ThreatFox IOCs for 2025-12-27
ThreatFox IOCs for 2025-12-27
AI Analysis
Technical Summary
The provided information pertains to a ThreatFox feed entry dated December 27, 2025, describing malware-related Indicators of Compromise (IOCs) primarily associated with OSINT and network activity aimed at payload delivery. ThreatFox is a platform that aggregates threat intelligence, including IOCs, to assist in identifying malicious activity. This entry is categorized under OSINT and network activity, indicating that the threat involves leveraging open-source intelligence techniques and network-based vectors to deliver malicious payloads. However, the entry lacks specific technical details such as affected software versions, concrete indicators, or exploit mechanisms. The threat level is rated as medium, with a threatLevel metric of 2 and distribution metric of 3, suggesting moderate dissemination or targeting scope. There are no known exploits in the wild, no patches available, and no CWE identifiers, which implies that this is either a newly observed threat or one that is still under analysis. The absence of detailed indicators limits the ability to perform signature-based detection or targeted mitigation. The threat likely involves network activity that could be used to deliver malware payloads, potentially exploiting OSINT techniques to identify vulnerable targets or gather reconnaissance data. The TLP (Traffic Light Protocol) white tag indicates that the information is publicly shareable without restrictions. Overall, this entry serves as an alert to monitor for emerging IOCs related to OSINT-driven payload delivery malware, emphasizing the need for vigilance in network monitoring and threat intelligence consumption.
Potential Impact
For European organizations, the impact of this threat could manifest as increased exposure to malware delivered through network-based vectors informed by OSINT techniques. Such payload delivery mechanisms can lead to unauthorized access, data exfiltration, or disruption of services depending on the malware's capabilities. The medium severity rating suggests a moderate risk level, with potential impacts on confidentiality and integrity if payloads successfully compromise systems. Given the lack of known exploits and patches, organizations may face challenges in preemptively defending against this threat without updated intelligence. The threat could particularly affect sectors relying heavily on open-source intelligence for operational purposes or those with extensive network exposure. Disruption or compromise could lead to reputational damage, regulatory penalties under GDPR if personal data is involved, and operational downtime. The absence of detailed indicators means that detection and response may rely heavily on heuristic and behavioral analysis rather than signature-based methods. European entities with critical infrastructure or high-value data assets could be targeted for reconnaissance and subsequent payload delivery, amplifying potential impacts.
Mitigation Recommendations
1. Integrate ThreatFox and other OSINT threat intelligence feeds into Security Information and Event Management (SIEM) systems to enhance detection capabilities for emerging IOCs. 2. Employ advanced network monitoring tools capable of detecting anomalous payload delivery activity, including deep packet inspection and behavioral analytics. 3. Conduct regular threat hunting exercises focused on OSINT-driven attack vectors and payload delivery patterns. 4. Harden network perimeter defenses by implementing strict egress and ingress filtering, segmentation, and zero-trust principles to limit lateral movement. 5. Train security teams to recognize OSINT exploitation tactics and incorporate this knowledge into incident response playbooks. 6. Maintain up-to-date endpoint detection and response (EDR) solutions with heuristic and anomaly detection capabilities to identify novel malware behaviors. 7. Collaborate with national and European cybersecurity centers to share intelligence and receive timely alerts on evolving threats. 8. Since no patches are available, emphasize proactive detection and containment rather than reliance on vulnerability remediation. 9. Regularly review and update OSINT usage policies to minimize exposure to adversary reconnaissance. 10. Implement multi-factor authentication and strict access controls to reduce the impact of potential payload delivery compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
Indicators of Compromise
- domain: koz7.in.net
- domain: koz9.in.net
- domain: koz3.in.net
- domain: koz4.in.net
- domain: koz6.in.net
- domain: koz8.in.net
- file: 46.151.182.229
- hash: 1999
- file: 217.156.122.82
- hash: 80
- file: 95.164.123.123
- hash: 80
- domain: teklynx.eu.com
- file: 62.164.177.35
- hash: 80
- file: 1.12.231.30
- hash: 8080
- file: 43.201.53.65
- hash: 8888
- file: 47.105.55.111
- hash: 8888
- file: 8.217.97.238
- hash: 8888
- file: 95.9.236.229
- hash: 8811
- file: 188.93.233.106
- hash: 8808
- file: 45.156.87.134
- hash: 8008
- file: 42.112.102.202
- hash: 443
- file: 139.180.144.53
- hash: 443
- file: 155.117.45.119
- hash: 8443
- file: 43.153.171.132
- hash: 60000
- file: 45.33.88.161
- hash: 443
- file: 140.82.54.173
- hash: 443
- file: 144.172.107.90
- hash: 443
- file: 126.209.7.138
- hash: 443
- file: 158.101.250.78
- hash: 443
- file: 4.231.170.99
- hash: 3333
- file: 18.139.79.104
- hash: 8443
- file: 57.129.40.69
- hash: 51777
- file: 51.21.131.46
- hash: 3333
- file: 3.106.236.188
- hash: 443
- file: 185.173.235.226
- hash: 3333
- file: 178.16.137.37
- hash: 3778
- file: 172.111.169.5
- hash: 5671
- file: 106.55.5.111
- hash: 8888
- file: 23.237.106.59
- hash: 7777
- file: 102.98.126.127
- hash: 443
- domain: q.ciberseguridad-eia.xyz
- file: 172.86.88.169
- hash: 8080
- file: 72.62.20.196
- hash: 443
- file: 35.183.218.216
- hash: 443
- file: 138.199.222.6
- hash: 443
- file: 18.221.122.235
- hash: 80
- file: 77.120.165.2
- hash: 443
- file: 195.15.215.249
- hash: 443
- file: 185.109.216.74
- hash: 443
- file: 13.58.101.213
- hash: 443
- file: 157.230.182.134
- hash: 443
- domain: x9ka4m3w.quartz-punch.ru
- domain: d9o15ky4.quartz-punch.ru
- file: 206.238.144.183
- hash: 23051
- url: https://35.183.218.216/
- url: https://72.62.20.196/
- url: https://157.230.182.134/
- url: https://195.15.215.249/
- domain: imdeveloper.work.gd
- file: 178.236.252.42
- hash: 80
- file: 89.110.110.198
- hash: 80
- domain: 280krm6i.fl1pbramble.ru
- domain: kg5991s6.fl1pbramble.ru
- domain: 4voy0soi.t0gglefern.ru
- domain: srow43xf.t0gglefern.ru
- domain: bwlhpb27.j1nkspur.ru
- domain: hd01chih.j1nkspur.ru
- domain: xrbjetr5.bristle-cove.ru
- domain: w37usb1b.bristle-cove.ru
- file: 34.231.249.185
- hash: 443
- file: 155.117.98.14
- hash: 8888
- file: 188.69.166.114
- hash: 8808
- file: 144.126.149.104
- hash: 2020
- file: 199.217.99.210
- hash: 7443
- file: 83.217.208.170
- hash: 7443
- file: 201.210.90.254
- hash: 443
- file: 185.76.243.139
- hash: 37585
- file: 141.11.0.202
- hash: 4444
- file: 148.113.205.94
- hash: 443
- file: 45.79.202.83
- hash: 443
- file: 201.249.59.30
- hash: 443
- file: 152.42.225.73
- hash: 443
- file: 152.42.225.73
- hash: 80
- file: 198.7.124.197
- hash: 443
- domain: mw6agx4t.hushripple.ru
- domain: c05e0yah.hushripple.ru
- url: https://206.189.236.65/
- url: https://64.23.172.46/
- url: https://152.42.225.73/
- url: https://45.79.202.83/
- url: https://148.113.205.94/
- file: 84.54.33.50
- hash: 8080
- file: 185.34.101.146
- hash: 1604
- url: http://178.236.252.42
- domain: messikoko2014.no-ip.biz
- domain: vhglsckb.hush-ripple.ru
- domain: dtr2u19m.hush-ripple.ru
- domain: 8rkjy130.bristlecove.ru
- domain: k62hnb6k.bristlecove.ru
- file: 111.230.66.165
- hash: 8080
- file: 103.212.187.23
- hash: 4444
- file: 194.180.158.154
- hash: 10000
- file: 104.248.170.189
- hash: 8001
- file: 46.101.12.38
- hash: 8001
- file: 209.97.153.64
- hash: 8001
- file: 138.68.144.209
- hash: 8001
- file: 134.209.31.183
- hash: 8001
- file: 165.232.105.251
- hash: 8001
- file: 134.209.196.145
- hash: 8001
- url: http://shalyunkotmoroz-104.icu/b5a52ebb310b65f06dd10cfe69f72363/
- domain: shalyunkotmoroz-104.icu
- domain: viewblood.info
- domain: booksbabies.info
- domain: grassturkey.info
- domain: paperbee.xyz
- file: 107.172.217.220
- hash: 80
- file: 107.172.217.220
- hash: 443
- file: 69.197.134.88
- hash: 443
- file: 155.117.98.19
- hash: 8888
- file: 165.154.224.129
- hash: 8888
- file: 168.220.236.196
- hash: 443
- file: 185.4.64.128
- hash: 80
- file: 65.21.248.222
- hash: 443
- file: 142.93.179.103
- hash: 8081
- file: 178.236.16.12
- hash: 443
- file: 185.4.65.177
- hash: 443
- file: 13.218.57.74
- hash: 80
- file: 13.218.57.74
- hash: 443
- file: 192.53.167.241
- hash: 80
- file: 192.53.167.241
- hash: 443
- file: 132.148.78.83
- hash: 443
- file: 132.148.78.83
- hash: 444
- file: 49.13.228.105
- hash: 443
- file: 78.46.240.128
- hash: 443
- file: 81.198.74.227
- hash: 443
- file: 81.198.74.227
- hash: 80
- domain: um2fa09y.j-1-nkspur.ru
- domain: kla87xnt.j-1-nkspur.ru
- file: 89.124.66.189
- hash: 51515
- domain: tailcoat.xyz
- url: https://13.218.57.74/
- url: https://185.4.64.128/
- url: https://192.53.167.241/
- url: https://132.148.78.83/
- url: https://178.236.16.12/
- url: https://49.13.228.105/
- url: https://65.21.248.222/
- url: https://185.4.65.177/
- url: https://81.198.74.227/
- url: https://78.46.240.128/
- domain: 5pgut9ly.givin8karba5.ru
- domain: 45wyxveb.givin8karba5.ru
- file: 38.60.209.55
- hash: 443
- file: 178.79.133.112
- hash: 31337
- file: 37.60.242.221
- hash: 8082
- file: 66.78.40.90
- hash: 60000
- file: 191.209.58.15
- hash: 3333
- file: 20.51.197.118
- hash: 3636
- file: 143.198.10.134
- hash: 3333
- file: 123.57.152.240
- hash: 41541
- file: 13.60.235.49
- hash: 3333
- file: 221.224.130.226
- hash: 3333
- domain: 3t29yzra.5purbu7y.ru
- domain: z63jsowz.5purbu7y.ru
- domain: 8fltdnni.5purbu7y.ru
- domain: y2sv71w4.5purbu7y.ru
- domain: 4uw50lrg.5purbu7y.ru
- domain: rnml2bsj.5purbu7y.ru
- domain: erspnnas.5purbu7y.ru
- domain: miraslkx.c0nfectgod5on.ru
- domain: tfuvb9xb.c0nfectgod5on.ru
- domain: 33zvn57u.c0nfectgod5on.ru
- domain: sosato-31557.portmap.host
- file: 45.141.215.113
- hash: 2404
- domain: cepte-kampanya-2026.cfd
- file: 116.102.237.0
- hash: 7000
- file: 169.50.189.146
- hash: 443
- file: 188.166.162.138
- hash: 443
- file: 47.129.168.82
- hash: 443
- file: 142.93.179.103
- hash: 8080
- file: 82.165.173.192
- hash: 443
- file: 185.4.64.128
- hash: 443
- file: 167.86.117.147
- hash: 443
- file: 216.92.226.14
- hash: 443
- file: 102.206.27.46
- hash: 80
- url: https://tuvalul.cyou/api
- domain: y59d2xt3.1nterject0il.ru
- domain: augox4go.1nterject0il.ru
- domain: 1usljhth.1nterject0il.ru
- url: https://kanekoyozo.jp/
- domain: o11u1d4p.get2b0ut.ru
- domain: 95ejtn2v.get2b0ut.ru
- domain: 9h54jr6k.get2b0ut.ru
- domain: zh.goog1e.dpdns.org
- file: 139.196.223.82
- hash: 8443
- domain: f4s1ud3i.h0wevpro5eca.ru
- domain: ypbudxdj.h0wevpro5eca.ru
- file: 43.153.60.198
- hash: 8443
- domain: 7mqyam5a.h0wevpro5eca.ru
- domain: r7ohz2wt.fabu1ou5down.ru
- domain: td24nm0b.fabu1ou5down.ru
- domain: tybt39bz.fabu1ou5down.ru
- domain: fwmi46ip.ai7uninit1at.ru
- domain: oraamrw7.ai7uninit1at.ru
- domain: tgophp9p.ai7uninit1at.ru
- url: https://169.50.189.146/
- url: https://82.165.173.192/
- url: https://216.92.226.14/
- url: https://167.86.117.147/
- url: https://188.166.162.138/
- domain: b2c82xwr.repe2t5tuffy.ru
- domain: 5qtw3lvf.repe2t5tuffy.ru
- domain: j7f3fm89.repe2t5tuffy.ru
- domain: aw4e97im.cerem0nyiwas1.ru
- domain: qyaf95d8.cerem0nyiwas1.ru
- domain: b12mtww0.cerem0nyiwas1.ru
- domain: h8fd573x.a9uedmu5eum.ru
- domain: m6vc0q91.a9uedmu5eum.ru
- domain: rq44wt3c.a9uedmu5eum.ru
- domain: zwssy2gy.b2dmintonper5.ru
- domain: j73qaq77.b2dmintonper5.ru
- domain: p9xz8kwz.b2dmintonper5.ru
- domain: 80jm3i5h.crypt5t2te.ru
- domain: zx5666xc.crypt5t2te.ru
- domain: qm3y81ja.crypt5t2te.ru
- domain: c22.yourbigbro.shop
- domain: zxv70ud6.s0ci0ltendency.ru
- domain: a5ganxmg.s0ci0ltendency.ru
- domain: k2xyv9zj.s0ci0ltendency.ru
- domain: 2jznszsn.redf1ee7.ru
- domain: e6xa096z.redf1ee7.ru
- domain: w2q9lxtj.redf1ee7.ru
- domain: d44vdnpu.dealblitz.qpon
- file: 203.91.74.3
- hash: 443
- file: 83.229.125.215
- hash: 4433
- file: 45.249.208.252
- hash: 3334
- file: 69.164.251.37
- hash: 4047
- file: 37.72.172.58
- hash: 8808
- file: 158.220.96.15
- hash: 3323
- file: 69.164.252.4
- hash: 8089
- file: 173.191.70.220
- hash: 4782
- file: 185.237.166.38
- hash: 4444
- file: 52.204.219.144
- hash: 2380
- file: 52.204.219.144
- hash: 5280
- file: 52.204.219.144
- hash: 8880
- file: 3.89.221.73
- hash: 443
- file: 103.221.252.52
- hash: 80
- file: 169.51.48.11
- hash: 80
- file: 74.207.236.7
- hash: 80
- file: 92.119.121.30
- hash: 443
- file: 159.223.173.232
- hash: 443
- domain: mhjmwloj.rabattkiste.qpon
- domain: z22sc59w.rabattkiste.qpon
- domain: fi8vr6q1.rabattkiste.qpon
- file: 142.93.83.110
- hash: 8001
- file: 174.138.92.169
- hash: 8001
- file: 134.122.98.230
- hash: 8001
- file: 46.101.78.45
- hash: 8001
- file: 159.203.104.232
- hash: 8001
- file: 161.35.82.49
- hash: 8001
- file: 165.22.3.49
- hash: 8001
- file: 161.35.167.44
- hash: 8001
- file: 138.197.64.170
- hash: 8001
- file: 46.101.75.131
- hash: 8001
- domain: 4ry8jdls.sparmarkt.qpon
- domain: c4y3itze.sparmarkt.qpon
- domain: zylxz5wp.sparmarkt.qpon
- domain: 7b4m2pvx.perkmeister.qpon
- domain: 4a4cn2sm.perkmeister.qpon
- domain: 7ylfs86u.perkmeister.qpon
- domain: ozezesx1.couponforge.qpon
- domain: bu7nil0q.couponforge.qpon
- domain: ispg4tzl.couponforge.qpon
- domain: vml9rdmh.bonusquelle.qpon
- domain: yyce0en9.bonusquelle.qpon
- domain: 6g3xqw6s.bonusquelle.qpon
- file: 95.40.120.43
- hash: 553
- domain: 84sruvb9.bargainbucht.qpon
- domain: cisun35q.bargainbucht.qpon
- domain: 9pbhrc3o.bargainbucht.qpon
- domain: yhkd41e4.savefalke.qpon
- domain: r4ojz98h.savefalke.qpon
- domain: hhgyqyai.savefalke.qpon
- domain: tspmo-40154.portmap.host
- file: 5.178.103.58
- hash: 6606
- file: 5.178.103.58
- hash: 7707
- file: 106.225.234.89
- hash: 10250
- file: 178.79.133.112
- hash: 443
- file: 98.142.253.183
- hash: 33312
- domain: avatarcoder.ddns.net
- domain: qjrkh8m1.savefalke.qpon
- domain: ljogytxh.dealzauber.qpon
- domain: p6baqeca.dealzauber.qpon
- domain: z724fxb3.dealzauber.qpon
- domain: p31dr0bs.dealzauber.qpon
- file: 119.3.156.32
- hash: 80
- domain: ctnodeexporter.chatutor.com
- domain: ctdify.chatutor.com
- file: 102.117.171.39
- hash: 7443
- domain: liverfatdiet.stechdaily.com
- file: 23.237.106.58
- hash: 7777
- file: 102.98.76.115
- hash: 443
- domain: github.ciberseguridad-eia.xyz
- domain: api.ciberseguridad-eia.xyz
- file: 98.81.166.227
- hash: 19420
- file: 159.223.105.127
- hash: 443
- file: 124.70.99.232
- hash: 443
- file: 43.157.56.250
- hash: 443
- file: 216.92.48.31
- hash: 80
- domain: 6kl4y41v.preisdrop.qpon
- domain: nci5ab3x.preisdrop.qpon
- domain: tf72zgyh.preisdrop.qpon
- domain: 6warimna.preisdrop.qpon
- domain: qfjal5xm.redf1ee7.ru
- domain: fd4ol8zs.redf1ee7.ru
- domain: inhibyln.redf1ee7.ru
- domain: 2sv9bgxa.redf1ee7.ru
- domain: 83x6d0ks.compres5text0l.ru
- domain: iyhrsk8v.compres5text0l.ru
- domain: 8ouero1r.compres5text0l.ru
- domain: 5cw7rw2b.compres5text0l.ru
- domain: l4r97zzd.c2bba8etip.ru
- domain: zfbbu8bs.c2bba8etip.ru
- domain: vrna7onz.c2bba8etip.ru
- domain: xaesdb97.c2bba8etip.ru
- domain: 7zxnifkk.ecumen1sm0ff.ru
- domain: zqdqgezv.ecumen1sm0ff.ru
- domain: f94vb8l0.ecumen1sm0ff.ru
- domain: ai2uuwqw.ecumen1sm0ff.ru
- domain: 8uhifp9q.arm2turege7m.ru
- domain: 5sreizuv.arm2turege7m.ru
- domain: ru38kvwa.arm2turege7m.ru
- domain: yk7vp5q0.arm2turege7m.ru
ThreatFox IOCs for 2025-12-27
Description
ThreatFox IOCs for 2025-12-27
AI-Powered Analysis
Technical Analysis
The provided information pertains to a ThreatFox feed entry dated December 27, 2025, describing malware-related Indicators of Compromise (IOCs) primarily associated with OSINT and network activity aimed at payload delivery. ThreatFox is a platform that aggregates threat intelligence, including IOCs, to assist in identifying malicious activity. This entry is categorized under OSINT and network activity, indicating that the threat involves leveraging open-source intelligence techniques and network-based vectors to deliver malicious payloads. However, the entry lacks specific technical details such as affected software versions, concrete indicators, or exploit mechanisms. The threat level is rated as medium, with a threatLevel metric of 2 and distribution metric of 3, suggesting moderate dissemination or targeting scope. There are no known exploits in the wild, no patches available, and no CWE identifiers, which implies that this is either a newly observed threat or one that is still under analysis. The absence of detailed indicators limits the ability to perform signature-based detection or targeted mitigation. The threat likely involves network activity that could be used to deliver malware payloads, potentially exploiting OSINT techniques to identify vulnerable targets or gather reconnaissance data. The TLP (Traffic Light Protocol) white tag indicates that the information is publicly shareable without restrictions. Overall, this entry serves as an alert to monitor for emerging IOCs related to OSINT-driven payload delivery malware, emphasizing the need for vigilance in network monitoring and threat intelligence consumption.
Potential Impact
For European organizations, the impact of this threat could manifest as increased exposure to malware delivered through network-based vectors informed by OSINT techniques. Such payload delivery mechanisms can lead to unauthorized access, data exfiltration, or disruption of services depending on the malware's capabilities. The medium severity rating suggests a moderate risk level, with potential impacts on confidentiality and integrity if payloads successfully compromise systems. Given the lack of known exploits and patches, organizations may face challenges in preemptively defending against this threat without updated intelligence. The threat could particularly affect sectors relying heavily on open-source intelligence for operational purposes or those with extensive network exposure. Disruption or compromise could lead to reputational damage, regulatory penalties under GDPR if personal data is involved, and operational downtime. The absence of detailed indicators means that detection and response may rely heavily on heuristic and behavioral analysis rather than signature-based methods. European entities with critical infrastructure or high-value data assets could be targeted for reconnaissance and subsequent payload delivery, amplifying potential impacts.
Mitigation Recommendations
1. Integrate ThreatFox and other OSINT threat intelligence feeds into Security Information and Event Management (SIEM) systems to enhance detection capabilities for emerging IOCs. 2. Employ advanced network monitoring tools capable of detecting anomalous payload delivery activity, including deep packet inspection and behavioral analytics. 3. Conduct regular threat hunting exercises focused on OSINT-driven attack vectors and payload delivery patterns. 4. Harden network perimeter defenses by implementing strict egress and ingress filtering, segmentation, and zero-trust principles to limit lateral movement. 5. Train security teams to recognize OSINT exploitation tactics and incorporate this knowledge into incident response playbooks. 6. Maintain up-to-date endpoint detection and response (EDR) solutions with heuristic and anomaly detection capabilities to identify novel malware behaviors. 7. Collaborate with national and European cybersecurity centers to share intelligence and receive timely alerts on evolving threats. 8. Since no patches are available, emphasize proactive detection and containment rather than reliance on vulnerability remediation. 9. Regularly review and update OSINT usage policies to minimize exposure to adversary reconnaissance. 10. Implement multi-factor authentication and strict access controls to reduce the impact of potential payload delivery compromises.
Affected Countries
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- 19c332a3-5fb6-4a65-a5be-134c14db5a20
- Original Timestamp
- 1766880186
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainkoz7.in.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainkoz9.in.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainkoz3.in.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainkoz4.in.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainkoz6.in.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainkoz8.in.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainteklynx.eu.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainq.ciberseguridad-eia.xyz | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainx9ka4m3w.quartz-punch.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaind9o15ky4.quartz-punch.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainimdeveloper.work.gd | Quasar RAT botnet C2 domain (confidence level: 75%) | |
domain280krm6i.fl1pbramble.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainkg5991s6.fl1pbramble.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain4voy0soi.t0gglefern.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainsrow43xf.t0gglefern.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainbwlhpb27.j1nkspur.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainhd01chih.j1nkspur.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainxrbjetr5.bristle-cove.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainw37usb1b.bristle-cove.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainmw6agx4t.hushripple.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainc05e0yah.hushripple.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainmessikoko2014.no-ip.biz | NjRAT botnet C2 domain (confidence level: 100%) | |
domainvhglsckb.hush-ripple.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaindtr2u19m.hush-ripple.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain8rkjy130.bristlecove.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaink62hnb6k.bristlecove.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainshalyunkotmoroz-104.icu | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainviewblood.info | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainbooksbabies.info | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domaingrassturkey.info | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainpaperbee.xyz | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domainum2fa09y.j-1-nkspur.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainkla87xnt.j-1-nkspur.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintailcoat.xyz | Unknown Loader botnet C2 domain (confidence level: 100%) | |
domain5pgut9ly.givin8karba5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain45wyxveb.givin8karba5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain3t29yzra.5purbu7y.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainz63jsowz.5purbu7y.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain8fltdnni.5purbu7y.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainy2sv71w4.5purbu7y.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain4uw50lrg.5purbu7y.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainrnml2bsj.5purbu7y.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainerspnnas.5purbu7y.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainmiraslkx.c0nfectgod5on.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintfuvb9xb.c0nfectgod5on.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain33zvn57u.c0nfectgod5on.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainsosato-31557.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domaincepte-kampanya-2026.cfd | Hook botnet C2 domain (confidence level: 100%) | |
domainy59d2xt3.1nterject0il.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainaugox4go.1nterject0il.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain1usljhth.1nterject0il.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaino11u1d4p.get2b0ut.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain95ejtn2v.get2b0ut.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain9h54jr6k.get2b0ut.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzh.goog1e.dpdns.org | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainf4s1ud3i.h0wevpro5eca.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainypbudxdj.h0wevpro5eca.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain7mqyam5a.h0wevpro5eca.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainr7ohz2wt.fabu1ou5down.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintd24nm0b.fabu1ou5down.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintybt39bz.fabu1ou5down.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainfwmi46ip.ai7uninit1at.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainoraamrw7.ai7uninit1at.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaintgophp9p.ai7uninit1at.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainb2c82xwr.repe2t5tuffy.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain5qtw3lvf.repe2t5tuffy.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainj7f3fm89.repe2t5tuffy.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainaw4e97im.cerem0nyiwas1.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainqyaf95d8.cerem0nyiwas1.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainb12mtww0.cerem0nyiwas1.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainh8fd573x.a9uedmu5eum.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainm6vc0q91.a9uedmu5eum.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainrq44wt3c.a9uedmu5eum.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzwssy2gy.b2dmintonper5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainj73qaq77.b2dmintonper5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainp9xz8kwz.b2dmintonper5.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain80jm3i5h.crypt5t2te.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzx5666xc.crypt5t2te.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainqm3y81ja.crypt5t2te.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainc22.yourbigbro.shop | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainzxv70ud6.s0ci0ltendency.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaina5ganxmg.s0ci0ltendency.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaink2xyv9zj.s0ci0ltendency.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain2jznszsn.redf1ee7.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaine6xa096z.redf1ee7.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainw2q9lxtj.redf1ee7.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaind44vdnpu.dealblitz.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainmhjmwloj.rabattkiste.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainz22sc59w.rabattkiste.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainfi8vr6q1.rabattkiste.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domain4ry8jdls.sparmarkt.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainc4y3itze.sparmarkt.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainzylxz5wp.sparmarkt.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domain7b4m2pvx.perkmeister.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domain4a4cn2sm.perkmeister.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domain7ylfs86u.perkmeister.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainozezesx1.couponforge.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainbu7nil0q.couponforge.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainispg4tzl.couponforge.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainvml9rdmh.bonusquelle.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainyyce0en9.bonusquelle.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domain6g3xqw6s.bonusquelle.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domain84sruvb9.bargainbucht.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domaincisun35q.bargainbucht.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domain9pbhrc3o.bargainbucht.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainyhkd41e4.savefalke.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainr4ojz98h.savefalke.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainhhgyqyai.savefalke.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domaintspmo-40154.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domainavatarcoder.ddns.net | XWorm botnet C2 domain (confidence level: 75%) | |
domainqjrkh8m1.savefalke.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainljogytxh.dealzauber.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainp6baqeca.dealzauber.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainz724fxb3.dealzauber.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainp31dr0bs.dealzauber.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainctnodeexporter.chatutor.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainctdify.chatutor.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainliverfatdiet.stechdaily.com | Havoc botnet C2 domain (confidence level: 100%) | |
domaingithub.ciberseguridad-eia.xyz | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainapi.ciberseguridad-eia.xyz | Unknown malware botnet C2 domain (confidence level: 100%) | |
domain6kl4y41v.preisdrop.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainnci5ab3x.preisdrop.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domaintf72zgyh.preisdrop.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domain6warimna.preisdrop.qpon | ClearFake payload delivery domain (confidence level: 100%) | |
domainqfjal5xm.redf1ee7.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainfd4ol8zs.redf1ee7.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domaininhibyln.redf1ee7.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain2sv9bgxa.redf1ee7.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain83x6d0ks.compres5text0l.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainiyhrsk8v.compres5text0l.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain8ouero1r.compres5text0l.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain5cw7rw2b.compres5text0l.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainl4r97zzd.c2bba8etip.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzfbbu8bs.c2bba8etip.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainvrna7onz.c2bba8etip.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainxaesdb97.c2bba8etip.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain7zxnifkk.ecumen1sm0ff.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainzqdqgezv.ecumen1sm0ff.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainf94vb8l0.ecumen1sm0ff.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainai2uuwqw.ecumen1sm0ff.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain8uhifp9q.arm2turege7m.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domain5sreizuv.arm2turege7m.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainru38kvwa.arm2turege7m.ru | ClearFake payload delivery domain (confidence level: 100%) | |
domainyk7vp5q0.arm2turege7m.ru | ClearFake payload delivery domain (confidence level: 100%) |
File
| Value | Description | Copy |
|---|---|---|
file46.151.182.229 | Mirai botnet C2 server (confidence level: 80%) | |
file217.156.122.82 | Stealc botnet C2 server (confidence level: 100%) | |
file95.164.123.123 | Stealc botnet C2 server (confidence level: 100%) | |
file62.164.177.35 | Stealc botnet C2 server (confidence level: 100%) | |
file1.12.231.30 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.201.53.65 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file47.105.55.111 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file8.217.97.238 | Unknown malware botnet C2 server (confidence level: 100%) | |
file95.9.236.229 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file188.93.233.106 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file45.156.87.134 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file42.112.102.202 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file139.180.144.53 | Havoc botnet C2 server (confidence level: 100%) | |
file155.117.45.119 | Venom RAT botnet C2 server (confidence level: 100%) | |
file43.153.171.132 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.33.88.161 | Unknown malware botnet C2 server (confidence level: 100%) | |
file140.82.54.173 | Unknown malware botnet C2 server (confidence level: 100%) | |
file144.172.107.90 | Unknown malware botnet C2 server (confidence level: 100%) | |
file126.209.7.138 | Unknown malware botnet C2 server (confidence level: 100%) | |
file158.101.250.78 | Unknown malware botnet C2 server (confidence level: 100%) | |
file4.231.170.99 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.139.79.104 | Unknown malware botnet C2 server (confidence level: 100%) | |
file57.129.40.69 | Unknown malware botnet C2 server (confidence level: 100%) | |
file51.21.131.46 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.106.236.188 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.173.235.226 | Unknown malware botnet C2 server (confidence level: 100%) | |
file178.16.137.37 | Mirai botnet C2 server (confidence level: 80%) | |
file172.111.169.5 | Remcos botnet C2 server (confidence level: 100%) | |
file106.55.5.111 | Unknown malware botnet C2 server (confidence level: 100%) | |
file23.237.106.59 | DCRat botnet C2 server (confidence level: 100%) | |
file102.98.126.127 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file172.86.88.169 | Chaos botnet C2 server (confidence level: 100%) | |
file72.62.20.196 | Unknown malware botnet C2 server (confidence level: 100%) | |
file35.183.218.216 | Unknown malware botnet C2 server (confidence level: 100%) | |
file138.199.222.6 | Unknown malware botnet C2 server (confidence level: 100%) | |
file18.221.122.235 | Unknown malware botnet C2 server (confidence level: 100%) | |
file77.120.165.2 | Unknown malware botnet C2 server (confidence level: 100%) | |
file195.15.215.249 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.109.216.74 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.58.101.213 | Unknown malware botnet C2 server (confidence level: 100%) | |
file157.230.182.134 | Unknown malware botnet C2 server (confidence level: 100%) | |
file206.238.144.183 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file178.236.252.42 | Stealc botnet C2 server (confidence level: 100%) | |
file89.110.110.198 | Stealc botnet C2 server (confidence level: 100%) | |
file34.231.249.185 | Sliver botnet C2 server (confidence level: 100%) | |
file155.117.98.14 | Unknown malware botnet C2 server (confidence level: 100%) | |
file188.69.166.114 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file144.126.149.104 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file199.217.99.210 | Unknown malware botnet C2 server (confidence level: 100%) | |
file83.217.208.170 | Unknown malware botnet C2 server (confidence level: 100%) | |
file201.210.90.254 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file185.76.243.139 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file141.11.0.202 | Meterpreter botnet C2 server (confidence level: 100%) | |
file148.113.205.94 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.79.202.83 | Unknown malware botnet C2 server (confidence level: 100%) | |
file201.249.59.30 | Unknown malware botnet C2 server (confidence level: 100%) | |
file152.42.225.73 | Unknown malware botnet C2 server (confidence level: 100%) | |
file152.42.225.73 | Unknown malware botnet C2 server (confidence level: 100%) | |
file198.7.124.197 | Unknown malware botnet C2 server (confidence level: 100%) | |
file84.54.33.50 | Remcos botnet C2 server (confidence level: 100%) | |
file185.34.101.146 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file111.230.66.165 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.212.187.23 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file194.180.158.154 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file104.248.170.189 | Aisuru botnet C2 server (confidence level: 75%) | |
file46.101.12.38 | Aisuru botnet C2 server (confidence level: 75%) | |
file209.97.153.64 | Aisuru botnet C2 server (confidence level: 75%) | |
file138.68.144.209 | Aisuru botnet C2 server (confidence level: 75%) | |
file134.209.31.183 | Aisuru botnet C2 server (confidence level: 75%) | |
file165.232.105.251 | Aisuru botnet C2 server (confidence level: 75%) | |
file134.209.196.145 | Aisuru botnet C2 server (confidence level: 75%) | |
file107.172.217.220 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file107.172.217.220 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file69.197.134.88 | Remcos botnet C2 server (confidence level: 100%) | |
file155.117.98.19 | Unknown malware botnet C2 server (confidence level: 100%) | |
file165.154.224.129 | Unknown malware botnet C2 server (confidence level: 100%) | |
file168.220.236.196 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.4.64.128 | Unknown malware botnet C2 server (confidence level: 100%) | |
file65.21.248.222 | Unknown malware botnet C2 server (confidence level: 100%) | |
file142.93.179.103 | Unknown malware botnet C2 server (confidence level: 100%) | |
file178.236.16.12 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.4.65.177 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.218.57.74 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.218.57.74 | Unknown malware botnet C2 server (confidence level: 100%) | |
file192.53.167.241 | Unknown malware botnet C2 server (confidence level: 100%) | |
file192.53.167.241 | Unknown malware botnet C2 server (confidence level: 100%) | |
file132.148.78.83 | Unknown malware botnet C2 server (confidence level: 100%) | |
file132.148.78.83 | Unknown malware botnet C2 server (confidence level: 100%) | |
file49.13.228.105 | Unknown malware botnet C2 server (confidence level: 100%) | |
file78.46.240.128 | Unknown malware botnet C2 server (confidence level: 100%) | |
file81.198.74.227 | Unknown malware botnet C2 server (confidence level: 100%) | |
file81.198.74.227 | Unknown malware botnet C2 server (confidence level: 100%) | |
file89.124.66.189 | Mirai botnet C2 server (confidence level: 80%) | |
file38.60.209.55 | Meterpreter botnet C2 server (confidence level: 75%) | |
file178.79.133.112 | Sliver botnet C2 server (confidence level: 90%) | |
file37.60.242.221 | ERMAC botnet C2 server (confidence level: 100%) | |
file66.78.40.90 | Unknown malware botnet C2 server (confidence level: 100%) | |
file191.209.58.15 | Unknown malware botnet C2 server (confidence level: 100%) | |
file20.51.197.118 | Unknown malware botnet C2 server (confidence level: 100%) | |
file143.198.10.134 | Unknown malware botnet C2 server (confidence level: 100%) | |
file123.57.152.240 | Unknown malware botnet C2 server (confidence level: 100%) | |
file13.60.235.49 | Unknown malware botnet C2 server (confidence level: 100%) | |
file221.224.130.226 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.141.215.113 | Remcos botnet C2 server (confidence level: 100%) | |
file116.102.237.0 | Venom RAT botnet C2 server (confidence level: 100%) | |
file169.50.189.146 | Unknown malware botnet C2 server (confidence level: 100%) | |
file188.166.162.138 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.129.168.82 | Unknown malware botnet C2 server (confidence level: 100%) | |
file142.93.179.103 | Unknown malware botnet C2 server (confidence level: 100%) | |
file82.165.173.192 | Unknown malware botnet C2 server (confidence level: 100%) | |
file185.4.64.128 | Unknown malware botnet C2 server (confidence level: 100%) | |
file167.86.117.147 | Unknown malware botnet C2 server (confidence level: 100%) | |
file216.92.226.14 | Unknown malware botnet C2 server (confidence level: 100%) | |
file102.206.27.46 | Unknown malware botnet C2 server (confidence level: 100%) | |
file139.196.223.82 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file43.153.60.198 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file203.91.74.3 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file83.229.125.215 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file45.249.208.252 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file69.164.251.37 | Remcos botnet C2 server (confidence level: 100%) | |
file37.72.172.58 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file158.220.96.15 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file69.164.252.4 | Hook botnet C2 server (confidence level: 100%) | |
file173.191.70.220 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file185.237.166.38 | Venom RAT botnet C2 server (confidence level: 100%) | |
file52.204.219.144 | Meterpreter botnet C2 server (confidence level: 100%) | |
file52.204.219.144 | Meterpreter botnet C2 server (confidence level: 100%) | |
file52.204.219.144 | Meterpreter botnet C2 server (confidence level: 100%) | |
file3.89.221.73 | Unknown malware botnet C2 server (confidence level: 100%) | |
file103.221.252.52 | Unknown malware botnet C2 server (confidence level: 100%) | |
file169.51.48.11 | Unknown malware botnet C2 server (confidence level: 100%) | |
file74.207.236.7 | Unknown malware botnet C2 server (confidence level: 100%) | |
file92.119.121.30 | Unknown malware botnet C2 server (confidence level: 100%) | |
file159.223.173.232 | Unknown malware botnet C2 server (confidence level: 100%) | |
file142.93.83.110 | Aisuru botnet C2 server (confidence level: 75%) | |
file174.138.92.169 | Aisuru botnet C2 server (confidence level: 75%) | |
file134.122.98.230 | Aisuru botnet C2 server (confidence level: 75%) | |
file46.101.78.45 | Aisuru botnet C2 server (confidence level: 75%) | |
file159.203.104.232 | Aisuru botnet C2 server (confidence level: 75%) | |
file161.35.82.49 | Aisuru botnet C2 server (confidence level: 75%) | |
file165.22.3.49 | Aisuru botnet C2 server (confidence level: 75%) | |
file161.35.167.44 | Aisuru botnet C2 server (confidence level: 75%) | |
file138.197.64.170 | Aisuru botnet C2 server (confidence level: 75%) | |
file46.101.75.131 | Aisuru botnet C2 server (confidence level: 75%) | |
file95.40.120.43 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file5.178.103.58 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file5.178.103.58 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file106.225.234.89 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file178.79.133.112 | Sliver botnet C2 server (confidence level: 75%) | |
file98.142.253.183 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
file119.3.156.32 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file102.117.171.39 | Unknown malware botnet C2 server (confidence level: 100%) | |
file23.237.106.58 | DCRat botnet C2 server (confidence level: 100%) | |
file102.98.76.115 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file98.81.166.227 | Meterpreter botnet C2 server (confidence level: 100%) | |
file159.223.105.127 | Unknown malware botnet C2 server (confidence level: 100%) | |
file124.70.99.232 | Unknown malware botnet C2 server (confidence level: 100%) | |
file43.157.56.250 | Unknown malware botnet C2 server (confidence level: 100%) | |
file216.92.48.31 | Unknown malware botnet C2 server (confidence level: 100%) |
Hash
| Value | Description | Copy |
|---|---|---|
hash1999 | Mirai botnet C2 server (confidence level: 80%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8811 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8008 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash8443 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash51777 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3778 | Mirai botnet C2 server (confidence level: 80%) | |
hash5671 | Remcos botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7777 | DCRat botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash8080 | Chaos botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash23051 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash2020 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash37585 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash4444 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Remcos botnet C2 server (confidence level: 100%) | |
hash1604 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash8080 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4444 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash10000 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Remcos botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8888 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8081 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash444 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash51515 | Mirai botnet C2 server (confidence level: 80%) | |
hash443 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash31337 | Sliver botnet C2 server (confidence level: 90%) | |
hash8082 | ERMAC botnet C2 server (confidence level: 100%) | |
hash60000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3636 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash41541 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash3333 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash7000 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8080 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash8443 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash443 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash4433 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash3334 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash4047 | Remcos botnet C2 server (confidence level: 100%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash3323 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8089 | Hook botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash4444 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash2380 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash5280 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash8880 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash8001 | Aisuru botnet C2 server (confidence level: 75%) | |
hash553 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7707 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash10250 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | Sliver botnet C2 server (confidence level: 75%) | |
hash33312 | Eye Pyramid botnet C2 server (confidence level: 75%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7777 | DCRat botnet C2 server (confidence level: 100%) | |
hash443 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash19420 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://35.183.218.216/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://72.62.20.196/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://157.230.182.134/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://195.15.215.249/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://206.189.236.65/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://64.23.172.46/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://152.42.225.73/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://45.79.202.83/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://148.113.205.94/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttp://178.236.252.42 | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://shalyunkotmoroz-104.icu/b5a52ebb310b65f06dd10cfe69f72363/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://13.218.57.74/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://185.4.64.128/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://192.53.167.241/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://132.148.78.83/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://178.236.16.12/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://49.13.228.105/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://65.21.248.222/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://185.4.65.177/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://81.198.74.227/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://78.46.240.128/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://tuvalul.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttps://kanekoyozo.jp/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://169.50.189.146/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://82.165.173.192/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://216.92.226.14/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://167.86.117.147/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://188.166.162.138/ | Unknown malware payload delivery URL (confidence level: 90%) |
Threat ID: 69544e27b932a5a22ffaf2d5
Added to database: 12/30/2025, 10:11:51 PM
Last enriched: 12/30/2025, 10:14:42 PM
Last updated: 2/7/2026, 10:25:56 AM
Views: 395
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
MediumThreatFox IOCs for 2026-02-06
MediumThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.