ThreatFox IOCs for 2026-02-04
ThreatFox IOCs for 2026-02-04
AI Analysis
Technical Summary
The provided information describes a malware-related threat entry from the ThreatFox MISP feed dated 2026-02-04. This threat is categorized under OSINT, network activity, and payload delivery, indicating that it involves the use of open-source intelligence techniques to facilitate or detect network-based malware payload distribution. No specific affected software versions or products are identified, and there are no known exploits currently in the wild, which suggests this is either a newly observed threat or one that is still under investigation. The threat level is rated as medium, with a threatLevel metric of 2 and distribution metric of 3, implying moderate dissemination potential but limited analysis depth (analysis metric of 1). The absence of concrete indicators of compromise (IOCs) or CWEs limits the ability to perform detailed technical analysis or attribution. The lack of available patches and the absence of known exploits suggest that this threat may rely on novel or less understood techniques, or it may be in an early stage of development or deployment. The focus on OSINT and network activity implies that attackers might be leveraging publicly available information to identify targets or craft payload delivery mechanisms, potentially exploiting network vulnerabilities or social engineering vectors. The threat's medium severity rating reflects a balance between potential impact and current exploitation evidence. Overall, this threat represents a moderate risk that requires vigilance but does not currently indicate widespread or critical exploitation.
Potential Impact
For European organizations, this threat could lead to unauthorized network access or malware infections through payload delivery mechanisms informed by OSINT techniques. The impact on confidentiality, integrity, and availability could be moderate if successful payload delivery leads to data exfiltration, system compromise, or disruption of services. Organizations heavily reliant on networked infrastructure and OSINT tools may be more vulnerable, especially if they lack robust network monitoring and threat intelligence capabilities. The absence of known exploits reduces immediate risk, but the potential for emerging exploitation means that organizations could face increased attack attempts over time. The medium severity suggests that while the threat is not critical, it could still cause operational disruptions or data breaches if not addressed. European entities involved in critical infrastructure, finance, or government sectors may be particularly sensitive to such threats due to the strategic value of their data and systems.
Mitigation Recommendations
European organizations should implement enhanced network monitoring to detect unusual or suspicious network activity that could indicate payload delivery attempts. Integrating updated threat intelligence feeds, including ThreatFox and other OSINT sources, will improve detection capabilities. Employ network segmentation and strict access controls to limit the spread of any potential malware payloads. Conduct regular security awareness training focused on recognizing social engineering and phishing attempts that could be used to deliver payloads. Employ endpoint detection and response (EDR) solutions capable of identifying and blocking unknown or suspicious payloads. Since no patches are available, focus on hardening network perimeter defenses, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure configuration of exposed services. Regularly review and update incident response plans to ensure rapid containment and remediation if an infection occurs. Collaborate with national and European cybersecurity centers to share intelligence and receive timely alerts about emerging threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
Indicators of Compromise
- domain: plesk.cheriwildes.com
- file: 185.242.3.144
- hash: 6149
- file: 143.14.44.149
- hash: 205
- file: 23.94.252.26
- hash: 80
- file: 31.57.219.190
- hash: 80
- file: 31.129.22.98
- hash: 80
- file: 64.89.161.41
- hash: 80
- file: 79.133.46.139
- hash: 80
- file: 80.78.31.191
- hash: 80
- file: 83.217.208.134
- hash: 80
- file: 85.137.253.36
- hash: 80
- file: 89.39.121.131
- hash: 80
- file: 91.92.34.5
- hash: 80
- file: 91.92.34.196
- hash: 80
- file: 94.26.90.74
- hash: 80
- file: 150.241.64.28
- hash: 80
- file: 158.94.210.6
- hash: 80
- file: 170.130.165.119
- hash: 80
- file: 185.100.157.18
- hash: 80
- file: 185.107.74.44
- hash: 80
- file: 185.221.199.81
- hash: 80
- file: 194.180.191.54
- hash: 80
- file: 207.148.92.93
- hash: 80
- file: 212.11.64.103
- hash: 80
- file: 216.250.254.89
- hash: 80
- file: 172.245.152.196
- hash: 28080
- file: 185.208.156.187
- hash: 6210
- domain: manymencresless.duckdns.org
- domain: wariorsdontquits.duckdns.org
- domain: x1ewariorsdontquits.duckdns.org
- file: 198.1.195.193
- hash: 3000
- domain: 6s6sv4oisuhjtetpmfcbszz.kicks-ass.net
- domain: zoro012355.duckdns.org
- domain: x1ezoro012355.duckdns.org
- file: 147.185.221.17
- hash: 61202
- domain: true-baghdad.gl.at.ply.gg
- domain: botnet.lokifisch.dev
- domain: cow-swap.co
- domain: kaminowebapp.net
- file: 124.198.131.178
- hash: 4000
- file: 85.17.67.94
- hash: 2404
- file: 107.174.34.163
- hash: 14643
- file: 144.172.95.146
- hash: 443
- file: 188.166.244.201
- hash: 4321
- file: 213.177.179.31
- hash: 4444
- file: 199.101.111.36
- hash: 3790
- file: 192.3.154.52
- hash: 6742
- url: https://cdn.jsdelivr.net/gh/stp26det/22/get
- url: http://172.233.15.195:8888/supershell/login/
- file: 158.94.211.151
- hash: 7705
- domain: wan.uk.com
- url: http://185.250.148.227/
- file: 156.234.94.195
- hash: 50912
- file: 103.37.2.24
- hash: 50912
- file: 156.234.94.199
- hash: 50912
- file: 27.124.30.18
- hash: 443
- file: 39.98.51.2
- hash: 18443
- file: 196.251.107.131
- hash: 2404
- file: 198.135.54.106
- hash: 7000
- file: 107.189.25.81
- hash: 443
- file: 124.198.131.178
- hash: 1234
- file: 194.59.30.28
- hash: 9619
- file: 64.225.80.218
- hash: 443
- file: 107.172.238.19
- hash: 2404
- file: 103.43.8.15
- hash: 55650
- url: http://102.204.223.168:8888/supershell/login/
- url: http://185.242.233.142:7877/jquery-3.3.1.min.js
- url: https://cdn.jsdelivr.net/gh/keys53/c10ud/nmbr9
- file: 64.89.161.81
- hash: 6667
- file: 144.172.105.109
- hash: 443
- file: 186.169.55.212
- hash: 5061
- file: 150.136.164.223
- hash: 443
- file: 176.65.139.12
- hash: 52334
- file: 188.253.107.156
- hash: 8808
- file: 158.94.210.213
- hash: 8080
- file: 123.207.58.181
- hash: 30914
- file: 157.175.188.159
- hash: 3389
- file: 157.175.188.159
- hash: 6289
- file: 103.177.47.165
- hash: 3790
- file: 3.26.238.31
- hash: 20546
- domain: nssmsndnebev.duckdns.org
- domain: fgaehr4awhuw5he.duckdns.org
- domain: fgeaghrwhgrw.duckdns.org
- domain: mashina1000-7-57230.portmap.host
- file: 107.189.25.81
- hash: 8888
- url: http://178.16.52.35/c8ed5c2a04a04ed6.php
- domain: tt-ynl.top
- file: 155.94.150.234
- hash: 3108
- url: http://89.110.107.177:9000/wmglb
- url: http://89.110.107.177:9000/wbinjget
- domain: quotesdcm.top
- domain: t0up.top
- file: 217.64.148.157
- hash: 59713
- file: 217.64.148.157
- hash: 63477
- file: 61.143.184.8
- hash: 19248
- file: 8.209.201.77
- hash: 8888
- domain: neweazi.top
- file: 149.104.92.133
- hash: 443
- domain: access-hub.lol
- url: http://77.110.121.209:5000/api/beat
- url: http://77.110.121.209:5000/api/register
- url: https://access-hub.lol/sys/update/status.php
- file: 77.110.121.209
- hash: 5000
- domain: okcreditcard.com
- domain: relay.t0up.top
- domain: weaplink.com
- url: http://weaplink.com/mv2/
- url: http://weaplink.com/health
- file: 193.143.1.59
- hash: 80
- domain: apisyncdata.onrender.com
- domain: api.cloudtrafficservice.com
- domain: www.zyhservers.top
- file: 172.174.234.34
- hash: 7443
- file: 47.250.211.79
- hash: 443
- file: 79.110.49.206
- hash: 8081
- url: http://cg899737.tw1.ru/5d4602d2.php
- file: 85.137.253.74
- hash: 443
- url: https://85.137.253.74/
- domain: als.skjeelancipla.com.lk
- domain: log.skjeelancipla.com.lk
- domain: reg.skjeelancipla.com.lk
- domain: tog.skjeelancipla.com.lk
- url: https://46.62.192.127/
- file: 192.227.135.240
- hash: 2404
- file: 198.46.173.21
- hash: 2404
- file: 5.181.165.216
- hash: 8080
- domain: steinsgroup.org
- file: 193.42.11.40
- hash: 7007
- file: 77.238.240.86
- hash: 9000
- file: 141.11.192.223
- hash: 9900
- file: 136.0.157.52
- hash: 9999
- file: 43.205.130.228
- hash: 12679
- file: 43.205.130.228
- hash: 2929
- file: 43.205.130.228
- hash: 11179
- domain: somkdl.za.com
- domain: mudahmenang.jp.net
- url: https://trainen.cyou/api
- url: http://104.164.55.132
- file: 26.169.62.1
- hash: 5552
- url: http://194.150.220.218/4sleypfak57hgubo/malacca
- url: http://astrologickeconoablos.cc:8080/updater?for=76262f4263b30a25bb81956ea98986ed
- url: https://cdn.jsdelivr.net/gh/keys53/c10ud/bn45
- domain: uzgidro.fun
- file: 31.57.219.219
- hash: 5001
- url: http://hdywvr2.top/1.php
- url: https://cdn.jsdelivr.net/gh/midjrney/c10ud/bn45
- url: https://cdn.jsdelivr.net/gh/keys53/c10ud/midjrney
- url: https://nflportal.com/5f2a.js
- domain: nflportal.com
- url: https://nflportal.com/js.php
- domain: fa3276a2e41147eb84cce772fb791658--8000.ap-shanghai2.cloudstudio.club
- file: 49.213.132.153
- hash: 80
- domain: apiv3.wincryptapi.com
- domain: tsxoihgri0uqyvuf.wincryptapi.com
- domain: kamal.wincryptapi.com
- domain: xevhlfcbjkzmjxr5.wincryptapi.com
- domain: vu4za2dgrqj0wmfi.wincryptapi.com
- domain: z3cwncdoqkqw7cpk.wincryptapi.com
- domain: pfwtdqyqngky5jwn.wincryptapi.com
- domain: upload.wincryptapi.com
- domain: down.wincryptapi.com
- domain: qrcqhinbvlv3ym3b.wincryptapi.com
- file: 161.97.110.15
- hash: 7705
- domain: utils.myvnc.com
- domain: mrekuro.hopto.org
- domain: gfm.uk.com
- file: 43.128.21.242
- hash: 801
- file: 103.37.2.9
- hash: 59131
- file: 156.234.247.98
- hash: 59131
- file: 23.235.179.115
- hash: 59131
- file: 103.87.10.156
- hash: 8509
- file: 136.115.170.218
- hash: 7443
- file: 184.105.208.104
- hash: 7443
- file: 3.121.234.29
- hash: 443
- file: 45.144.212.74
- hash: 6000
- domain: maccodenode.com
- domain: maccouriergo.com
- domain: macbeamsend.com
- domain: macdatadrop.com
- domain: macmigrate.com
- domain: macfilejet.com
- domain: macpipehub.com
- domain: macpacket.com
- domain: maccodestack.com
- domain: maccaststream.com
- domain: macdatapipeline.com
- domain: macpassage.com
- domain: maccastlink.com
- domain: macsmartlink.com
- domain: macswiftly.com
- domain: macsharehub.com
- domain: captoolsz.com
- domain: www.lyraconnect.uk
- file: 69.5.189.249
- hash: 8888
- file: 185.196.8.252
- hash: 2431
- file: 193.29.58.236
- hash: 80
- file: 78.12.249.26
- hash: 39914
- url: https://erberloose.club
- url: https://cdn.jsdelivr.net/gh/stp26det/amd64/liveserv
- file: 45.138.16.75
- hash: 7772
- domain: itzjrx-35702.portmap.host
- file: 167.122.70.50
- hash: 443
- file: 185.222.58.43
- hash: 55615
- file: 185.247.228.40
- hash: 44451
- domain: inconsk.cyou
- domain: cheship.cyou
- domain: molewyn.cyou
- file: 4.225.89.181
- hash: 443
- file: 156.234.33.81
- hash: 19350
- file: 210.131.217.107
- hash: 8000
- file: 223.109.90.58
- hash: 10001
- file: 34.223.43.67
- hash: 10001
- file: 107.170.108.204
- hash: 8080
- file: 5.181.165.216
- hash: 80
- file: 159.89.98.76
- hash: 443
- file: 193.242.184.197
- hash: 7443
- file: 45.87.249.10
- hash: 443
- file: 194.113.106.125
- hash: 7705
- url: http://150.241.83.5/8574ba9c14cf4c8b.php
- file: 45.122.120.69
- hash: 2404
- file: 176.65.151.197
- hash: 2404
- file: 108.137.50.248
- hash: 103
- file: 54.177.176.66
- hash: 2281
- file: 46.16.14.246
- hash: 443
- domain: posbglobal.com
- file: 212.232.23.65
- hash: 443
- domain: tasselg.cyou
- domain: troyouc.cyou
- domain: dreamlm.cyou
- domain: swedisc.cyou
- domain: thoughg.cyou
- domain: trainen.cyou
- domain: judicis.cyou
- domain: underpt.cyou
- domain: ebonizz.cyou
- domain: pepperz.cyou
- domain: killnnk.cyou
- domain: editorr.cyou
- domain: marktwx.cyou
- file: 62.164.177.91
- hash: 5755
- file: 150.139.132.27
- hash: 10001
- file: 195.177.94.148
- hash: 4000
ThreatFox IOCs for 2026-02-04
Description
ThreatFox IOCs for 2026-02-04
AI-Powered Analysis
Technical Analysis
The provided information describes a malware-related threat entry from the ThreatFox MISP feed dated 2026-02-04. This threat is categorized under OSINT, network activity, and payload delivery, indicating that it involves the use of open-source intelligence techniques to facilitate or detect network-based malware payload distribution. No specific affected software versions or products are identified, and there are no known exploits currently in the wild, which suggests this is either a newly observed threat or one that is still under investigation. The threat level is rated as medium, with a threatLevel metric of 2 and distribution metric of 3, implying moderate dissemination potential but limited analysis depth (analysis metric of 1). The absence of concrete indicators of compromise (IOCs) or CWEs limits the ability to perform detailed technical analysis or attribution. The lack of available patches and the absence of known exploits suggest that this threat may rely on novel or less understood techniques, or it may be in an early stage of development or deployment. The focus on OSINT and network activity implies that attackers might be leveraging publicly available information to identify targets or craft payload delivery mechanisms, potentially exploiting network vulnerabilities or social engineering vectors. The threat's medium severity rating reflects a balance between potential impact and current exploitation evidence. Overall, this threat represents a moderate risk that requires vigilance but does not currently indicate widespread or critical exploitation.
Potential Impact
For European organizations, this threat could lead to unauthorized network access or malware infections through payload delivery mechanisms informed by OSINT techniques. The impact on confidentiality, integrity, and availability could be moderate if successful payload delivery leads to data exfiltration, system compromise, or disruption of services. Organizations heavily reliant on networked infrastructure and OSINT tools may be more vulnerable, especially if they lack robust network monitoring and threat intelligence capabilities. The absence of known exploits reduces immediate risk, but the potential for emerging exploitation means that organizations could face increased attack attempts over time. The medium severity suggests that while the threat is not critical, it could still cause operational disruptions or data breaches if not addressed. European entities involved in critical infrastructure, finance, or government sectors may be particularly sensitive to such threats due to the strategic value of their data and systems.
Mitigation Recommendations
European organizations should implement enhanced network monitoring to detect unusual or suspicious network activity that could indicate payload delivery attempts. Integrating updated threat intelligence feeds, including ThreatFox and other OSINT sources, will improve detection capabilities. Employ network segmentation and strict access controls to limit the spread of any potential malware payloads. Conduct regular security awareness training focused on recognizing social engineering and phishing attempts that could be used to deliver payloads. Employ endpoint detection and response (EDR) solutions capable of identifying and blocking unknown or suspicious payloads. Since no patches are available, focus on hardening network perimeter defenses, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure configuration of exposed services. Regularly review and update incident response plans to ensure rapid containment and remediation if an infection occurs. Collaborate with national and European cybersecurity centers to share intelligence and receive timely alerts about emerging threats.
Affected Countries
Technical Details
- Threat Level
- 2
- Analysis
- 1
- Distribution
- 3
- Uuid
- c81dc023-c5c8-4f8f-8642-e50937a43426
- Original Timestamp
- 1770249787
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainplesk.cheriwildes.com | FAKEUPDATES botnet C2 domain (confidence level: 100%) | |
domainmanymencresless.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainwariorsdontquits.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainx1ewariorsdontquits.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domain6s6sv4oisuhjtetpmfcbszz.kicks-ass.net | Remcos botnet C2 domain (confidence level: 100%) | |
domainzoro012355.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domainx1ezoro012355.duckdns.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaintrue-baghdad.gl.at.ply.gg | XWorm botnet C2 domain (confidence level: 100%) | |
domainbotnet.lokifisch.dev | Quasar RAT botnet C2 domain (confidence level: 100%) | |
domaincow-swap.co | Unknown malware botnet C2 domain (confidence level: 75%) | |
domainkaminowebapp.net | Unknown malware botnet C2 domain (confidence level: 75%) | |
domainwan.uk.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainnssmsndnebev.duckdns.org | Bashlite botnet C2 domain (confidence level: 100%) | |
domainfgaehr4awhuw5he.duckdns.org | Bashlite botnet C2 domain (confidence level: 100%) | |
domainfgeaghrwhgrw.duckdns.org | Bashlite botnet C2 domain (confidence level: 100%) | |
domainmashina1000-7-57230.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domaintt-ynl.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainquotesdcm.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domaint0up.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainneweazi.top | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainaccess-hub.lol | Xillen Stealer botnet C2 domain (confidence level: 100%) | |
domainokcreditcard.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainrelay.t0up.top | Unknown RAT botnet C2 domain (confidence level: 100%) | |
domainweaplink.com | Unknown malware botnet C2 domain (confidence level: 100%) | |
domainapisyncdata.onrender.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainapi.cloudtrafficservice.com | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainwww.zyhservers.top | Cobalt Strike botnet C2 domain (confidence level: 100%) | |
domainals.skjeelancipla.com.lk | Vidar botnet C2 domain (confidence level: 100%) | |
domainlog.skjeelancipla.com.lk | Vidar botnet C2 domain (confidence level: 100%) | |
domainreg.skjeelancipla.com.lk | Vidar botnet C2 domain (confidence level: 100%) | |
domaintog.skjeelancipla.com.lk | Vidar botnet C2 domain (confidence level: 100%) | |
domainsteinsgroup.org | XWorm botnet C2 domain (confidence level: 100%) | |
domainsomkdl.za.com | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainmudahmenang.jp.net | AsyncRAT botnet C2 domain (confidence level: 100%) | |
domainuzgidro.fun | Phantom Stealer botnet C2 domain (confidence level: 100%) | |
domainnflportal.com | KongTuke payload delivery domain (confidence level: 100%) | |
domainfa3276a2e41147eb84cce772fb791658--8000.ap-shanghai2.cloudstudio.club | Cobalt Strike botnet C2 domain (confidence level: 75%) | |
domainapiv3.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domaintsxoihgri0uqyvuf.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainkamal.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainxevhlfcbjkzmjxr5.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainvu4za2dgrqj0wmfi.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainz3cwncdoqkqw7cpk.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainpfwtdqyqngky5jwn.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainupload.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domaindown.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainqrcqhinbvlv3ym3b.wincryptapi.com | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainutils.myvnc.com | NjRAT botnet C2 domain (confidence level: 75%) | |
domainmrekuro.hopto.org | Remcos botnet C2 domain (confidence level: 100%) | |
domaingfm.uk.com | AsyncRAT botnet C2 domain (confidence level: 75%) | |
domainmaccodenode.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmaccouriergo.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacbeamsend.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacdatadrop.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacmigrate.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacfilejet.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacpipehub.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacpacket.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmaccodestack.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmaccaststream.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacdatapipeline.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacpassage.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmaccastlink.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacsmartlink.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacswiftly.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domainmacsharehub.com | Unknown Stealer payload delivery domain (confidence level: 100%) | |
domaincaptoolsz.com | Unknown malware payload delivery domain (confidence level: 100%) | |
domainwww.lyraconnect.uk | Unknown Stealer botnet C2 domain (confidence level: 100%) | |
domainitzjrx-35702.portmap.host | XWorm botnet C2 domain (confidence level: 100%) | |
domaininconsk.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaincheship.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmolewyn.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainposbglobal.com | VShell botnet C2 domain (confidence level: 100%) | |
domaintasselg.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintroyouc.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaindreamlm.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainswedisc.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainthoughg.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaintrainen.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainjudicis.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainunderpt.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainebonizz.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainpepperz.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainkillnnk.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domaineditorr.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) | |
domainmarktwx.cyou | Lumma Stealer botnet C2 domain (confidence level: 100%) |
File
| Value | Description | Copy |
|---|---|---|
file185.242.3.144 | Mirai botnet C2 server (confidence level: 100%) | |
file143.14.44.149 | XWorm botnet C2 server (confidence level: 100%) | |
file23.94.252.26 | Stealc botnet C2 server (confidence level: 50%) | |
file31.57.219.190 | Stealc botnet C2 server (confidence level: 50%) | |
file31.129.22.98 | Stealc botnet C2 server (confidence level: 50%) | |
file64.89.161.41 | Stealc botnet C2 server (confidence level: 50%) | |
file79.133.46.139 | Stealc botnet C2 server (confidence level: 50%) | |
file80.78.31.191 | Stealc botnet C2 server (confidence level: 50%) | |
file83.217.208.134 | Stealc botnet C2 server (confidence level: 50%) | |
file85.137.253.36 | Stealc botnet C2 server (confidence level: 50%) | |
file89.39.121.131 | Stealc botnet C2 server (confidence level: 50%) | |
file91.92.34.5 | Stealc botnet C2 server (confidence level: 50%) | |
file91.92.34.196 | Stealc botnet C2 server (confidence level: 50%) | |
file94.26.90.74 | Stealc botnet C2 server (confidence level: 50%) | |
file150.241.64.28 | Stealc botnet C2 server (confidence level: 50%) | |
file158.94.210.6 | Stealc botnet C2 server (confidence level: 50%) | |
file170.130.165.119 | Stealc botnet C2 server (confidence level: 50%) | |
file185.100.157.18 | Stealc botnet C2 server (confidence level: 50%) | |
file185.107.74.44 | Stealc botnet C2 server (confidence level: 50%) | |
file185.221.199.81 | Stealc botnet C2 server (confidence level: 50%) | |
file194.180.191.54 | Stealc botnet C2 server (confidence level: 50%) | |
file207.148.92.93 | Stealc botnet C2 server (confidence level: 50%) | |
file212.11.64.103 | Stealc botnet C2 server (confidence level: 50%) | |
file216.250.254.89 | Stealc botnet C2 server (confidence level: 50%) | |
file172.245.152.196 | Remcos botnet C2 server (confidence level: 100%) | |
file185.208.156.187 | Remcos botnet C2 server (confidence level: 100%) | |
file198.1.195.193 | Unknown Stealer botnet C2 server (confidence level: 100%) | |
file147.185.221.17 | XWorm botnet C2 server (confidence level: 100%) | |
file124.198.131.178 | Remcos botnet C2 server (confidence level: 100%) | |
file85.17.67.94 | Remcos botnet C2 server (confidence level: 100%) | |
file107.174.34.163 | Remcos botnet C2 server (confidence level: 100%) | |
file144.172.95.146 | Havoc botnet C2 server (confidence level: 100%) | |
file188.166.244.201 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file213.177.179.31 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file199.101.111.36 | Meterpreter botnet C2 server (confidence level: 100%) | |
file192.3.154.52 | Mirai botnet C2 server (confidence level: 100%) | |
file158.94.211.151 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
file156.234.94.195 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file103.37.2.24 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.234.94.199 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file27.124.30.18 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file39.98.51.2 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file196.251.107.131 | Remcos botnet C2 server (confidence level: 100%) | |
file198.135.54.106 | Remcos botnet C2 server (confidence level: 100%) | |
file107.189.25.81 | Sliver botnet C2 server (confidence level: 100%) | |
file124.198.131.178 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file194.59.30.28 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file64.225.80.218 | Havoc botnet C2 server (confidence level: 100%) | |
file107.172.238.19 | Remcos botnet C2 server (confidence level: 100%) | |
file103.43.8.15 | Mirai botnet C2 server (confidence level: 100%) | |
file64.89.161.81 | Mirai botnet C2 server (confidence level: 100%) | |
file144.172.105.109 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file186.169.55.212 | Remcos botnet C2 server (confidence level: 100%) | |
file150.136.164.223 | Sliver botnet C2 server (confidence level: 100%) | |
file176.65.139.12 | Bashlite botnet C2 server (confidence level: 75%) | |
file188.253.107.156 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file158.94.210.213 | DCRat botnet C2 server (confidence level: 100%) | |
file123.207.58.181 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
file157.175.188.159 | Meterpreter botnet C2 server (confidence level: 100%) | |
file157.175.188.159 | Meterpreter botnet C2 server (confidence level: 100%) | |
file103.177.47.165 | Meterpreter botnet C2 server (confidence level: 100%) | |
file3.26.238.31 | Meterpreter botnet C2 server (confidence level: 100%) | |
file107.189.25.81 | Sliver botnet C2 server (confidence level: 75%) | |
file155.94.150.234 | PureRAT botnet C2 server (confidence level: 100%) | |
file217.64.148.157 | Remcos botnet C2 server (confidence level: 100%) | |
file217.64.148.157 | Remcos botnet C2 server (confidence level: 100%) | |
file61.143.184.8 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file8.209.201.77 | DeimosC2 botnet C2 server (confidence level: 75%) | |
file149.104.92.133 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file77.110.121.209 | Xillen Stealer botnet C2 server (confidence level: 75%) | |
file193.143.1.59 | Unknown malware botnet C2 server (confidence level: 75%) | |
file172.174.234.34 | Unknown malware botnet C2 server (confidence level: 100%) | |
file47.250.211.79 | DCRat botnet C2 server (confidence level: 100%) | |
file79.110.49.206 | RisePro botnet C2 server (confidence level: 100%) | |
file85.137.253.74 | Vidar botnet C2 server (confidence level: 100%) | |
file192.227.135.240 | Remcos botnet C2 server (confidence level: 100%) | |
file198.46.173.21 | Remcos botnet C2 server (confidence level: 100%) | |
file5.181.165.216 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file193.42.11.40 | XWorm botnet C2 server (confidence level: 100%) | |
file77.238.240.86 | SectopRAT botnet C2 server (confidence level: 100%) | |
file141.11.192.223 | XWorm botnet C2 server (confidence level: 100%) | |
file136.0.157.52 | XWorm botnet C2 server (confidence level: 100%) | |
file43.205.130.228 | Meterpreter botnet C2 server (confidence level: 100%) | |
file43.205.130.228 | Meterpreter botnet C2 server (confidence level: 100%) | |
file43.205.130.228 | Meterpreter botnet C2 server (confidence level: 100%) | |
file26.169.62.1 | NjRAT botnet C2 server (confidence level: 100%) | |
file31.57.219.219 | Quasar RAT botnet C2 server (confidence level: 75%) | |
file49.213.132.153 | Meterpreter botnet C2 server (confidence level: 75%) | |
file161.97.110.15 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
file43.128.21.242 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
file103.37.2.9 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.234.247.98 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file23.235.179.115 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file103.87.10.156 | Unknown malware botnet C2 server (confidence level: 100%) | |
file136.115.170.218 | Unknown malware botnet C2 server (confidence level: 100%) | |
file184.105.208.104 | Unknown malware botnet C2 server (confidence level: 100%) | |
file3.121.234.29 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.144.212.74 | Venom RAT botnet C2 server (confidence level: 100%) | |
file69.5.189.249 | Remcos botnet C2 server (confidence level: 100%) | |
file185.196.8.252 | Remcos botnet C2 server (confidence level: 100%) | |
file193.29.58.236 | Unknown RAT botnet C2 server (confidence level: 100%) | |
file78.12.249.26 | Meterpreter botnet C2 server (confidence level: 100%) | |
file45.138.16.75 | XWorm botnet C2 server (confidence level: 100%) | |
file167.122.70.50 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file185.222.58.43 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
file185.247.228.40 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
file4.225.89.181 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file156.234.33.81 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
file210.131.217.107 | Venom RAT botnet C2 server (confidence level: 100%) | |
file223.109.90.58 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
file34.223.43.67 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
file107.170.108.204 | BianLian botnet C2 server (confidence level: 75%) | |
file5.181.165.216 | AsyncRAT botnet C2 server (confidence level: 100%) | |
file159.89.98.76 | Unknown malware botnet C2 server (confidence level: 100%) | |
file193.242.184.197 | Unknown malware botnet C2 server (confidence level: 100%) | |
file45.87.249.10 | DanaBot botnet C2 server (confidence level: 75%) | |
file194.113.106.125 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
file45.122.120.69 | Remcos botnet C2 server (confidence level: 100%) | |
file176.65.151.197 | Remcos botnet C2 server (confidence level: 100%) | |
file108.137.50.248 | Meterpreter botnet C2 server (confidence level: 100%) | |
file54.177.176.66 | Meterpreter botnet C2 server (confidence level: 100%) | |
file46.16.14.246 | Cobalt Strike botnet C2 server (confidence level: 90%) | |
file212.232.23.65 | VShell botnet C2 server (confidence level: 100%) | |
file62.164.177.91 | Quasar RAT botnet C2 server (confidence level: 100%) | |
file150.139.132.27 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
file195.177.94.148 | Loda botnet C2 server (confidence level: 100%) |
Hash
| Value | Description | Copy |
|---|---|---|
hash6149 | Mirai botnet C2 server (confidence level: 100%) | |
hash205 | XWorm botnet C2 server (confidence level: 100%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash80 | Stealc botnet C2 server (confidence level: 50%) | |
hash28080 | Remcos botnet C2 server (confidence level: 100%) | |
hash6210 | Remcos botnet C2 server (confidence level: 100%) | |
hash3000 | Unknown Stealer botnet C2 server (confidence level: 100%) | |
hash61202 | XWorm botnet C2 server (confidence level: 100%) | |
hash4000 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash14643 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash4321 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash4444 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash6742 | Mirai botnet C2 server (confidence level: 100%) | |
hash7705 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
hash50912 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash50912 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash50912 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash18443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash7000 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash1234 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash9619 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash443 | Havoc botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash55650 | Mirai botnet C2 server (confidence level: 100%) | |
hash6667 | Mirai botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash5061 | Remcos botnet C2 server (confidence level: 100%) | |
hash443 | Sliver botnet C2 server (confidence level: 100%) | |
hash52334 | Bashlite botnet C2 server (confidence level: 75%) | |
hash8808 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash8080 | DCRat botnet C2 server (confidence level: 100%) | |
hash30914 | AdaptixC2 botnet C2 server (confidence level: 100%) | |
hash3389 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash6289 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash3790 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash20546 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash8888 | Sliver botnet C2 server (confidence level: 75%) | |
hash3108 | PureRAT botnet C2 server (confidence level: 100%) | |
hash59713 | Remcos botnet C2 server (confidence level: 100%) | |
hash63477 | Remcos botnet C2 server (confidence level: 100%) | |
hash19248 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash8888 | DeimosC2 botnet C2 server (confidence level: 75%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash5000 | Xillen Stealer botnet C2 server (confidence level: 75%) | |
hash80 | Unknown malware botnet C2 server (confidence level: 75%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | DCRat botnet C2 server (confidence level: 100%) | |
hash8081 | RisePro botnet C2 server (confidence level: 100%) | |
hash443 | Vidar botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash8080 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash7007 | XWorm botnet C2 server (confidence level: 100%) | |
hash9000 | SectopRAT botnet C2 server (confidence level: 100%) | |
hash9900 | XWorm botnet C2 server (confidence level: 100%) | |
hash9999 | XWorm botnet C2 server (confidence level: 100%) | |
hash12679 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash2929 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash11179 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash5552 | NjRAT botnet C2 server (confidence level: 100%) | |
hash5001 | Quasar RAT botnet C2 server (confidence level: 75%) | |
hash80 | Meterpreter botnet C2 server (confidence level: 75%) | |
hash7705 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
hash801 | Cobalt Strike botnet C2 server (confidence level: 75%) | |
hash59131 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash59131 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash59131 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8509 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash6000 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash8888 | Remcos botnet C2 server (confidence level: 100%) | |
hash2431 | Remcos botnet C2 server (confidence level: 100%) | |
hash80 | Unknown RAT botnet C2 server (confidence level: 100%) | |
hash39914 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash7772 | XWorm botnet C2 server (confidence level: 100%) | |
hash443 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash55615 | RedLine Stealer botnet C2 server (confidence level: 100%) | |
hash44451 | Nanocore RAT botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash19350 | Cobalt Strike botnet C2 server (confidence level: 100%) | |
hash8000 | Venom RAT botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
hash8080 | BianLian botnet C2 server (confidence level: 75%) | |
hash80 | AsyncRAT botnet C2 server (confidence level: 100%) | |
hash443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash7443 | Unknown malware botnet C2 server (confidence level: 100%) | |
hash443 | DanaBot botnet C2 server (confidence level: 75%) | |
hash7705 | PureLogs Stealer botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash2404 | Remcos botnet C2 server (confidence level: 100%) | |
hash103 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash2281 | Meterpreter botnet C2 server (confidence level: 100%) | |
hash443 | Cobalt Strike botnet C2 server (confidence level: 90%) | |
hash443 | VShell botnet C2 server (confidence level: 100%) | |
hash5755 | Quasar RAT botnet C2 server (confidence level: 100%) | |
hash10001 | Xtreme RAT botnet C2 server (confidence level: 100%) | |
hash4000 | Loda botnet C2 server (confidence level: 100%) |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://cdn.jsdelivr.net/gh/stp26det/22/get | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://172.233.15.195:8888/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://185.250.148.227/ | RedLine Stealer botnet C2 (confidence level: 100%) | |
urlhttp://102.204.223.168:8888/supershell/login/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://185.242.233.142:7877/jquery-3.3.1.min.js | Cobalt Strike botnet C2 (confidence level: 75%) | |
urlhttps://cdn.jsdelivr.net/gh/keys53/c10ud/nmbr9 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://178.16.52.35/c8ed5c2a04a04ed6.php | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://89.110.107.177:9000/wmglb | SectopRAT botnet C2 (confidence level: 100%) | |
urlhttp://89.110.107.177:9000/wbinjget | SectopRAT botnet C2 (confidence level: 100%) | |
urlhttp://77.110.121.209:5000/api/beat | Xillen Stealer botnet C2 (confidence level: 100%) | |
urlhttp://77.110.121.209:5000/api/register | Xillen Stealer botnet C2 (confidence level: 100%) | |
urlhttps://access-hub.lol/sys/update/status.php | Xillen Stealer botnet C2 (confidence level: 100%) | |
urlhttp://weaplink.com/mv2/ | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://weaplink.com/health | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttp://cg899737.tw1.ru/5d4602d2.php | DCRat botnet C2 (confidence level: 100%) | |
urlhttps://85.137.253.74/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://46.62.192.127/ | Vidar botnet C2 (confidence level: 100%) | |
urlhttps://trainen.cyou/api | Lumma Stealer botnet C2 (confidence level: 100%) | |
urlhttp://104.164.55.132 | Stealc botnet C2 (confidence level: 100%) | |
urlhttp://194.150.220.218/4sleypfak57hgubo/malacca | SectopRAT payload delivery URL (confidence level: 100%) | |
urlhttp://astrologickeconoablos.cc:8080/updater?for=76262f4263b30a25bb81956ea98986ed | Unknown malware botnet C2 (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/keys53/c10ud/bn45 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://hdywvr2.top/1.php | Unknown Loader botnet C2 (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/midjrney/c10ud/bn45 | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://cdn.jsdelivr.net/gh/keys53/c10ud/midjrney | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttps://nflportal.com/5f2a.js | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://nflportal.com/js.php | KongTuke payload delivery URL (confidence level: 100%) | |
urlhttps://erberloose.club | Stealc botnet C2 (confidence level: 75%) | |
urlhttps://cdn.jsdelivr.net/gh/stp26det/amd64/liveserv | ClearFake payload delivery URL (confidence level: 100%) | |
urlhttp://150.241.83.5/8574ba9c14cf4c8b.php | Stealc botnet C2 (confidence level: 100%) |
Threat ID: 6983e0d6f9fa50a62fb69fd3
Added to database: 2/5/2026, 12:14:14 AM
Last enriched: 2/5/2026, 12:14:27 AM
Last updated: 2/6/2026, 4:13:09 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumSystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.