationalagency.com
- domain: 2n9kf8y7533c0.cfc-execute.bj.baidubce.com
- domain: dev.johnnetcli999.win
- file: 18.171.55.104
- hash: 443
- file: 18.171.55.104
- hash: 80
- url: http://206.245.167.38:9999/supershell/login/
- file: 206.245.167.38
- hash: 9999
- file: 144.126.144.70
- hash: 8000
- file: 154.44.15.83
- hash: 8886
- hash: 7c63a1520ce81dc43d2170ef1570b49627655d33e4987be2cccf8e99d9d4c99f
- file: 94.181.203.77
- hash: 8188
- file: 94.181.203.77
- hash: 44233
- url: https://www.epifonica.com/wp-content/plugins/wp-containment-means/?r=bd1odhrwczovl2rxcmridi5jb20v
- file: 8.155.16.146
- hash: 8080
- file: 103.146.158.129
- hash: 8089
- file: 148.135.102.75
- hash: 80
- file: 34.87.104.27
- hash: 8080
- file: 119.29.231.118
- hash: 8443
- file: 112.196.218.9
- hash: 80
- file: 118.128.151.82
- hash: 80
- file: 134.122.207.54
- hash: 8888
- file: 195.177.94.100
- hash: 8808
- domain: support.suter-mthal.ch
- domain: nhvc.c7.cl
- file: 135.181.41.9
- hash: 80
- file: 46.246.82.15
- hash: 3000
- file: 45.55.203.19
- hash: 8080
- file: 47.100.130.127
- hash: 69
- file: 106.15.137.41
- hash: 2
- file: 62.60.245.136
- hash: 443
- file: 8.152.2.86
- hash: 60000
- file: 47.93.51.60
- hash: 60000
- file: 4.224.113.146
- hash: 443
- file: 223.245.8.144
- hash: 3333
- file: 18.196.182.162
- hash: 80
- file: 18.196.182.162
- hash: 443
- file: 152.203.19.154
- hash: 8080
- file: 20.0.202.73
- hash: 443
- file: 8.210.4.119
- hash: 8090
- file: 161.35.140.56
- hash: 3333
- file: 94.154.35.183
- hash: 443
- domain: sdfaklfsdklffjsdfj.com
- file: 35.178.201.56
- hash: 12925
- file: 13.247.120.203
- hash: 2087
- domain: dasdasidjasjdkasdttt.com
- domain: fixclomyfodp.cloud
- file: 87.120.126.150
- hash: 80
- domain: ititoiaitoaitoiakkaka.com
- url: https://historydress.xyz/mxi.php
- domain: liveksz.top
- domain: ventasio.info
- domain: mail.akastatementspdf.top
- file: 107.189.18.107
- hash: 6000
- file: 5.83.218.183
- hash: 4467
- file: 46.246.14.5
- hash: 2703
- file: 46.246.14.5
- hash: 7044
- domain: morning-divorce.gl.at.ply.gg
- file: 45.141.26.133
- hash: 5000
- domain: regional-around.gl.at.ply.gg
- url: http://91.196.34.1
- url: http://134.122.207.55:8888/supershell/login/
- file: 172.94.96.90
- hash: 8088
- domain: is-www.com
- domain: www.is-www.com
- domain: in-www.com
- domain: www.in-www.com
- file: 81.69.98.230
- hash: 50011
- file: 117.72.175.125
- hash: 81
- file: 103.146.125.195
- hash: 80
- file: 154.201.71.196
- hash: 8005
- file: 103.178.57.150
- hash: 89
- file: 212.162.149.228
- hash: 443
- file: 39.104.50.190
- hash: 8000
- file: 95.217.57.151
- hash: 100
- file: 103.20.102.255
- hash: 8848
- file: 196.251.72.146
- hash: 1597
- file: 102.96.214.19
- hash: 443
- file: 51.20.142.120
- hash: 5995
- file: 13.60.69.76
- hash: 25565
- file: 137.131.128.143
- hash: 80
- file: 172.234.86.225
- hash: 4321
- file: 150.139.144.85
- hash: 10001
- file: 194.156.79.90
- hash: 55615
- file: 74.249.9.7
- hash: 6000
- file: 189.140.29.244
- hash: 443
- file: 34.99.4.103
- hash: 443
- file: 44.196.152.102
- hash: 443
- file: 54.38.94.225
- hash: 8879
- file: 83.110.197.213
- hash: 443
- file: 86.110.218.246
- hash: 1720
- file: 92.98.244.48
- hash: 443
- file: 95.216.183.76
- hash: 1433
- file: 64.23.157.9
- hash: 443
- file: 67.205.154.243
- hash: 64553
- file: 35.157.111.131
- hash: 17449
- file: 47.83.155.72
- hash: 4444
- file: 156.238.243.109
- hash: 6080
- file: 156.238.243.109
- hash: 8086
- file: 8.141.90.104
- hash: 7777
- file: 115.120.225.134
- hash: 89
- file: 89.31.126.165
- hash: 80
- file: 156.234.228.149
- hash: 8081
- file: 193.169.245.90
- hash: 443
- domain: 075229cm.nyash.es
- file: 95.216.181.91
- hash: 443
- domain: gitsecguards.com
- file: 147.185.221.31
- hash: 11257
- domain: wuwu6.cfd
- file: 156.241.134.49
- hash: 6443
- file: 156.241.134.49
- hash: 443
- file: 47.238.124.68
- hash: 443
- domain: dfbgvswrtegf.com
- file: 110.42.47.55
- hash: 4444
- file: 121.5.174.243
- hash: 7777
- file: 156.238.237.119
- hash: 8020
- file: 194.180.48.253
- hash: 16789
- file: 107.172.232.71
- hash: 4477
- file: 31.97.71.171
- hash: 7443
- file: 109.122.197.147
- hash: 80
- file: 45.138.16.79
- hash: 4782
- file: 157.245.54.105
- hash: 8080
- file: 100.42.176.116
- hash: 4333
- file: 54.224.94.224
- hash: 179
- file: 13.58.108.28
- hash: 995
- file: 13.58.108.28
- hash: 2095
- file: 13.58.108.28
- hash: 8545
- file: 3.89.225.68
- hash: 788
- file: 31.97.216.105
- hash: 8081
- file: 68.168.222.6
- hash: 8443
- file: 43.138.22.149
- hash: 8023
- domain: develop.nxtintel.com
- file: 45.86.230.103
- hash: 443
- url: http://41.216.188.199/pages/login.php
- file: 58.9.110.23
- hash: 18067
- url: https://beliefdress.xyz/mxi.php
- url: https://capitalior.ru/akts
- url: https://copulardi.ru/xhza
- url: https://cursilibim.ru/zajd
- url: https://retrofik.ru/jgur
- url: https://runmgov.ru/tixd
- url: https://semipervaz.ru/xued
- url: https://shagkeg.ru/xkzd
- url: https://tiltyufaz.ru/tlxa
- file: 154.91.183.174
- hash: 443
- file: 118.107.46.174
- hash: 443
- file: 118.99.3.33
- hash: 443
- file: 103.237.92.191
- hash: 443
- domain: capitalior.ru
- domain: copulardi.ru
- domain: cursilibim.ru
- domain: retrofik.ru
- domain: runmgov.ru
- domain: semipervaz.ru
- domain: shagkeg.ru
- domain: tiltyufaz.ru
- file: 141.164.49.250
- hash: 80
- domain: microsoft-telemetry.cc
- url: http://microsoft-telemetry.cc/cvdfnafjbmc0/index.php
- file: 43.138.22.149
- hash: 8088
- file: 84.246.226.107
- hash: 9090
- file: 104.243.254.101
- hash: 48791
- file: 45.135.194.43
- hash: 8888
- file: 216.250.250.224
- hash: 443
- file: 95.217.57.151
- hash: 82
- file: 18.253.62.84
- hash: 7443
- file: 85.239.149.90
- hash: 8082
- file: 82.27.2.251
- hash: 80
- url: https://116.202.183.85
- url: https://13.107.ihireinternationalagency.com
- domain: 13.107.ihireinternationalagency.com
- file: 91.199.42.157
- hash: 7000
- url: http://microsoft-telemetry.cc/cvdfnafjbmc0/login.php
- url: http://47.98.216.119:8888/supershell/login/
- file: 147.185.221.28
- hash: 38949
- url: https://ichmidt.com/3dg5.js
- url: https://ichmidt.com/js.php
- url: http://212.22.86.82:2020/home
- domain: telemety-sys.lol
- domain: telemety-xbox.lol
- domain: compare-qualify.gl.at.ply.gg
- domain: gmt-prevention.gl.at.ply.gg
- domain: restaurants-colonial.gl.at.ply.gg
- file: 45.11.229.51
- hash: 8080
- file: 160.25.72.96
- hash: 2404
- domain: 70zv5n4wj.localto.net
- file: 154.94.233.79
- hash: 0443
- domain: witasametry.live
- file: 144.126.149.221
- hash: 7000
- domain: docs.atlantascales.com
- url: http://cz48006.tw1.ru/e8ce020e.php
- domain: heroicsstipend.top
- file: 117.72.105.10
- hash: 8080
- file: 94.154.35.174
- hash: 443
- file: 8.134.222.115
- hash: 8443
- file: 59.110.83.99
- hash: 443
- file: 216.250.252.245
- hash: 2404
- file: 139.84.214.159
- hash: 9999
- file: 165.232.163.129
- hash: 31337
- file: 95.217.57.151
- hash: 80
- file: 34.55.232.213
- hash: 443
- file: 81.95.8.176
- hash: 443
- file: 187.201.97.119
- hash: 636
- file: 187.201.97.119
- hash: 501
- file: 3.101.82.15
- hash: 6008
- file: 13.208.252.175
- hash: 40961
- domain: ccm.messager.my
- file: 120.27.209.132
- hash: 47486
- file: 8.134.181.167
- hash: 54681
- file: 147.185.221.23
- hash: 52320
- file: 1.161.103.144
- hash: 443
- file: 213.133.102.42
- hash: 8384
- file: 52.8.145.106
- hash: 443
- file: 78.40.197.146
- hash: 443
- url: https://wew.shipensburginvestmentgroup.com
- domain: wew.shipensburginvestmentgroup.com
- file: 198.23.197.164
- hash: 7071
- url: http://cg97957.tw1.ru/525a795c.php
- file: 103.105.23.130
- hash: 80
- url: http://a1161282.xsph.ru/8929ff41.php
- url: https://sodipuc.top/xowq
ThreatFox IOCs for 2025-08-19
Description
ThreatFox IOCs for 2025-08-19
AI-Powered Analysis
Technical Analysis
The provided information refers to a set of Indicators of Compromise (IOCs) published on 2025-08-19 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data appears to be a collection of threat intelligence artifacts rather than a specific vulnerability or exploit targeting a particular software or hardware product. There are no affected versions or specific products listed, and no patches or known exploits in the wild are reported. The threat level is indicated as medium, with a threatLevel metric of 2 (on an unspecified scale), analysis level 1, and distribution level 3, suggesting moderate dissemination or relevance. The absence of CWEs (Common Weakness Enumerations) and technical details about the malware payload or attack vectors limits the ability to provide a detailed technical breakdown of the malware's behavior or capabilities. The classification under OSINT and payload delivery implies that these IOCs are intended to assist in identifying malicious network activity or payload delivery mechanisms, potentially used by threat actors to facilitate further attacks. Since no specific exploitation method, vulnerability, or targeted software is identified, this represents a general threat intelligence update rather than a direct security vulnerability or active exploit campaign.
Potential Impact
For European organizations, the impact of this threat intelligence update is primarily in enhancing situational awareness and improving detection capabilities rather than responding to an immediate active threat. The medium severity suggests that while the IOCs may help identify malicious activity, they do not correspond to a critical or widespread exploit currently affecting systems. European entities that rely on threat intelligence feeds for network defense, incident response, and security monitoring can leverage these IOCs to better detect potential payload delivery attempts or network-based malware activity. However, since no specific vulnerabilities or exploits are detailed, the direct impact on confidentiality, integrity, or availability of systems is limited unless these IOCs correlate with ongoing or emerging attacks. Organizations with mature security operations centers (SOCs) and threat hunting teams can integrate these IOCs into their detection tools to preemptively identify suspicious activity. The lack of patch availability and known exploits in the wild reduces the urgency but underscores the importance of continuous monitoring and intelligence-driven defense.
Mitigation Recommendations
Given the nature of this threat intelligence update, practical mitigation steps for European organizations include: 1) Integrate the provided IOCs into existing security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools to enhance detection of related malicious activity. 2) Conduct regular threat hunting exercises using these IOCs to identify any signs of payload delivery or network activity associated with the malware. 3) Maintain up-to-date network segmentation and strict access controls to limit the potential spread of malware if detected. 4) Ensure that security teams are trained to interpret and act on OSINT-based threat intelligence feeds effectively. 5) Collaborate with national and European cybersecurity information sharing organizations to contextualize these IOCs within broader threat landscapes. 6) Since no patches are available, emphasize proactive detection and response rather than remediation of a specific vulnerability. 7) Continuously monitor for updates from ThreatFox or other intelligence sources that may provide further technical details or exploit information.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 98e75238-45d2-4d2f-9830-afe743403ab3
- Original Timestamp
- 1755648186
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainis-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.is-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainin-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.in-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainamericovespucci.shop | Stealc botnet C2 domain (confidence level: 50%) | |
domainvenamst.top | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainbootasactive.icu | Mirai botnet C2 domain (confidence level: 100%) | |
domainis-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.is-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.in-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainin-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainlogya.messager.my | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainsdk-api.messager.my | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainoficios2026.duckdns.org | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainb.dev.drakeinternationalagency.com | Vidar botnet C2 domain (confidence level: 75%) | |
domain2n9kf8y7533c0.cfc-execute.bj.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaindev.johnnetcli999.win | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainsupport.suter-mthal.ch | Havoc botnet C2 domain (confidence level: 100%) | |
domainnhvc.c7.cl | Havoc botnet C2 domain (confidence level: 100%) | |
domainsdfaklfsdklffjsdfj.com | ClearFake payload delivery domain (confidence level: 100%) | |
domaindasdasidjasjdkasdttt.com | ClearFake payload delivery domain (confidence level: 100%) | |
domainfixclomyfodp.cloud | ClearFake payload delivery domain (confidence level: 100%) | |
domainititoiaitoaitoiakkaka.com | ClearFake payload delivery domain (confidence level: 100%) | |
domainliveksz.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainventasio.info | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainmail.akastatementspdf.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainmorning-divorce.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domainregional-around.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domainis-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.is-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainin-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.in-www.com | Unknown Loader payload delivery domain (confidence level: 90%) | |
domain075229cm.nyash.es | DCRat botnet C2 domain (confidence level: 100%) | |
domaingitsecguards.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainwuwu6.cfd | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domaindfbgvswrtegf.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domaindevelop.nxtintel.com | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domaincapitalior.ru | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincopulardi.ru | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincursilibim.ru | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainretrofik.ru | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainrunmgov.ru | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainsemipervaz.ru | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainshagkeg.ru | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintiltyufaz.ru | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmicrosoft-telemetry.cc | Amadey botnet C2 domain (confidence level: 50%) | |
domain13.107.ihireinternationalagency.com | Vidar botnet C2 domain (confidence level: 75%) | |
domaintelemety-sys.lol | Amadey botnet C2 domain (confidence level: 100%) | |
domaintelemety-xbox.lol | Amadey botnet C2 domain (confidence level: 100%) | |
domaincompare-qualify.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domaingmt-prevention.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domainrestaurants-colonial.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domain70zv5n4wj.localto.net | NjRAT botnet C2 domain (confidence level: 100%) | |
domainwitasametry.live | Amadey botnet C2 domain (confidence level: 100%) | |
domaindocs.atlantascales.com | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domainheroicsstipend.top | ClearFake payload delivery domain (confidence level: 100%) | |
domainccm.messager.my | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainwew.shipensburginvestmentgroup.com | Vidar botnet C2 domain (confidence level: 75%) |
Url
Value | Description | Copy |
---|---|---|
urlhttp://23.146.184.21/adb.sh | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttp://americovespucci.shop/45cc90de006049c9.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttps://venamst.top/ooaw | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://196.251.80.130:4565/wget.sh | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttps://falconmx.top/wwwap/sunnyday | Unknown malware payload delivery URL (confidence level: 100%) | |
urlhttps://revise-akmo.com/ajax/pixi.min.js | Unknown malware payload delivery URL (confidence level: 100%) | |
urlhttps://wi2ns.com/res/ratefeature | Unknown malware payload delivery URL (confidence level: 100%) | |
urlhttps://b.dev.drakeinternationalagency.com | Vidar botnet C2 (confidence level: 75%) | |
urlhttp://206.245.167.38:9999/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://www.epifonica.com/wp-content/plugins/wp-containment-means/?r=bd1odhrwczovl2rxcmridi5jb20v | Latrodectus payload delivery URL (confidence level: 95%) | |
urlhttps://historydress.xyz/mxi.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttp://91.196.34.1 | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://134.122.207.55:8888/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://41.216.188.199/pages/login.php | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://beliefdress.xyz/mxi.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttps://capitalior.ru/akts | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://copulardi.ru/xhza | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://cursilibim.ru/zajd | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://retrofik.ru/jgur | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://runmgov.ru/tixd | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://semipervaz.ru/xued | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://shagkeg.ru/xkzd | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://tiltyufaz.ru/tlxa | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttp://microsoft-telemetry.cc/cvdfnafjbmc0/index.php | Amadey botnet C2 (confidence level: 100%) | |
urlhttps://116.202.183.85 | Vidar botnet C2 (confidence level: 75%) | |
urlhttps://13.107.ihireinternationalagency.com | Vidar botnet C2 (confidence level: 75%) | |
urlhttp://microsoft-telemetry.cc/cvdfnafjbmc0/login.php | Amadey botnet C2 (confidence level: 100%) | |
urlhttp://47.98.216.119:8888/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://ichmidt.com/3dg5.js | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://ichmidt.com/js.php | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttp://212.22.86.82:2020/home | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttp://cz48006.tw1.ru/e8ce020e.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://wew.shipensburginvestmentgroup.com | Vidar botnet C2 (confidence level: 75%) | |
urlhttp://cg97957.tw1.ru/525a795c.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://a1161282.xsph.ru/8929ff41.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://sodipuc.top/xowq | Lumma Stealer botnet C2 (confidence level: 75%) |
File
Value | Description | Copy |
---|---|---|
file116.203.166.184 | Vidar botnet C2 server (confidence level: 100%) | |
file94.154.35.109 | Mirai botnet C2 server (confidence level: 100%) | |
file94.154.35.109 | Mirai botnet C2 server (confidence level: 100%) | |
file160.30.231.250 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file98.159.110.66 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file112.196.218.3 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file45.204.211.26 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file172.111.137.67 | Remcos botnet C2 server (confidence level: 100%) | |
file94.154.35.190 | Remcos botnet C2 server (confidence level: 100%) | |
file198.135.50.115 | Remcos botnet C2 server (confidence level: 100%) | |
file85.192.40.185 | Sliver botnet C2 server (confidence level: 100%) | |
file95.216.183.76 | Sliver botnet C2 server (confidence level: 100%) | |
file38.12.25.253 | Unknown malware botnet C2 server (confidence level: 100%) | |
file170.64.163.25 | Unknown malware botnet C2 server (confidence level: 100%) | |
file102.117.173.45 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.55.203.19 | Hook botnet C2 server (confidence level: 100%) | |
file178.221.72.11 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file178.221.72.11 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file178.221.72.11 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file178.221.72.11 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file178.221.72.11 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file178.221.72.11 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file178.221.72.11 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file178.221.72.11 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file41.216.188.199 | Unknown malware botnet C2 server (confidence level: 100%) | |
file155.94.155.240 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file198.12.126.169 | Remcos botnet C2 server (confidence level: 100%) | |
file107.172.132.35 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file18.171.55.104 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file18.171.55.104 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file206.245.167.38 | Unknown malware botnet C2 server (confidence level: 100%) | |
file144.126.144.70 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
file154.44.15.83 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
file94.181.203.77 | Unknown Stealer botnet C2 server (confidence level: 100%) | |
file94.181.203.77 | Unknown Stealer botnet C2 server (confidence level: 100%) | |
file8.155.16.146 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.146.158.129 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file148.135.102.75 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file34.87.104.27 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file119.29.231.118 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file112.196.218.9 | Ghost RAT botnet C2 server (confidence level: 75%) | |
file118.128.151.82 | Ghost RAT botnet C2 server (confidence level: 75%) | |
file134.122.207.54 | Unknown malware botnet C2 server (confidence level: 100%) | |
file195.177.94.100 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file135.181.41.9 | Havoc botnet C2 server (confidence level: 100%) | |
file46.246.82.15 | DCRat botnet C2 server (confidence level: 100%) | |
file45.55.203.19 | ERMAC botnet C2 server (confidence level: 100%) | |
file47.100.130.127 | Unknown malware botnet C2 server (confidence level: 100%) | |
file106.15.137.41 | Unknown malware botnet C2 server (confidence level: 100%) | |
file62.60.245.136 | Unknown malware botnet C2 server (confidence level: 100%) | |
file8.152.2.86 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.93.51.60 | Unknown malware botnet C2 server (confidence level: 100%) | |
file4.224.113.146 | Unknown malware botnet C2 server (confidence level: 100%) | |
file223.245.8.144 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.196.182.162 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.196.182.162 | Unknown malware botnet C2 server (confidence level: 100%) | |
file152.203.19.154 | Unknown malware botnet C2 server (confidence level: 100%) | |
file20.0.202.73 | Unknown malware botnet C2 server (confidence level: 100%) | |
file8.210.4.119 | Unknown malware botnet C2 server (confidence level: 100%) | |
file161.35.140.56 | Unknown malware botnet C2 server (confidence level: 100%) | |
file94.154.35.183 | Latrodectus botnet C2 server (confidence level: 90%) | |
file35.178.201.56 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.247.120.203 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file87.120.126.150 | ClearFake payload delivery server (confidence level: 100%) | |
file107.189.18.107 | XWorm botnet C2 server (confidence level: 100%) | |
file5.83.218.183 | Meterpreter botnet C2 server (confidence level: 100%) | |
file46.246.14.5 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file46.246.14.5 | Vjw0rm botnet C2 server (confidence level: 100%) | |
file45.141.26.133 | XWorm botnet C2 server (confidence level: 100%) | |
file172.94.96.90 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
file81.69.98.230 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file117.72.175.125 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.146.125.195 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file154.201.71.196 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.178.57.150 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file212.162.149.228 | Remcos botnet C2 server (confidence level: 100%) | |
file39.104.50.190 | Sliver botnet C2 server (confidence level: 100%) | |
file95.217.57.151 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file103.20.102.255 | DCRat botnet C2 server (confidence level: 100%) | |
file196.251.72.146 | DCRat botnet C2 server (confidence level: 100%) | |
file102.96.214.19 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file51.20.142.120 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.60.69.76 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file137.131.128.143 | Stealc botnet C2 server (confidence level: 100%) | |
file172.234.86.225 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file150.139.144.85 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
file194.156.79.90 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file74.249.9.7 | XWorm botnet C2 server (confidence level: 100%) | |
file189.140.29.244 | QakBot botnet C2 server (confidence level: 75%) | |
file34.99.4.103 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file44.196.152.102 | BianLian botnet C2 server (confidence level: 75%) | |
file54.38.94.225 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
file83.110.197.213 | QakBot botnet C2 server (confidence level: 75%) | |
file86.110.218.246 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file92.98.244.48 | QakBot botnet C2 server (confidence level: 75%) | |
file95.216.183.76 | Sliver botnet C2 server (confidence level: 75%) | |
file64.23.157.9 | Havoc botnet C2 server (confidence level: 75%) | |
file67.205.154.243 | Meterpreter botnet C2 server (confidence level: 66%) | |
file35.157.111.131 | NjRAT botnet C2 server (confidence level: 50%) | |
file47.83.155.72 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.238.243.109 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.238.243.109 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.141.90.104 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file115.120.225.134 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file89.31.126.165 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.234.228.149 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file193.169.245.90 | Meterpreter botnet C2 server (confidence level: 75%) | |
file95.216.181.91 | Vidar botnet C2 server (confidence level: 100%) | |
file147.185.221.31 | XWorm botnet C2 server (confidence level: 100%) | |
file156.241.134.49 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file156.241.134.49 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file47.238.124.68 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file110.42.47.55 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file121.5.174.243 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.238.237.119 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file194.180.48.253 | Remcos botnet C2 server (confidence level: 100%) | |
file107.172.232.71 | Remcos botnet C2 server (confidence level: 100%) | |
file31.97.71.171 | Unknown malware botnet C2 server (confidence level: 100%) | |
file109.122.197.147 | Hook botnet C2 server (confidence level: 100%) | |
file45.138.16.79 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file157.245.54.105 | Havoc botnet C2 server (confidence level: 100%) | |
file100.42.176.116 | DCRat botnet C2 server (confidence level: 100%) | |
file54.224.94.224 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.58.108.28 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.58.108.28 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.58.108.28 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file3.89.225.68 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file31.97.216.105 | Empire Downloader botnet C2 server (confidence level: 100%) | |
file68.168.222.6 | BianLian botnet C2 server (confidence level: 100%) | |
file43.138.22.149 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file45.86.230.103 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
file58.9.110.23 | XWorm botnet C2 server (confidence level: 75%) | |
file154.91.183.174 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file118.107.46.174 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file118.99.3.33 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file103.237.92.191 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file141.164.49.250 | XenoRAT botnet C2 server (confidence level: 100%) | |
file43.138.22.149 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file84.246.226.107 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file104.243.254.101 | Remcos botnet C2 server (confidence level: 100%) | |
file45.135.194.43 | Unknown malware botnet C2 server (confidence level: 100%) | |
file216.250.250.224 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file95.217.57.151 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file18.253.62.84 | Unknown malware botnet C2 server (confidence level: 100%) | |
file85.239.149.90 | Hook botnet C2 server (confidence level: 100%) | |
file82.27.2.251 | MooBot botnet C2 server (confidence level: 100%) | |
file91.199.42.157 | XWorm botnet C2 server (confidence level: 100%) | |
file147.185.221.28 | XWorm botnet C2 server (confidence level: 100%) | |
file45.11.229.51 | XWorm botnet C2 server (confidence level: 100%) | |
file160.25.72.96 | Remcos botnet C2 server (confidence level: 100%) | |
file154.94.233.79 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file144.126.149.221 | XWorm botnet C2 server (confidence level: 100%) | |
file117.72.105.10 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file94.154.35.174 | Latrodectus botnet C2 server (confidence level: 90%) | |
file8.134.222.115 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file59.110.83.99 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file216.250.252.245 | Remcos botnet C2 server (confidence level: 100%) | |
file139.84.214.159 | Sliver botnet C2 server (confidence level: 100%) | |
file165.232.163.129 | Sliver botnet C2 server (confidence level: 100%) | |
file95.217.57.151 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file34.55.232.213 | Unknown malware botnet C2 server (confidence level: 100%) | |
file81.95.8.176 | Unknown malware botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file187.201.97.119 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file3.101.82.15 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file13.208.252.175 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file120.27.209.132 | Chaos botnet C2 server (confidence level: 100%) | |
file8.134.181.167 | Chaos botnet C2 server (confidence level: 100%) | |
file147.185.221.23 | XWorm botnet C2 server (confidence level: 100%) | |
file1.161.103.144 | QakBot botnet C2 server (confidence level: 75%) | |
file213.133.102.42 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file52.8.145.106 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file78.40.197.146 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
file198.23.197.164 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file103.105.23.130 | ValleyRAT botnet C2 server (confidence level: 100%) |
Hash
Value | Description | Copy |
---|---|---|
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash4515 | Mirai botnet C2 server (confidence level: 100%) | |
hash999 | Mirai botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash80 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash2889 | Remcos botnet C2 server (confidence level: 100%) | |
hash63288 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash444 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash18080 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash29406 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash44409 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash23 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash222 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2281 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8013 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash17629 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash771 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2181 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2405 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2087 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2456 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash591 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash808 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash1200 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash1540 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash1311 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2079 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2455 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash2628 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash6403 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8787 | Remcos botnet C2 server (confidence level: 100%) | |
hash1912 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash9999 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8000 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
hash8886 | Loki Password Stealer (PWS) botnet C2 server (confidence level: 75%) | |
hash7c63a1520ce81dc43d2170ef1570b49627655d33e4987be2cccf8e99d9d4c99f | Unknown Stealer payload (confidence level: 100%) | |
hash8188 | Unknown Stealer botnet C2 server (confidence level: 100%) | |
hash44233 | Unknown Stealer botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8089 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Ghost RAT botnet C2 server (confidence level: 75%) | |
hash80 | Ghost RAT botnet C2 server (confidence level: 75%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Havoc botnet C2 server (confidence level: 100%) | |
hash3000 | DCRat botnet C2 server (confidence level: 100%) | |
hash8080 | ERMAC botnet C2 server (confidence level: 100%) | |
hash69 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash2 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8090 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 90%) | |
hash12925 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash2087 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | ClearFake payload delivery server (confidence level: 100%) | |
hash6000 | XWorm botnet C2 server (confidence level: 100%) | |
hash4467 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash2703 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7044 | Vjw0rm botnet C2 server (confidence level: 100%) | |
hash5000 | XWorm botnet C2 server (confidence level: 100%) | |
hash8088 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
hash50011 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash81 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8005 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash89 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Remcos botnet C2 server (confidence level: 100%) | |
hash8000 | Sliver botnet C2 server (confidence level: 100%) | |
hash100 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8848 | DCRat botnet C2 server (confidence level: 100%) | |
hash1597 | DCRat botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash5995 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash25565 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash4321 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
hash55615 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash6000 | XWorm botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | BianLian botnet C2 server (confidence level: 75%) | |
hash8879 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash1720 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash1433 | Sliver botnet C2 server (confidence level: 75%) | |
hash443 | Havoc botnet C2 server (confidence level: 75%) | |
hash64553 | Meterpreter botnet C2 server (confidence level: 66%) | |
hash17449 | NjRAT botnet C2 server (confidence level: 50%) | |
hash4444 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash6080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8086 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash7777 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash89 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash11257 | XWorm botnet C2 server (confidence level: 100%) | |
hash6443 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash4444 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash7777 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8020 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash16789 | Remcos botnet C2 server (confidence level: 100%) | |
hash4477 | Remcos botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8080 | Havoc botnet C2 server (confidence level: 100%) | |
hash4333 | DCRat botnet C2 server (confidence level: 100%) | |
hash179 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash995 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash2095 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8545 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash788 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8081 | Empire Downloader botnet C2 server (confidence level: 100%) | |
hash8443 | BianLian botnet C2 server (confidence level: 100%) | |
hash8023 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
hash18067 | XWorm botnet C2 server (confidence level: 75%) | |
hash443 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash443 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash443 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash443 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash80 | XenoRAT botnet C2 server (confidence level: 100%) | |
hash8088 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9090 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash48791 | Remcos botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash82 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8082 | Hook botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash7000 | XWorm botnet C2 server (confidence level: 100%) | |
hash38949 | XWorm botnet C2 server (confidence level: 100%) | |
hash8080 | XWorm botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash0443 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash7000 | XWorm botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 90%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash9999 | Sliver botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash80 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash636 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash501 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash6008 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash40961 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash47486 | Chaos botnet C2 server (confidence level: 100%) | |
hash54681 | Chaos botnet C2 server (confidence level: 100%) | |
hash52320 | XWorm botnet C2 server (confidence level: 100%) | |
hash443 | QakBot botnet C2 server (confidence level: 75%) | |
hash8384 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
hash7071 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash80 | ValleyRAT botnet C2 server (confidence level: 100%) |
Threat ID: 68a5141ead5a09ad00fc95d2
Added to database: 8/20/2025, 12:17:34 AM
Last enriched: 8/20/2025, 12:33:06 AM
Last updated: 8/20/2025, 7:32:34 AM
Views: 6
Related Threats
Noodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises with Social Media Footprints
MediumSalty 2FA: Undetected PhaaS Hitting US and EU Industries
MediumRansomware incidents in Japan during the first half of 2025
MediumJuly 2025 APT Attack Trends Report (South Korea)
MediumLegitimate Chrome VPN Extension Turns to Browser Spyware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.