ThreatFox IOCs for 2026-01-11
ThreatFox IOCs for 2026-01-11
AI Analysis
Technical Summary
The provided information describes a set of Indicators of Compromise (IOCs) published on 2026-01-11 by the ThreatFox MISP feed, focusing on malware-related activities involving OSINT (Open Source Intelligence), payload delivery, and network activity. The entry does not specify affected software versions or products, indicating that it is likely a collection of threat intelligence rather than a vulnerability or exploit targeting a specific system. The threat level is rated as medium, with no known exploits in the wild and no patches available, suggesting that this intelligence is either preliminary or related to observed malicious infrastructure or campaigns rather than active exploitation. The technical details include a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, which may imply moderate confidence and dissemination of the indicators. The absence of CWEs and CVEs further supports that this is an intelligence update rather than a direct vulnerability report. The tags and categories emphasize OSINT and network activity, pointing to potential reconnaissance or initial stages of payload delivery in cyberattack chains. The lack of concrete indicators in the provided data limits the ability to perform a detailed technical dissection, but the information serves as a situational awareness update for security teams to incorporate into their threat hunting and monitoring processes.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the absence of known active exploits or specific affected systems. However, the focus on OSINT and network activity suggests potential reconnaissance or preparatory stages for more targeted attacks, which could lead to data exfiltration, unauthorized access, or disruption if followed by successful payload delivery. Organizations relying heavily on OSINT tools or with exposed network services might be more susceptible to reconnaissance activities that precede more severe attacks. The medium severity rating indicates a moderate risk that should not be ignored, especially for critical infrastructure, government entities, and sectors with high-value data. The lack of patches or direct mitigation measures means that defensive strategies must rely on detection, monitoring, and incident response readiness. If threat actors leverage these IOCs effectively, there could be an increased risk of intrusion attempts or malware deployment, impacting confidentiality, integrity, and availability of systems.
Mitigation Recommendations
Given the nature of this threat intelligence update, European organizations should focus on enhancing their threat detection and monitoring capabilities. Specific recommendations include: 1) Integrate the provided IOCs into Security Information and Event Management (SIEM) systems and Endpoint Detection and Response (EDR) tools to identify potential malicious activity early. 2) Conduct regular network traffic analysis to detect unusual payload delivery attempts or reconnaissance behaviors. 3) Strengthen OSINT tool usage policies and monitor for suspicious queries or data access patterns. 4) Implement strict network segmentation and access controls to limit lateral movement if an intrusion occurs. 5) Maintain up-to-date threat intelligence feeds and collaborate with information sharing groups to stay informed about evolving threats. 6) Train security teams to recognize early indicators of compromise related to OSINT and network activity. 7) Prepare incident response plans that include scenarios involving payload delivery and network-based attacks. These measures go beyond generic advice by emphasizing proactive detection and operational readiness in the absence of direct patches or known exploits.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
Indicators of Compromise
- url: https://iamdavidachom.com/tentrady-confirmation/
- file: 138.124.89.194
- hash: 80
- file: 107.189.24.255
- hash: 9000
- domain: newunveiled.com
- domain: eticaret.yonlendir.cfd
- domain: e-konutbasvuruekran.sbs
- file: 54.168.37.22
- hash: 80
- file: 182.254.168.212
- hash: 30586
- file: 54.236.229.118
- hash: 9301
- file: 54.236.229.118
- hash: 9601
- file: 54.236.229.118
- hash: 11101
- file: 54.236.229.118
- hash: 20001
- file: 103.177.47.76
- hash: 3790
- file: 199.101.111.34
- hash: 3790
- url: https://cdn.jsdelivr.net/gh/token-issuer-svc/api80-1int-m35461/jhjfjj
- url: https://cdn.jsdelivr.net/gh/token-issuer-svc/api80-1int-m35461/b12
- url: https://cdn.jsdelivr.net/gh/token-issuer-svc/s3/back
- url: https://cdn.jsdelivr.net/gh/token-issuer-svc/s3/boom
- file: 18.188.140.51
- hash: 943
- file: 43.157.212.233
- hash: 45
- url: http://77.110.102.154/ce369e7324834845.php
- file: 137.175.16.1
- hash: 8896
- file: 185.196.11.235
- hash: 80
- file: 184.174.32.240
- hash: 9000
- file: 51.195.201.251
- hash: 3443
- domain: sosyalkonut.cfd
- domain: toki.sosyalkonutunuz.cfd
- domain: sosyalkonutprojesi.sbs
- domain: toki.konutbasvurutr.cfd
- file: 195.24.237.166
- hash: 443
- file: 185.76.242.166
- hash: 7777
- domain: gd0.com.co
- file: 199.101.111.41
- hash: 3790
- file: 196.75.135.191
- hash: 2222
- file: 54.236.229.118
- hash: 9201
- url: https://cdn.jsdelivr.net/gh/id-core-rs-com/err2/local
- url: https://cdn.jsdelivr.net/gh/token-id-4-api/api50-mint-ok/fl
- file: 85.203.4.143
- hash: 7000
- file: 90.165.55.41
- hash: 4782
- file: 5.175.136.77
- hash: 5000
- file: 43.157.212.233
- hash: 443
- file: 43.157.212.233
- hash: 442
- domain: promole16.ddns.net
- file: 45.156.87.158
- hash: 3884
- file: 87.121.112.124
- hash: 911
- file: 185.208.159.209
- hash: 8080
- file: 54.158.147.232
- hash: 5176
- file: 38.14.250.196
- hash: 80
- file: 39.97.62.187
- hash: 8888
- file: 182.92.132.195
- hash: 80
- file: 83.229.123.61
- hash: 7777
- file: 43.134.120.6
- hash: 443
- file: 148.178.40.170
- hash: 443
- file: 148.178.48.116
- hash: 443
- file: 148.178.51.44
- hash: 443
- file: 148.178.56.139
- hash: 443
- file: 148.178.65.38
- hash: 443
- file: 148.178.66.103
- hash: 443
- file: 148.178.69.17
- hash: 443
- file: 148.178.69.241
- hash: 443
- file: 148.178.71.239
- hash: 443
- file: 148.178.77.92
- hash: 443
- file: 148.178.79.57
- hash: 443
- file: 148.178.82.238
- hash: 443
- file: 148.178.83.19
- hash: 443
- file: 148.178.92.67
- hash: 443
- file: 207.56.193.158
- hash: 443
- file: 207.56.201.147
- hash: 443
- file: 207.56.205.87
- hash: 443
- file: 207.56.215.40
- hash: 443
- file: 5.75.200.211
- hash: 8443
- url: https://cdn.jsdelivr.net/gh/id-core-rs-com/power2/fast
- url: https://cdn.jsdelivr.net/gh/browse-via-api/fb-api-keys/keys
- domain: rehumedece.ru.com
- domain: tamilrockers.gr.com
- domain: wabnewszamanpaper22.za.com
- domain: 58win8.in.net
- domain: 8xx.it.com
- file: 216.158.235.14
- hash: 7443
- file: 102.117.170.125
- hash: 7443
- file: 158.247.255.98
- hash: 443
- file: 45.156.87.73
- hash: 80
- file: 8.215.205.13
- hash: 443
- file: 168.119.214.202
- hash: 812
- domain: nobrains.localto.net
- domain: exveyra-52557.portmap.host
- domain: queijoz-38545.portmap.host
- domain: remgreat2740.duckdns.org
- domain: holdremco.bumbleshrimp.com
- file: 85.215.187.75
- hash: 9090
- url: http://194.164.34.182
- file: 43.134.120.6
- hash: 442
- file: 154.73.110.37
- hash: 2024
- file: 43.134.120.6
- hash: 45
- domain: guarderia.hopto.org
- url: https://cdn.jsdelivr.net/gh/token-issuer-svc/7cdtdbq6uewmq5/bn9
- file: 139.196.206.174
- hash: 50012
- url: https://cdn.jsdelivr.net/gh/token-issuer-svc/7cdtdbq6uewmq5/tem46
- url: http://69.164.242.27:3000/auth
- file: 69.164.242.27
- hash: 3000
- file: 109.107.177.135
- hash: 8000
- file: 45.81.113.180
- hash: 80
- domain: bacan4d.jp.net
- domain: crwqin.ru.com
- domain: mdf.uk.com
- domain: xar.uk.com
- domain: ubdofr.sa.com
- domain: ns1.mhtmzl.top
- domain: ns2.mhtmzl.top
- file: 146.235.201.30
- hash: 53
- url: https://whitegambit.com:8080/auth
- url: https://cdn.jsdelivr.net/gh/az2-prd-rs01/canary-bg01/ufo
- domain: eqp.lol
- url: https://cdn.jsdelivr.net/gh/az2-prd-rs01/canary-bg01/echo
- url: http://k0d3in.myftp.org/webpanel/pages/login.php
- url: https://evih.scamfreeweb.com/webpanel/
- url: https://cdn.jsdelivr.net/gh/az2-prd-rs01/canary-bg01/add-48
- file: 103.205.253.87
- hash: 54111
- domain: 789bet-trangchu.vip
- domain: alloparentsbebe.org
- domain: okvip168th.net
- domain: open88top1.com
- domain: xacmgm.za.com
- file: 185.222.58.38
- hash: 55615
- file: 154.26.214.161
- hash: 80
- file: 173.211.106.21
- hash: 2404
- file: 111.230.19.96
- hash: 7443
- domain: 58win.ae.org
- domain: 8xx00.cn.com
- domain: cort.uk.com
- domain: fcw.br.com
- domain: yqs.uk.com
- domain: af88.cn.com
- domain: af88.eu.com
- domain: af88.jpn.com
- domain: af88.uk.net
- domain: af88.us.com
- domain: portal.de.com
- domain: 58win1.it.com
- domain: af88.co.com
- domain: irbjlv.sa.com
- domain: knownsmianespecially.sa.com
- domain: uco.it.com
- file: 23.26.129.180
- hash: 24053
- domain: da88.in.net
- url: https://cdn.jsdelivr.net/gh/az2-prd-rs01/s3-backet-cloud73-s1/final
- domain: hamo1221-54107.portmap.host
- domain: 9ju3rdlvz.localto.net
- domain: d1.qwertyx.host
- domain: baba-asliiiii-20.sa.com
- domain: www.petro-chem.uk.com
- domain: www.58win.hu.net
- domain: biglobe-auth.jp.net
- domain: deltaone.ddns.net
- domain: hssshsh-33054.portmap.host
- domain: artemmakarov-30233.portmap.host
- domain: wmware.no-ip.biz
- file: 111.48.234.110
- hash: 10250
- file: 136.0.157.158
- hash: 6606
- file: 148.178.43.87
- hash: 443
- file: 148.178.44.227
- hash: 443
- file: 148.178.70.49
- hash: 443
- file: 148.178.71.71
- hash: 443
- file: 148.178.83.49
- hash: 443
- file: 148.178.85.246
- hash: 443
- file: 148.178.87.48
- hash: 443
- file: 148.178.89.46
- hash: 443
- file: 18.190.71.162
- hash: 443
- file: 207.56.192.203
- hash: 443
- file: 207.56.195.76
- hash: 443
- file: 3.209.181.254
- hash: 443
- file: 99.83.220.247
- hash: 443
- url: https://cdn.jsdelivr.net/gh/az2-prd-rs01/s3-backet-cloud73-s1/gfn-srvc
- url: https://cdn.jsdelivr.net/gh/service28-discovery-registr/fexw8qvyvqj8qe-identity-token-issuer/trc20
- file: 83.217.209.11
- hash: 7705
- file: 91.92.240.211
- hash: 2404
- file: 185.11.61.223
- hash: 15647
- file: 96.9.124.110
- hash: 443
- file: 18.212.247.86
- hash: 1962
- file: 18.212.247.86
- hash: 2762
- file: 3.86.33.166
- hash: 2456
- file: 95.81.123.133
- hash: 2040
- url: https://cdn.jsdelivr.net/gh/service28-discovery-registr/fexw8qvyvqj8qe-identity-token-issuer/set1
- url: https://cdn.jsdelivr.net/gh/service28-discovery-registr/fexw8qvyvqj8qe-identity-token-issuer/outh
- url: https://cdn.jsdelivr.net/gh/service28-discovery-registr/fexw8qvyvqj8qe-identity-token-issuer/oiaaai
- url: https://cdn.jsdelivr.net/gh/service28-discovery-registr/n-state-manager-cache128/sdvvv12
- url: https://cdn.jsdelivr.net/gh/service28-discovery-registr/n-state-manager-cache128/jpg
- url: https://cdn.jsdelivr.net/gh/service28-discovery-registr/n-state-manager-cache128/load
- file: 185.222.58.40
- hash: 55615
- file: 100.51.239.164
- hash: 443
- file: 52.21.176.23
- hash: 443
ThreatFox IOCs for 2026-01-11
Description
ThreatFox IOCs for 2026-01-11
AI-Powered Analysis
Technical Analysis
The provided information describes a set of Indicators of Compromise (IOCs) published on 2026-01-11 by the ThreatFox MISP feed, focusing on malware-related activities involving OSINT (Open Source Intelligence), payload delivery, and network activity. The entry does not specify affected software versions or products, indicating that it is likely a collection of threat intelligence rather than a vulnerability or exploit targeting a specific system. The threat level is rated as medium, with no known exploits in the wild and no patches available, suggesting that this intelligence is either preliminary or related to observed malicious infrastructure or campaigns rather than active exploitation. The technical details include a threat level of 2 (on an unspecified scale), an analysis rating of 1, and a distribution rating of 3, which may imply moderate confidence and dissemination of the indicators. The absence of CWEs and CVEs further supports that this is an intelligence update rather than a direct vulnerability report. The tags and categories emphasize OSINT and network activity, pointing to potential reconnaissance or initial stages of payload delivery in cyberattack chains. The lack of concrete indicators in the provided data limits the ability to perform a detailed technical dissection, but the information serves as a situational awareness update for security teams to incorporate into their threat hunting and monitoring processes.
Potential Impact
For European organizations, the impact of this threat is currently limited due to the absence of known active exploits or specific affected systems. However, the focus on OSINT and network activity suggests potential reconnaissance or preparatory stages for more targeted attacks, which could lead to data exfiltration, unauthorized access, or disruption if followed by successful payload delivery. Organizations relying heavily on OSINT tools or with exposed network services might be more susceptible to reconnaissance activities that precede more severe attacks. The medium severity rating indicates a moderate risk that should not be ignored, especially for critical infrastructure, government entities, and sectors with high-value data. The lack of patches or direct mitigation measures means that defensive strategies must rely on detection, monitoring, and incident response readiness. If threat actors leverage these IOCs effectively, there could be an increased risk of intrusion attempts or malware deployment, impacting confidentiality, integrity, and availability of systems.
Mitigation Recommendations
Given the nature of this threat intelligence update, European organizations should focus on enhancing their threat detection and monitoring capabilities. Specific recommendations include: 1) Integrate the provided IOCs into Security Information and Event Management (SIEM) systems and Endpoint Detection and Response (EDR) tools to identify potential malicious activity early. 2) Conduct regular network traffic analysis to detect unusual payload delivery attempts or reconnaissance behaviors. 3) Strengthen OSINT tool usage policies and monitor for suspicious queries or data access patterns. 4) Implement strict network segmentation and access controls to limit lateral movement if an intrusion occurs. 5) Maintain up-to-date threat intelligence feeds and collaborate with information sharing groups to stay informed about evolving threats. 6) Train security teams to recognize early indicators of compromise related to OSINT and network activity. 7) Prepare incident response plans that include scenarios involving payload delivery and network-based attacks. These measures go beyond generic advice by emphasizing proactive detection and operational readiness in the absence of direct patches or known exploits.
Affected Countries
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- aa948e09-a109-476c-9838-cbe6269f3e91
- Original Timestamp
- 1768176187
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://iamdavidachom.com/tentrady-confirmation/ | Unknown malware payload delivery URL (confidence level: 90%) | |
urlhttps://cdn.jsdelivr.net/gh/token-issuer-svc/api80-1int-m35461/jhjfjj | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/token-issuer-svc/api80-1int-m35461/b12 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/token-issuer-svc/s3/back | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/token-issuer-svc/s3/boom | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://77.110.102.154/ce369e7324834845.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/id-core-rs-com/err2/local | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/token-id-4-api/api50-mint-ok/fl | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/id-core-rs-com/power2/fast | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/browse-via-api/fb-api-keys/keys | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://194.164.34.182 | Stealc botnet C2 (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/token-issuer-svc/7cdtdbq6uewmq5/bn9 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/token-issuer-svc/7cdtdbq6uewmq5/tem46 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://69.164.242.27:3000/auth | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://whitegambit.com:8080/auth | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/az2-prd-rs01/canary-bg01/ufo | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/az2-prd-rs01/canary-bg01/echo | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://k0d3in.myftp.org/webpanel/pages/login.php | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://evih.scamfreeweb.com/webpanel/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/az2-prd-rs01/canary-bg01/add-48 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/az2-prd-rs01/s3-backet-cloud73-s1/final | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/az2-prd-rs01/s3-backet-cloud73-s1/gfn-srvc | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/service28-discovery-registr/fexw8qvyvqj8qe-identity-token-issuer/trc20 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/service28-discovery-registr/fexw8qvyvqj8qe-identity-token-issuer/set1 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/service28-discovery-registr/fexw8qvyvqj8qe-identity-token-issuer/outh | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/service28-discovery-registr/fexw8qvyvqj8qe-identity-token-issuer/oiaaai | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/service28-discovery-registr/n-state-manager-cache128/sdvvv12 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/service28-discovery-registr/n-state-manager-cache128/jpg | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/service28-discovery-registr/n-state-manager-cache128/load | ClearFake payload delivery URL (confidence level: 100%) |
File
| Value | Description | Copy |
|---|---|---|
file138.124.89.194 | Stealc botnet C2 server (confidence level: 100%) | |
file107.189.24.255 | SectopRAT botnet C2 server (confidence level: 100%) | |
file54.168.37.22 | Brute Ratel C4 botnet C2 server (confidence level: 100%) | |
file182.254.168.212 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file54.236.229.118 | Meterpreter botnet C2 server (confidence level: 100%) | |
file54.236.229.118 | Meterpreter botnet C2 server (confidence level: 100%) | |
file54.236.229.118 | Meterpreter botnet C2 server (confidence level: 100%) | |
file54.236.229.118 | Meterpreter botnet C2 server (confidence level: 100%) | |
file103.177.47.76 | Meterpreter botnet C2 server (confidence level: 100%) | |
file199.101.111.34 | Meterpreter botnet C2 server (confidence level: 100%) | |
file18.188.140.51 | Nanocore RAT botnet C2 server (confidence level: 75%) | |
file43.157.212.233 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file137.175.16.1 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file185.196.11.235 | Sliver botnet C2 server (confidence level: 100%) | |
file184.174.32.240 | Sliver botnet C2 server (confidence level: 100%) | |
file51.195.201.251 | Unknown malware botnet C2 server (confidence level: 100%) | |
file195.24.237.166 | Havoc botnet C2 server (confidence level: 100%) | |
file185.76.242.166 | DCRat botnet C2 server (confidence level: 100%) | |
file199.101.111.41 | Meterpreter botnet C2 server (confidence level: 100%) | |
file196.75.135.191 | Meterpreter botnet C2 server (confidence level: 100%) | |
file54.236.229.118 | Meterpreter botnet C2 server (confidence level: 100%) | |
file85.203.4.143 | XWorm botnet C2 server (confidence level: 100%) | |
file90.165.55.41 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file5.175.136.77 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file43.157.212.233 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file43.157.212.233 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file45.156.87.158 | Mirai botnet C2 server (confidence level: 80%) | |
file87.121.112.124 | Mirai botnet C2 server (confidence level: 80%) | |
file185.208.159.209 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file54.158.147.232 | Meterpreter botnet C2 server (confidence level: 100%) | |
file38.14.250.196 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.97.62.187 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file182.92.132.195 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file83.229.123.61 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file43.134.120.6 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file148.178.40.170 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.48.116 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.51.44 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.56.139 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.65.38 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.66.103 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.69.17 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.69.241 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.71.239 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.77.92 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.79.57 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.82.238 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.83.19 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.92.67 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file207.56.193.158 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file207.56.201.147 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file207.56.205.87 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file207.56.215.40 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file5.75.200.211 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file216.158.235.14 | Unknown malware botnet C2 server (confidence level: 100%) | |
file102.117.170.125 | Unknown malware botnet C2 server (confidence level: 100%) | |
file158.247.255.98 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.156.87.73 | MooBot botnet C2 server (confidence level: 100%) | |
file8.215.205.13 | Unknown malware botnet C2 server (confidence level: 100%) | |
file168.119.214.202 | Unknown malware botnet C2 server (confidence level: 100%) | |
file85.215.187.75 | Chaos botnet C2 server (confidence level: 100%) | |
file43.134.120.6 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file154.73.110.37 | Unknown malware botnet C2 server (confidence level: 100%) | |
file43.134.120.6 | ValleyRAT botnet C2 server (confidence level: 100%) | |
file139.196.206.174 | VShell botnet C2 server (confidence level: 100%) | |
file69.164.242.27 | Unknown malware botnet C2 server (confidence level: 100%) | |
file109.107.177.135 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.81.113.180 | Unknown malware botnet C2 server (confidence level: 100%) | |
file146.235.201.30 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file103.205.253.87 | Ghost RAT botnet C2 server (confidence level: 100%) | |
file185.222.58.38 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file154.26.214.161 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file173.211.106.21 | Remcos botnet C2 server (confidence level: 100%) | |
file111.230.19.96 | Unknown malware botnet C2 server (confidence level: 100%) | |
file23.26.129.180 | Remcos botnet C2 server (confidence level: 100%) | |
file111.48.234.110 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file136.0.157.158 | AsyncRAT botnet C2 server (confidence level: 75%) | |
file148.178.43.87 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.44.227 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.70.49 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.71.71 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.83.49 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.85.246 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.87.48 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file148.178.89.46 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file18.190.71.162 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file207.56.192.203 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file207.56.195.76 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file3.209.181.254 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file99.83.220.247 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file83.217.209.11 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
file91.92.240.211 | Remcos botnet C2 server (confidence level: 100%) | |
file185.11.61.223 | SectopRAT botnet C2 server (confidence level: 100%) | |
file96.9.124.110 | Havoc botnet C2 server (confidence level: 100%) | |
file18.212.247.86 | Meterpreter botnet C2 server (confidence level: 100%) | |
file18.212.247.86 | Meterpreter botnet C2 server (confidence level: 100%) | |
file3.86.33.166 | Meterpreter botnet C2 server (confidence level: 100%) | |
file95.81.123.133 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
file185.222.58.40 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file100.51.239.164 | Nimplant botnet C2 server (confidence level: 100%) | |
file52.21.176.23 | Unknown malware botnet C2 server (confidence level: 100%) |
Hash
| Value | Description | Copy |
|---|---|---|
hash80 | Stealc botnet C2 server (confidence level: 100%) | |
hash9000 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash80 | Brute Ratel C4 botnet C2 server (confidence level: 100%) | |
hash30586 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash9301 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash9601 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash11101 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash20001 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash943 | Nanocore RAT botnet C2 server (confidence level: 75%) | |
hash45 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash8896 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Sliver botnet C2 server (confidence level: 100%) | |
hash9000 | Sliver botnet C2 server (confidence level: 100%) | |
hash3443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash7777 | DCRat botnet C2 server (confidence level: 100%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash2222 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash9201 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash7000 | XWorm botnet C2 server (confidence level: 100%) | |
hash4782 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash5000 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash442 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash3884 | Mirai botnet C2 server (confidence level: 80%) | |
hash911 | Mirai botnet C2 server (confidence level: 80%) | |
hash8080 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash5176 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8888 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash7777 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash8443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | MooBot botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash812 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash9090 | Chaos botnet C2 server (confidence level: 100%) | |
hash442 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash2024 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash45 | ValleyRAT botnet C2 server (confidence level: 100%) | |
hash50012 | VShell botnet C2 server (confidence level: 100%) | |
hash3000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash8000 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash53 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash54111 | Ghost RAT botnet C2 server (confidence level: 100%) | |
hash55615 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash80 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash24053 | Remcos botnet C2 server (confidence level: 100%) | |
hash10250 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash6606 | AsyncRAT botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash7705 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash15647 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash1962 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash2762 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash2456 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash2040 | NetSupportManager RAT botnet C2 server (confidence level: 100%) | |
hash55615 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash443 | Nimplant botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) |
Domain
| Value | Description | Copy |
|---|---|---|
domainnewunveiled.com | Havoc botnet C2 domain (confidence level: 100%) | |
domaineticaret.yonlendir.cfd | Havoc botnet C2 domain (confidence level: 100%) | |
domaine-konutbasvuruekran.sbs | Havoc botnet C2 domain (confidence level: 100%) | |
domainsosyalkonut.cfd | Havoc botnet C2 domain (confidence level: 100%) | |
domaintoki.sosyalkonutunuz.cfd | Havoc botnet C2 domain (confidence level: 100%) | |
domainsosyalkonutprojesi.sbs | Havoc botnet C2 domain (confidence level: 100%) | |
domaintoki.konutbasvurutr.cfd | Havoc botnet C2 domain (confidence level: 100%) | |
domaingd0.com.co | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainpromole16.ddns.net | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainrehumedece.ru.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domaintamilrockers.gr.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainwabnewszamanpaper22.za.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domain58win8.in.net | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domain8xx.it.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainnobrains.localto.net | XWorm botnet C2 domain (confidence level: 100%) | |
domainexveyra-52557.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domainqueijoz-38545.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domainremgreat2740.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainholdremco.bumbleshrimp.com | Remcos botnet C2 domain (confidence level: 100%) | |
domainguarderia.hopto.org | CyberGate botnet C2 domain (confidence level: 100%) | |
domainbacan4d.jp.net | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domaincrwqin.ru.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainmdf.uk.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainxar.uk.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainubdofr.sa.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainns1.mhtmzl.top | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainns2.mhtmzl.top | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domaineqp.lol | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domain789bet-trangchu.vip | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainalloparentsbebe.org | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainokvip168th.net | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainopen88top1.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainxacmgm.za.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domain58win.ae.org | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domain8xx00.cn.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domaincort.uk.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainfcw.br.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainyqs.uk.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainaf88.cn.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainaf88.eu.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainaf88.jpn.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainaf88.uk.net | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainaf88.us.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainportal.de.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domain58win1.it.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainaf88.co.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainirbjlv.sa.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainknownsmianespecially.sa.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainuco.it.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainda88.in.net | Quasar RAT botnet C2 domain (confidence level: 75%) | |
domainhamo1221-54107.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domain9ju3rdlvz.localto.net | XWorm botnet C2 domain (confidence level: 100%) | |
domaind1.qwertyx.host | XWorm botnet C2 domain (confidence level: 100%) | |
domainbaba-asliiiii-20.sa.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainwww.petro-chem.uk.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainwww.58win.hu.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainbiglobe-auth.jp.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domaindeltaone.ddns.net | Quasar RAT botnet C2 domain (confidence level: 100%) | |
domainhssshsh-33054.portmap.host | SpyNote botnet C2 domain (confidence level: 100%) | |
domainartemmakarov-30233.portmap.host | SpyNote botnet C2 domain (confidence level: 100%) | |
domainwmware.no-ip.biz | CyberGate botnet C2 domain (confidence level: 100%) |
Threat ID: 69643b57da2266e838ab12c0
Added to database: 1/12/2026, 12:07:51 AM
Last enriched: 1/12/2026, 12:08:13 AM
Last updated: 1/12/2026, 3:58:42 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-10
MediumThreatFox IOCs for 2026-01-09
MediumThreat Research: PHALT#BLYX: Fake BSODs and Trusted Build Tools
MediumReborn in Rust: MuddyWater Evolves Tooling with RustyWater Implant
MediumGuloader Malware Being Disguised as Employee Performance Reports
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.