ThreatFox IOCs for 2025-09-12
ThreatFox IOCs for 2025-09-12
AI Analysis
Technical Summary
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2025-09-12 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data lacks specific affected versions or detailed technical indicators, suggesting this is a general intelligence update rather than a detailed vulnerability or exploit report. The threat level is rated as medium with a threatLevel score of 2 and distribution score of 3, indicating moderate dissemination potential. No patches or known exploits in the wild are reported, and no Common Weakness Enumerations (CWEs) are associated, which implies this is not a newly discovered vulnerability but rather intelligence about existing or emerging malware activity patterns. The absence of detailed technical indicators or payload specifics limits the ability to deeply analyze the malware's operational mechanisms, but the focus on payload delivery and network activity suggests the threat involves malware propagation or command and control communications. The TLP (Traffic Light Protocol) white tag indicates the information is publicly shareable without restriction, supporting its use for broad defensive measures. Overall, this threat intelligence update serves as a situational awareness tool for security teams to monitor potential malware-related network activity and prepare defenses accordingly.
Potential Impact
For European organizations, the impact of this threat is primarily related to the potential for malware infections that could disrupt network operations or lead to data exfiltration. Given the medium severity and absence of known exploits, immediate critical impact is unlikely; however, the presence of payload delivery and network activity indicators means organizations could face increased risk of malware infiltration if they do not maintain robust network monitoring and endpoint defenses. The lack of specific affected software versions or exploit details means the threat could be broad and opportunistic, targeting common network services or endpoints. European entities in sectors with high exposure to network-based threats, such as finance, telecommunications, and critical infrastructure, may experience operational disruptions or data confidentiality risks if the malware payloads are successfully delivered and executed. The threat intelligence can help organizations enhance detection capabilities and prepare incident response plans to mitigate potential infections.
Mitigation Recommendations
1. Enhance network monitoring to detect unusual payload delivery attempts and anomalous network activity, leveraging threat intelligence feeds including ThreatFox IOCs. 2. Implement strict egress and ingress filtering to limit unauthorized network communications that could facilitate malware command and control. 3. Employ endpoint detection and response (EDR) solutions capable of identifying and blocking malware payloads based on behavioral analysis rather than relying solely on signature-based detection. 4. Conduct regular threat hunting exercises using the latest OSINT and IOC data to proactively identify potential infections. 5. Maintain up-to-date security awareness training for employees to recognize and report suspicious activities that could lead to malware delivery. 6. Since no patches are available, focus on hardening network and endpoint defenses and applying general best practices for malware prevention and containment. 7. Collaborate with national and European cybersecurity centers to share intelligence and receive timely alerts about emerging threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: g.kilut4ou8.ru
- url: https://realty.yourpgcountyliving.com/pixel.png
- file: 157.254.167.144
- hash: 443
- domain: pink.kuryc7yy1.ru
- domain: tiny.kuryc7yy1.ru
- url: http://47.99.193.179:8888/supershell/login/
- url: http://8.138.155.217:18888/supershell/login/
- domain: vast.kuryc7yy1.ru
- domain: neat.kuryc7yy1.ru
- domain: ftifiles.work.gd
- domain: dear.kuryc7yy1.ru
- domain: rich.jibiw8aa5.ru
- domain: cute.jibiw8aa5.ru
- domain: lean.jibiw8aa5.ru
- url: https://suctso.asia/xoza
- domain: tall.jibiw8aa5.ru
- domain: wise.jibiw8aa5.ru
- file: 124.221.237.102
- hash: 8082
- file: 45.66.11.61
- hash: 56101
- file: 216.144.226.242
- hash: 443
- file: 207.154.205.11
- hash: 7443
- file: 31.129.42.36
- hash: 443
- file: 103.20.102.130
- hash: 8848
- file: 185.221.215.43
- hash: 7777
- file: 46.246.84.12
- hash: 1963
- file: 46.246.84.12
- hash: 3000
- file: 8.141.112.241
- hash: 47486
- file: 18.199.40.209
- hash: 54681
- domain: calm.vudeh0ae3.ru
- domain: keen.vudeh0ae3.ru
- domain: zi.we4ex.ru
- domain: qd.fa6eq.ru
- domain: qra.we4ex.ru
- domain: www.4kdownload.info
- domain: www.gxh191.top
- domain: lv.we4ex.ru
- file: 111.119.222.152
- hash: 80
- file: 190.102.43.29
- hash: 80
- file: 56.155.31.116
- hash: 11101
- file: 15.206.158.46
- hash: 44818
- file: 18.162.133.33
- hash: 28245
- file: 34.234.90.240
- hash: 57722
- file: 13.212.88.229
- hash: 4592
- file: 13.212.88.229
- hash: 9142
- file: 13.212.88.229
- hash: 4242
- domain: mox.we4ex.ru
- domain: www.aliyunupdate.shop
- file: 111.230.164.244
- hash: 443
- file: 111.230.164.244
- hash: 80
- file: 111.230.164.244
- hash: 8080
- file: 111.230.164.244
- hash: 8443
- domain: tne.we4ex.ru
- url: https://leauab.asia/xakd
- domain: c4.b1o.it
- file: 179.43.186.228
- hash: 443
- file: 8.217.237.58
- hash: 7443
- file: 65.109.89.93
- hash: 80
- file: 34.248.206.212
- hash: 443
- file: 46.246.84.12
- hash: 4000
- file: 64.225.31.235
- hash: 443
- domain: home.messager.my
- file: 49.235.210.241
- hash: 17777
- file: 45.55.44.12
- hash: 8443
- file: 106.14.57.121
- hash: 17777
- file: 4.233.99.180
- hash: 3333
- file: 34.229.168.99
- hash: 3333
- file: 157.245.153.253
- hash: 443
- file: 43.138.227.137
- hash: 3333
- file: 16.171.169.63
- hash: 80
- file: 54.164.119.65
- hash: 443
- file: 34.238.41.13
- hash: 3333
- file: 103.197.188.41
- hash: 3333
- file: 103.197.188.41
- hash: 443
- file: 42.193.131.128
- hash: 13333
- file: 54.227.13.175
- hash: 3333
- file: 151.80.206.100
- hash: 443
- file: 95.163.249.222
- hash: 3333
- file: 188.34.197.140
- hash: 443
- file: 52.64.27.164
- hash: 443
- file: 192.142.10.27
- hash: 7000
- file: 185.236.20.7
- hash: 40482
- file: 196.251.115.25
- hash: 5000
- file: 196.251.118.247
- hash: 6002
- file: 170.187.138.168
- hash: 9000
- url: https://t.me/romalabs4
- domain: optisigns.pro
- url: https://tot.vumarifa.com
- domain: tot.vumarifa.com
- url: https://195.201.45.150
- url: http://91.208.197.196/ohshit.sh
- domain: du.xe3ax.ru
- file: 185.241.208.84
- hash: 7374
- file: 147.124.223.75
- hash: 62404
- file: 87.120.93.155
- hash: 7712
- file: 103.83.87.230
- hash: 8091
- domain: sn.fhelp.top
- domain: zevsol.top
- domain: helppqb.top
- domain: kri.xe3ax.ru
- domain: yn.fa6eq.ru
- file: 36.137.134.42
- hash: 5555
- file: 43.138.14.158
- hash: 9999
- file: 121.41.167.80
- hash: 80
- file: 39.97.35.139
- hash: 80
- file: 39.100.64.195
- hash: 443
- file: 124.221.237.102
- hash: 8081
- file: 157.20.182.24
- hash: 1976
- file: 156.254.21.126
- hash: 443
- domain: leauab.asia
- domain: lepidry.asia
- domain: quavevd.asia
- domain: soyabhn.asia
- domain: tarakmb.asia
- domain: enfeepy.asia
- domain: nerlzi.asia
- domain: suctso.asia
- domain: jackaw.asia
- domain: revolxh.asia
- domain: hoobow.asia
- domain: commum.asia
- domain: setqvax.asia
- domain: abbeys.asia
- domain: selfcmi.asia
- domain: plembo.asia
- domain: cloqfw.asia
- domain: familef.asia
- domain: purplde.asia
- domain: hurdln.asia
- domain: manticu.asia
- domain: runjhb.asia
- domain: bouyeit.asia
- domain: antiaix.qpon
- domain: jargonx.asia
- domain: bellmnk.asia
- domain: poisono.asia
- domain: mysidak.asia
- domain: va.xe3ax.ru
- domain: grewbix.qpon
- file: 103.83.87.230
- hash: 9180
- file: 148.135.195.121
- hash: 4444
- file: 1.95.138.3
- hash: 8091
- file: 158.94.208.23
- hash: 443
- file: 154.3.40.26
- hash: 2404
- file: 80.64.19.129
- hash: 9000
- file: 77.8.235.68
- hash: 7443
- file: 196.251.115.237
- hash: 6009
- file: 3.230.13.26
- hash: 443
- file: 150.40.118.19
- hash: 5888
- domain: caressv.qpon
- domain: provaiy.qpon
- domain: convysj.qpon
- domain: lifsnbu.qpon
- domain: clafvom.qpon
- domain: hfteozo.qpon
- file: 109.104.153.203
- hash: 443
- domain: nonsazv.qpon
- file: 116.26.11.245
- hash: 36153
- file: 154.214.53.58
- hash: 443
- url: http://413426cm.nyash.es/protectflowerdownloads.php
- file: 20.206.138.78
- hash: 8080
- file: 23.92.29.169
- hash: 8888
- domain: unknownhk1.duckdns.org
- domain: pne.xe3ax.ru
- domain: starexs.bet
- domain: notebanin.cyou
- domain: notebanjo.cyou
- domain: notebanae.cyou
- domain: aeseclink.xyz
- domain: joseclink.xyz
- domain: inweblink.xyz
- domain: onegodae.icu
- domain: onegodin.icu
- file: 5.8.71.125
- hash: 8110
- file: 45.192.201.68
- hash: 8030
- file: 111.229.118.48
- hash: 443
- file: 148.135.18.161
- hash: 1443
- file: 87.120.219.241
- hash: 7000
- domain: lx.ji1im.ru
- domain: me.fo1od.ru
- domain: xal.fo1od.ru
- domain: tr.ji1im.ru
- domain: rq.fo1od.ru
- url: http://47.238.239.22:443/aira
- domain: bti.fo1od.ru
- domain: mv.mo5un.ru
- url: https://ura.vumarifa.com
- domain: ura.vumarifa.com
- domain: cy.fo1od.ru
- domain: pc.mo5un.ru
- domain: jo.qe3yn.ru
- file: 147.185.221.29
- hash: 1337
- file: 96.126.191.167
- hash: 6000
- domain: function-assembled.gl.at.ply.gg
- domain: htgeruyukwhyj.duckdns.org
- domain: bigpappa.duckdns.org
- file: 216.9.225.28
- hash: 2404
- file: 194.195.208.43
- hash: 31337
- file: 50.114.203.169
- hash: 2125
- file: 3.123.17.149
- hash: 80
- file: 104.194.154.39
- hash: 6000
- file: 3.145.71.121
- hash: 808
- file: 3.145.71.121
- hash: 8008
- domain: vex.qe3yn.ru
- url: https://tht.vumarifa.com
- domain: tht.vumarifa.com
- url: https://webcre8.com/4r3w.js
- domain: webcre8.com
- url: https://webcre8.com/js.php
- url: http://144.31.221.88:6060/capcha9856
- url: https://4revergreen.com/ajax/pixi.min.js
- domain: 4revergreen.com
- url: https://pokelv.com/res/partygardencapital
- domain: pokelv.com
- domain: ta.qe3yn.ru
- domain: pru.qe3yn.ru
- domain: hb.wi9ik.ru
- url: http://213.209.150.141/club/view.php
- domain: avapmpvegyw0c.cfc-execute.su.baidubce.com
- domain: manageengine.su
- file: 176.65.149.34
- hash: 81
- url: https://catalogcomx.s3.us-east-1.amazonaws.com/catalogcom.txt
- domain: prinscibuck.s3.us-east-1.amazonaws.com
- domain: nectixboost.xyz
- domain: nectixboost.org
- file: 185.208.159.52
- hash: 9090
- hash: 1341bdc1465fdec9d644c23affc85c9a3483e3adaa92739760e920ff7e7cb230
- domain: secure.happyhatterreviews.com
- hash: 77f54192232041a16afdc1fac62c2dcf063cd35c6bf4eece9bb214726710f9a8
- domain: nl.qe3yn.ru
- domain: ha.bi3ux.ru
- domain: zu.wi9ik.ru
- domain: mri.bi3ux.ru
- domain: qv.bi3ux.ru
- domain: zpa.bi3ux.ru
- domain: kj.by3iq.ru
- domain: l.bi3ux.ru
- domain: an.boku0.ru
- domain: weatherforce.info
- domain: teachingbutter.info
- file: 5.144.176.117
- hash: 6707
- file: 178.17.57.60
- hash: 8443
- domain: wo.by3iq.ru
- domain: webdisk.umathurman.org
- url: https://secure.happyhatterreviews.com/pixel.png
- file: 51.81.161.229
- hash: 443
- file: 79.174.12.88
- hash: 8058
- file: 8.137.147.224
- hash: 80
- file: 196.251.83.83
- hash: 5000
- file: 162.33.179.12
- hash: 8443
- file: 82.77.149.125
- hash: 7443
- file: 195.10.205.181
- hash: 8089
- domain: titan.tail922ba4.ts.net
- domain: updater-internal.mooo.com
- domain: news.heix-energietechnik.com
- domain: www.lastsentinelflock.org
- file: 88.116.203.218
- hash: 5500
- domain: do.boku-0.ru
- file: 185.141.216.120
- hash: 1888
- file: 2.58.56.54
- hash: 1888
- url: https://185.141.216.172/gateway/o4obvot8.h7its
- domain: go.boku-0.ru
- url: http://2.58.56.54:1888/gateway/fm5xroun.0zrtw
- url: http://77.90.153.225/c9d95c9f4c224c36.php
- url: http://176.46.152.46/281ef81f2444fb93.php
- url: http://45.153.34.123/b0481cf5ba1844ec.php
- domain: he.boku-0.ru
- url: http://91.196.32.97/8a9c48a5e99a4eac.php
- url: http://toxwebapp.com/c1c44617e43e556b.php
- url: http://143.92.39.31/97dbb8f0394943c6.php
- url: http://96.9.125.98/cef01016566d4884.php
- url: http://206.123.145.165/a2d7fe84a0c94fc1.php
- url: http://172.236.192.27/c58d03b5de424a3f.php
- domain: 1308344827-4bya137jfj.ap-guangzhou.tencentscf.com
- url: https://repzzm.asia/takz
- domain: masmbv.asia
- domain: repzzm.asia
- domain: fladiw.asia
- domain: bucrew.asia
- url: https://ntv.vumarifa.com
- domain: ntv.vumarifa.com
- url: http://139.59.4.189/gateway/36hnkwg1.2kkq9
- url: https://103.146.119.92/gateway/gm4qvawu.l2o2o
- url: https://194.33.61.182/gateway/17culsk6.cf2hn
- url: https://194.33.61.162/gateway/gqmrbp7r.q76cs
- file: 193.161.193.99
- hash: 47754
- file: 147.185.221.31
- hash: 52336
- url: http://194.55.137.30/gateway/calh79rb.cjjfi
- url: http://45.156.87.246/gateway/lxl1puu6.gj9bk
- domain: shiporitoy.sbs
- domain: shiteafirs.live
- domain: shiteathre.sbs
- domain: shiteatwop.sbs
- domain: qsetshi.live
- domain: shiwa.sbs
- url: https://shiwa.sbs/gateway/uv3akw97.t5rel
- url: https://shiporitoy.sbs/gateway/uv3akw97.t5rel
- url: https://shiteafirs.live/gateway/uv3akw97.t5rel
- url: https://shiteathre.sbs/gateway/uv3akw97.t5rel
- url: https://shiteatwop.sbs/gateway/uv3akw97.t5rel
- file: 94.154.35.99
- hash: 1888
- url: http://185.141.216.120:1888/gateway/ugb6ewgu.skyru
- url: http://94.154.35.99:1888/gateway/ugb6ewgu.skyru
- url: https://94.154.35.99:1888/gateway/ugb6ewgu.skyru
- domain: as.ty1un.ru
- url: http://193.233.126.173/gateway/j2ipitfi.g7skm
- url: https://193.233.126.173/gateway/j2ipitfi.g7skm
- domain: yassinea2-47754.portmap.host
- domain: xml-suggestions.gl.at.ply.gg
- domain: yassinea-24570.portmap.host
- url: https://87.120.107.181/gateway/ou0gkk7n.p14tw
- file: 47.242.120.79
- hash: 6666
- url: https://185.196.9.64/gateway/wu25gfoo.sc9q4
- url: https://vsmoznicuj.te/gateway/araxd4kd.hakt5
- url: https://37.221.66.174/gateway/araxd4kd.hakt5
- file: 94.74.164.157
- hash: 8888
- url: http://romcablu.com/s/luck/k.php
- file: 82.24.40.24
- hash: 5000
- file: 45.91.193.160
- hash: 80
- file: 8.218.112.112
- hash: 8082
- file: 39.97.33.55
- hash: 8000
- file: 144.172.112.78
- hash: 80
- file: 158.94.208.24
- hash: 443
- file: 107.172.132.42
- hash: 2404
- file: 157.20.32.137
- hash: 2404
- file: 158.94.209.241
- hash: 5902
- file: 198.55.102.44
- hash: 14650
- file: 149.28.70.98
- hash: 443
- file: 72.14.190.211
- hash: 443
- file: 82.77.149.118
- hash: 7443
- file: 82.77.149.113
- hash: 7443
- file: 82.77.149.124
- hash: 7443
- file: 62.72.22.223
- hash: 7443
- file: 195.10.205.181
- hash: 80
- domain: microupdater.ignorelist.com
- file: 149.28.157.225
- hash: 443
- file: 45.197.133.28
- hash: 443
- file: 93.198.183.133
- hash: 81
- file: 196.251.80.67
- hash: 23
- file: 213.199.53.152
- hash: 4321
- file: 185.196.117.168
- hash: 80
- domain: md.cykugeu.ru
- url: http://pakarabi.net/loki/panel/five/fre.php
- file: 116.31.165.28
- hash: 36037
- file: 121.12.126.37
- hash: 10250
- file: 148.178.73.114
- hash: 443
- file: 85.233.75.107
- hash: 1720
- file: 146.19.128.190
- hash: 8888
- file: 8.213.237.239
- hash: 8080
- file: 92.221.243.132
- hash: 443
- domain: go.fe1it.ru
- file: 154.91.66.235
- hash: 9000
ThreatFox IOCs for 2025-09-12
Description
ThreatFox IOCs for 2025-09-12
AI-Powered Analysis
Technical Analysis
The provided information pertains to a set of Indicators of Compromise (IOCs) published on 2025-09-12 by the ThreatFox MISP Feed, categorized under malware with a focus on OSINT (Open Source Intelligence), payload delivery, and network activity. The data lacks specific affected versions or detailed technical indicators, suggesting this is a general intelligence update rather than a detailed vulnerability or exploit report. The threat level is rated as medium with a threatLevel score of 2 and distribution score of 3, indicating moderate dissemination potential. No patches or known exploits in the wild are reported, and no Common Weakness Enumerations (CWEs) are associated, which implies this is not a newly discovered vulnerability but rather intelligence about existing or emerging malware activity patterns. The absence of detailed technical indicators or payload specifics limits the ability to deeply analyze the malware's operational mechanisms, but the focus on payload delivery and network activity suggests the threat involves malware propagation or command and control communications. The TLP (Traffic Light Protocol) white tag indicates the information is publicly shareable without restriction, supporting its use for broad defensive measures. Overall, this threat intelligence update serves as a situational awareness tool for security teams to monitor potential malware-related network activity and prepare defenses accordingly.
Potential Impact
For European organizations, the impact of this threat is primarily related to the potential for malware infections that could disrupt network operations or lead to data exfiltration. Given the medium severity and absence of known exploits, immediate critical impact is unlikely; however, the presence of payload delivery and network activity indicators means organizations could face increased risk of malware infiltration if they do not maintain robust network monitoring and endpoint defenses. The lack of specific affected software versions or exploit details means the threat could be broad and opportunistic, targeting common network services or endpoints. European entities in sectors with high exposure to network-based threats, such as finance, telecommunications, and critical infrastructure, may experience operational disruptions or data confidentiality risks if the malware payloads are successfully delivered and executed. The threat intelligence can help organizations enhance detection capabilities and prepare incident response plans to mitigate potential infections.
Mitigation Recommendations
1. Enhance network monitoring to detect unusual payload delivery attempts and anomalous network activity, leveraging threat intelligence feeds including ThreatFox IOCs. 2. Implement strict egress and ingress filtering to limit unauthorized network communications that could facilitate malware command and control. 3. Employ endpoint detection and response (EDR) solutions capable of identifying and blocking malware payloads based on behavioral analysis rather than relying solely on signature-based detection. 4. Conduct regular threat hunting exercises using the latest OSINT and IOC data to proactively identify potential infections. 5. Maintain up-to-date security awareness training for employees to recognize and report suspicious activities that could lead to malware delivery. 6. Since no patches are available, focus on hardening network and endpoint defenses and applying general best practices for malware prevention and containment. 7. Collaborate with national and European cybersecurity centers to share intelligence and receive timely alerts about emerging threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 3afcb6f7-41ed-49db-9443-d5c23b0f0f6a
- Original Timestamp
- 1757721785
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domaing.kilut4ou8.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainpink.kuryc7yy1.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintiny.kuryc7yy1.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainvast.kuryc7yy1.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainneat.kuryc7yy1.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainftifiles.work.gd | Unknown malware payload delivery domain (confidence level: 100%) | |
domaindear.kuryc7yy1.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainrich.jibiw8aa5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaincute.jibiw8aa5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainlean.jibiw8aa5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintall.jibiw8aa5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainwise.jibiw8aa5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaincalm.vudeh0ae3.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainkeen.vudeh0ae3.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzi.we4ex.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainqd.fa6eq.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainqra.we4ex.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainwww.4kdownload.info | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainwww.gxh191.top | ShadowPad botnet C2 domain (confidence level: 95%) | |
domainlv.we4ex.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainmox.we4ex.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainwww.aliyunupdate.shop | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaintne.we4ex.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainc4.b1o.it | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainhome.messager.my | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainoptisigns.pro | Unknown Loader payload delivery domain (confidence level: 90%) | |
domaintot.vumarifa.com | Vidar botnet C2 domain (confidence level: 75%) | |
domaindu.xe3ax.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainsn.fhelp.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainzevsol.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainhelppqb.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainkri.xe3ax.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainyn.fa6eq.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainleauab.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlepidry.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainquavevd.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainsoyabhn.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintarakmb.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainenfeepy.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainnerlzi.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainsuctso.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainjackaw.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainrevolxh.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainhoobow.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincommum.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainsetqvax.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainabbeys.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainselfcmi.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainplembo.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincloqfw.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainfamilef.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpurplde.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainhurdln.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmanticu.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainrunjhb.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainbouyeit.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainantiaix.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainjargonx.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainbellmnk.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpoisono.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmysidak.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainva.xe3ax.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaingrewbix.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincaressv.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainprovaiy.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainconvysj.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlifsnbu.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainclafvom.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainhfteozo.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainnonsazv.qpon | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainunknownhk1.duckdns.org | XWorm botnet C2 domain (confidence level: 100%) | |
domainpne.xe3ax.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainstarexs.bet | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainnotebanin.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainnotebanjo.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainnotebanae.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainaeseclink.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainjoseclink.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaininweblink.xyz | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainonegodae.icu | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainonegodin.icu | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainlx.ji1im.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainme.fo1od.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainxal.fo1od.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintr.ji1im.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainrq.fo1od.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainbti.fo1od.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainmv.mo5un.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainura.vumarifa.com | Vidar botnet C2 domain (confidence level: 75%) | |
domaincy.fo1od.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainpc.mo5un.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainjo.qe3yn.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainfunction-assembled.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domainhtgeruyukwhyj.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainbigpappa.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainvex.qe3yn.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintht.vumarifa.com | Vidar botnet C2 domain (confidence level: 75%) | |
domainwebcre8.com | KongTuke payload delivery domain (confidence level: 100%) | |
domain4revergreen.com | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainpokelv.com | NetSupportManager RAT payload delivery domain (confidence level: 100%) | |
domainta.qe3yn.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainpru.qe3yn.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainhb.wi9ik.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainavapmpvegyw0c.cfc-execute.su.baidubce.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainmanageengine.su | Unknown Loader payload delivery domain (confidence level: 90%) | |
domainprinscibuck.s3.us-east-1.amazonaws.com | Houdini botnet C2 domain (confidence level: 100%) | |
domainnectixboost.xyz | Houdini botnet C2 domain (confidence level: 100%) | |
domainnectixboost.org | Houdini botnet C2 domain (confidence level: 100%) | |
domainsecure.happyhatterreviews.com | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domainnl.qe3yn.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainha.bi3ux.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzu.wi9ik.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainmri.bi3ux.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainqv.bi3ux.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzpa.bi3ux.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainkj.by3iq.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainl.bi3ux.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainan.boku0.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainweatherforce.info | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainteachingbutter.info | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainwo.by3iq.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainwebdisk.umathurman.org | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domaintitan.tail922ba4.ts.net | Havoc botnet C2 domain (confidence level: 100%) | |
domainupdater-internal.mooo.com | Havoc botnet C2 domain (confidence level: 100%) | |
domainnews.heix-energietechnik.com | Havoc botnet C2 domain (confidence level: 100%) | |
domainwww.lastsentinelflock.org | Venom RAT botnet C2 domain (confidence level: 100%) | |
domaindo.boku-0.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaingo.boku-0.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainhe.boku-0.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain1308344827-4bya137jfj.ap-guangzhou.tencentscf.com | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainmasmbv.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainrepzzm.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainfladiw.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainbucrew.asia | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainntv.vumarifa.com | Vidar botnet C2 domain (confidence level: 75%) | |
domainshiporitoy.sbs | Rhadamanthys botnet C2 domain (confidence level: 100%) | |
domainshiteafirs.live | Rhadamanthys botnet C2 domain (confidence level: 100%) | |
domainshiteathre.sbs | Rhadamanthys botnet C2 domain (confidence level: 100%) | |
domainshiteatwop.sbs | Rhadamanthys botnet C2 domain (confidence level: 100%) | |
domainqsetshi.live | Rhadamanthys botnet C2 domain (confidence level: 100%) | |
domainshiwa.sbs | Rhadamanthys botnet C2 domain (confidence level: 100%) | |
domainas.ty1un.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainyassinea2-47754.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domainxml-suggestions.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domainyassinea-24570.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domainmicroupdater.ignorelist.com | Havoc botnet C2 domain (confidence level: 100%) | |
domainmd.cykugeu.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaingo.fe1it.ru | ClearFake payload delivery domain (confidence level: 100%) |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://realty.yourpgcountyliving.com/pixel.png | FAKEUPDATES botnet C2 (confidence level: 100%) | |
urlhttp://47.99.193.179:8888/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://8.138.155.217:18888/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://suctso.asia/xoza | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://leauab.asia/xakd | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://t.me/romalabs4 | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://tot.vumarifa.com | Vidar botnet C2 (confidence level: 75%) | |
urlhttps://195.201.45.150 | Vidar botnet C2 (confidence level: 75%) | |
urlhttp://91.208.197.196/ohshit.sh | Unknown malware payload delivery URL (confidence level: 75%) | |
urlhttp://413426cm.nyash.es/protectflowerdownloads.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttp://47.238.239.22:443/aira | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttps://ura.vumarifa.com | Vidar botnet C2 (confidence level: 75%) | |
urlhttps://tht.vumarifa.com | Vidar botnet C2 (confidence level: 75%) | |
urlhttps://webcre8.com/4r3w.js | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://webcre8.com/js.php | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttp://144.31.221.88:6060/capcha9856 | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://4revergreen.com/ajax/pixi.min.js | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttps://pokelv.com/res/partygardencapital | NetSupportManager RAT payload delivery URL (confidence level: 100%) | |
urlhttp://213.209.150.141/club/view.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttps://catalogcomx.s3.us-east-1.amazonaws.com/catalogcom.txt | Houdini payload delivery URL (confidence level: 100%) | |
urlhttps://secure.happyhatterreviews.com/pixel.png | FAKEUPDATES botnet C2 (confidence level: 100%) | |
urlhttps://185.141.216.172/gateway/o4obvot8.h7its | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttp://2.58.56.54:1888/gateway/fm5xroun.0zrtw | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttp://77.90.153.225/c9d95c9f4c224c36.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://176.46.152.46/281ef81f2444fb93.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://45.153.34.123/b0481cf5ba1844ec.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://91.196.32.97/8a9c48a5e99a4eac.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://toxwebapp.com/c1c44617e43e556b.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://143.92.39.31/97dbb8f0394943c6.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://96.9.125.98/cef01016566d4884.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://206.123.145.165/a2d7fe84a0c94fc1.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://172.236.192.27/c58d03b5de424a3f.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttps://repzzm.asia/takz | Lumma Stealer botnet C2 (confidence level: 75%) | |
urlhttps://ntv.vumarifa.com | Vidar botnet C2 (confidence level: 75%) | |
urlhttp://139.59.4.189/gateway/36hnkwg1.2kkq9 | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://103.146.119.92/gateway/gm4qvawu.l2o2o | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://194.33.61.182/gateway/17culsk6.cf2hn | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://194.33.61.162/gateway/gqmrbp7r.q76cs | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttp://194.55.137.30/gateway/calh79rb.cjjfi | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttp://45.156.87.246/gateway/lxl1puu6.gj9bk | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://shiwa.sbs/gateway/uv3akw97.t5rel | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://shiporitoy.sbs/gateway/uv3akw97.t5rel | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://shiteafirs.live/gateway/uv3akw97.t5rel | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://shiteathre.sbs/gateway/uv3akw97.t5rel | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://shiteatwop.sbs/gateway/uv3akw97.t5rel | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttp://185.141.216.120:1888/gateway/ugb6ewgu.skyru | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttp://94.154.35.99:1888/gateway/ugb6ewgu.skyru | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://94.154.35.99:1888/gateway/ugb6ewgu.skyru | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttp://193.233.126.173/gateway/j2ipitfi.g7skm | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://193.233.126.173/gateway/j2ipitfi.g7skm | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://87.120.107.181/gateway/ou0gkk7n.p14tw | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://185.196.9.64/gateway/wu25gfoo.sc9q4 | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://vsmoznicuj.te/gateway/araxd4kd.hakt5 | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttps://37.221.66.174/gateway/araxd4kd.hakt5 | Rhadamanthys botnet C2 (confidence level: 100%) | |
urlhttp://romcablu.com/s/luck/k.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 100%) | |
urlhttp://pakarabi.net/loki/panel/five/fre.php | Loki Password Stealer (PWS) botnet C2 (confidence level: 100%) |
File
| Value | Description | Copy |
|---|---|---|
file157.254.167.144 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
file124.221.237.102 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.66.11.61 | Remcos botnet C2 server (confidence level: 100%) | |
file216.144.226.242 | Unknown malware botnet C2 server (confidence level: 100%) | |
file207.154.205.11 | Unknown malware botnet C2 server (confidence level: 100%) | |
file31.129.42.36 | Havoc botnet C2 server (confidence level: 100%) | |
file103.20.102.130 | DCRat botnet C2 server (confidence level: 100%) | |
file185.221.215.43 | DCRat botnet C2 server (confidence level: 100%) | |
file46.246.84.12 | DCRat botnet C2 server (confidence level: 100%) | |
file46.246.84.12 | DCRat botnet C2 server (confidence level: 100%) | |
file8.141.112.241 | Chaos botnet C2 server (confidence level: 100%) | |
file18.199.40.209 | Chaos botnet C2 server (confidence level: 100%) | |
file111.119.222.152 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file190.102.43.29 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
file56.155.31.116 | Meterpreter botnet C2 server (confidence level: 50%) | |
file15.206.158.46 | Meterpreter botnet C2 server (confidence level: 50%) | |
file18.162.133.33 | Meterpreter botnet C2 server (confidence level: 50%) | |
file34.234.90.240 | Meterpreter botnet C2 server (confidence level: 50%) | |
file13.212.88.229 | Meterpreter botnet C2 server (confidence level: 50%) | |
file13.212.88.229 | Meterpreter botnet C2 server (confidence level: 50%) | |
file13.212.88.229 | Meterpreter botnet C2 server (confidence level: 50%) | |
file111.230.164.244 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file111.230.164.244 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file111.230.164.244 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file111.230.164.244 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file179.43.186.228 | Unknown malware botnet C2 server (confidence level: 100%) | |
file8.217.237.58 | Unknown malware botnet C2 server (confidence level: 100%) | |
file65.109.89.93 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.248.206.212 | Havoc botnet C2 server (confidence level: 100%) | |
file46.246.84.12 | DCRat botnet C2 server (confidence level: 100%) | |
file64.225.31.235 | Unknown malware botnet C2 server (confidence level: 100%) | |
file49.235.210.241 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.55.44.12 | Unknown malware botnet C2 server (confidence level: 100%) | |
file106.14.57.121 | Unknown malware botnet C2 server (confidence level: 100%) | |
file4.233.99.180 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.229.168.99 | Unknown malware botnet C2 server (confidence level: 100%) | |
file157.245.153.253 | Unknown malware botnet C2 server (confidence level: 100%) | |
file43.138.227.137 | Unknown malware botnet C2 server (confidence level: 100%) | |
file16.171.169.63 | Unknown malware botnet C2 server (confidence level: 100%) | |
file54.164.119.65 | Unknown malware botnet C2 server (confidence level: 100%) | |
file34.238.41.13 | Unknown malware botnet C2 server (confidence level: 100%) | |
file103.197.188.41 | Unknown malware botnet C2 server (confidence level: 100%) | |
file103.197.188.41 | Unknown malware botnet C2 server (confidence level: 100%) | |
file42.193.131.128 | Unknown malware botnet C2 server (confidence level: 100%) | |
file54.227.13.175 | Unknown malware botnet C2 server (confidence level: 100%) | |
file151.80.206.100 | Unknown malware botnet C2 server (confidence level: 100%) | |
file95.163.249.222 | Unknown malware botnet C2 server (confidence level: 100%) | |
file188.34.197.140 | Unknown malware botnet C2 server (confidence level: 100%) | |
file52.64.27.164 | Unknown malware botnet C2 server (confidence level: 100%) | |
file192.142.10.27 | Remcos botnet C2 server (confidence level: 100%) | |
file185.236.20.7 | Remcos botnet C2 server (confidence level: 100%) | |
file196.251.115.25 | Remcos botnet C2 server (confidence level: 100%) | |
file196.251.118.247 | Remcos botnet C2 server (confidence level: 100%) | |
file170.187.138.168 | SectopRAT botnet C2 server (confidence level: 100%) | |
file185.241.208.84 | Remcos botnet C2 server (confidence level: 100%) | |
file147.124.223.75 | Remcos botnet C2 server (confidence level: 100%) | |
file87.120.93.155 | Aurotun Stealer botnet C2 server (confidence level: 100%) | |
file103.83.87.230 | Remcos botnet C2 server (confidence level: 75%) | |
file36.137.134.42 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.138.14.158 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file121.41.167.80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.97.35.139 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.100.64.195 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file124.221.237.102 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file157.20.182.24 | PureRAT botnet C2 server (confidence level: 88%) | |
file156.254.21.126 | XWorm botnet C2 server (confidence level: 100%) | |
file103.83.87.230 | Remcos botnet C2 server (confidence level: 75%) | |
file148.135.195.121 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file1.95.138.3 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file158.94.208.23 | Latrodectus botnet C2 server (confidence level: 100%) | |
file154.3.40.26 | Remcos botnet C2 server (confidence level: 100%) | |
file80.64.19.129 | SectopRAT botnet C2 server (confidence level: 100%) | |
file77.8.235.68 | Unknown malware botnet C2 server (confidence level: 100%) | |
file196.251.115.237 | Venom RAT botnet C2 server (confidence level: 100%) | |
file3.230.13.26 | Nimplant botnet C2 server (confidence level: 100%) | |
file150.40.118.19 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
file109.104.153.203 | Lumma Stealer botnet C2 server (confidence level: 100%) | |
file116.26.11.245 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file154.214.53.58 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file20.206.138.78 | Sliver botnet C2 server (confidence level: 75%) | |
file23.92.29.169 | Sliver botnet C2 server (confidence level: 75%) | |
file5.8.71.125 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file45.192.201.68 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file111.229.118.48 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file148.135.18.161 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file87.120.219.241 | XWorm botnet C2 server (confidence level: 100%) | |
file147.185.221.29 | XWorm botnet C2 server (confidence level: 100%) | |
file96.126.191.167 | XWorm botnet C2 server (confidence level: 100%) | |
file216.9.225.28 | Remcos botnet C2 server (confidence level: 100%) | |
file194.195.208.43 | Sliver botnet C2 server (confidence level: 100%) | |
file50.114.203.169 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file3.123.17.149 | Havoc botnet C2 server (confidence level: 100%) | |
file104.194.154.39 | DCRat botnet C2 server (confidence level: 100%) | |
file3.145.71.121 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file3.145.71.121 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file176.65.149.34 | Mirai botnet C2 server (confidence level: 100%) | |
file185.208.159.52 | Houdini botnet C2 server (confidence level: 100%) | |
file5.144.176.117 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file178.17.57.60 | Meterpreter botnet C2 server (confidence level: 75%) | |
file51.81.161.229 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
file79.174.12.88 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.137.147.224 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file196.251.83.83 | Remcos botnet C2 server (confidence level: 100%) | |
file162.33.179.12 | pupy botnet C2 server (confidence level: 100%) | |
file82.77.149.125 | Unknown malware botnet C2 server (confidence level: 100%) | |
file195.10.205.181 | Hook botnet C2 server (confidence level: 100%) | |
file88.116.203.218 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file185.141.216.120 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file2.58.56.54 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file193.161.193.99 | XWorm botnet C2 server (confidence level: 100%) | |
file147.185.221.31 | XWorm botnet C2 server (confidence level: 100%) | |
file94.154.35.99 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file47.242.120.79 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file94.74.164.157 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
file82.24.40.24 | XWorm botnet C2 server (confidence level: 100%) | |
file45.91.193.160 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.218.112.112 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.97.33.55 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file144.172.112.78 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file158.94.208.24 | Latrodectus botnet C2 server (confidence level: 100%) | |
file107.172.132.42 | Remcos botnet C2 server (confidence level: 100%) | |
file157.20.32.137 | Remcos botnet C2 server (confidence level: 100%) | |
file158.94.209.241 | Remcos botnet C2 server (confidence level: 100%) | |
file198.55.102.44 | Remcos botnet C2 server (confidence level: 100%) | |
file149.28.70.98 | pupy botnet C2 server (confidence level: 100%) | |
file72.14.190.211 | Sliver botnet C2 server (confidence level: 100%) | |
file82.77.149.118 | Unknown malware botnet C2 server (confidence level: 100%) | |
file82.77.149.113 | Unknown malware botnet C2 server (confidence level: 100%) | |
file82.77.149.124 | Unknown malware botnet C2 server (confidence level: 100%) | |
file62.72.22.223 | Unknown malware botnet C2 server (confidence level: 100%) | |
file195.10.205.181 | Hook botnet C2 server (confidence level: 100%) | |
file149.28.157.225 | Havoc botnet C2 server (confidence level: 100%) | |
file45.197.133.28 | Havoc botnet C2 server (confidence level: 100%) | |
file93.198.183.133 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file196.251.80.67 | Bashlite botnet C2 server (confidence level: 100%) | |
file213.199.53.152 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file185.196.117.168 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file116.31.165.28 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file121.12.126.37 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.73.114 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file85.233.75.107 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file146.19.128.190 | Meterpreter botnet C2 server (confidence level: 75%) | |
file8.213.237.239 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file92.221.243.132 | Meterpreter botnet C2 server (confidence level: 75%) | |
file154.91.66.235 | ValleyRAT botnet C2 server (confidence level: 100%) |
Hash
| Value | Description | Copy |
|---|---|---|
hash443 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
hash8082 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash56101 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash8848 | DCRat botnet C2 server (confidence level: 100%) | |
hash7777 | DCRat botnet C2 server (confidence level: 100%) | |
hash1963 | DCRat botnet C2 server (confidence level: 100%) | |
hash3000 | DCRat botnet C2 server (confidence level: 100%) | |
hash47486 | Chaos botnet C2 server (confidence level: 100%) | |
hash54681 | Chaos botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 50%) | |
hash11101 | Meterpreter botnet C2 server (confidence level: 50%) | |
hash44818 | Meterpreter botnet C2 server (confidence level: 50%) | |
hash28245 | Meterpreter botnet C2 server (confidence level: 50%) | |
hash57722 | Meterpreter botnet C2 server (confidence level: 50%) | |
hash4592 | Meterpreter botnet C2 server (confidence level: 50%) | |
hash9142 | Meterpreter botnet C2 server (confidence level: 50%) | |
hash4242 | Meterpreter botnet C2 server (confidence level: 50%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash4000 | DCRat botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash17777 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash17777 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash13333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7000 | Remcos botnet C2 server (confidence level: 100%) | |
hash40482 | Remcos botnet C2 server (confidence level: 100%) | |
hash5000 | Remcos botnet C2 server (confidence level: 100%) | |
hash6002 | Remcos botnet C2 server (confidence level: 100%) | |
hash9000 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash7374 | Remcos botnet C2 server (confidence level: 100%) | |
hash62404 | Remcos botnet C2 server (confidence level: 100%) | |
hash7712 | Aurotun Stealer botnet C2 server (confidence level: 100%) | |
hash8091 | Remcos botnet C2 server (confidence level: 75%) | |
hash5555 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash9999 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8081 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash1976 | PureRAT botnet C2 server (confidence level: 88%) | |
hash443 | XWorm botnet C2 server (confidence level: 100%) | |
hash9180 | Remcos botnet C2 server (confidence level: 75%) | |
hash4444 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8091 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash9000 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash6009 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash443 | Nimplant botnet C2 server (confidence level: 100%) | |
hash5888 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Lumma Stealer botnet C2 server (confidence level: 100%) | |
hash36153 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash8080 | Sliver botnet C2 server (confidence level: 75%) | |
hash8888 | Sliver botnet C2 server (confidence level: 75%) | |
hash8110 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash8030 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash1443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash7000 | XWorm botnet C2 server (confidence level: 100%) | |
hash1337 | XWorm botnet C2 server (confidence level: 100%) | |
hash6000 | XWorm botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash31337 | Sliver botnet C2 server (confidence level: 100%) | |
hash2125 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash80 | Havoc botnet C2 server (confidence level: 100%) | |
hash6000 | DCRat botnet C2 server (confidence level: 100%) | |
hash808 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8008 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash81 | Mirai botnet C2 server (confidence level: 100%) | |
hash9090 | Houdini botnet C2 server (confidence level: 100%) | |
hash1341bdc1465fdec9d644c23affc85c9a3483e3adaa92739760e920ff7e7cb230 | Houdini payload (confidence level: 100%) | |
hash77f54192232041a16afdc1fac62c2dcf063cd35c6bf4eece9bb214726710f9a8 | Unknown Stealer payload (confidence level: 100%) | |
hash6707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8443 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash443 | FAKEUPDATES botnet C2 server (confidence level: 100%) | |
hash8058 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash5000 | Remcos botnet C2 server (confidence level: 100%) | |
hash8443 | pupy botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8089 | Hook botnet C2 server (confidence level: 100%) | |
hash5500 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash1888 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash1888 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash47754 | XWorm botnet C2 server (confidence level: 100%) | |
hash52336 | XWorm botnet C2 server (confidence level: 100%) | |
hash1888 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash6666 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash8888 | Rhadamanthys botnet C2 server (confidence level: 100%) | |
hash5000 | XWorm botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8082 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8000 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Latrodectus botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash5902 | Remcos botnet C2 server (confidence level: 100%) | |
hash14650 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | pupy botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Hook botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash81 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash23 | Bashlite botnet C2 server (confidence level: 100%) | |
hash4321 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash36037 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash10250 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash1720 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash8888 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash9000 | ValleyRAT botnet C2 server (confidence level: 100%) |
Threat ID: 68c4b61a6da8ad0abf37a4ba
Added to database: 9/13/2025, 12:08:58 AM
Last enriched: 9/13/2025, 12:24:13 AM
Last updated: 10/30/2025, 11:34:39 AM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-10-29
MediumHackers Use NFC Relay Malware to Clone Android Tap-to-Pay Transactions
MediumSuspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
MediumGHOSTGRAB ANDROID MALWARE
MediumAnalysis of Trigona Threat Actor's Latest Attack Cases
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.