bazaar.abuse.ch/sample/d6316...
bazaar.abuse.ch/sample/d6316...
🪲 Dropped by Amadey
📃 Written in Golang
💻 Uses HKCU\...\CurrentVersion\Run\RemoteX for persitence (lame 🚽)
🌐 Uses WebSocket for C2 communication
🕵️♂️ Unauthenticated RAT admin panel 🤡
Botnet C2:
📡 109.107.168.147:80 (Partner Hosting LTD 🇬🇧)
🪲 Dropped by Amadey
📃 Written in Golang
💻 Uses HKCU\...\CurrentVersion\Run\RemoteX for persitence (lame 🚽)
🌐 Uses WebSocket for C2 communication
🕵️♂️ Unauthenticated RAT admin panel 🤡
Botnet C2:
📡 109.107.168.147:80 (Partner Hosting LTD 🇬🇧)
Botnet C2:
https://goldenring[.]live/api/logs/check
"Invisible. Undetectedable. Unstopable." 🤡
👉 github.com/BengaminButt...
Samples ⤵️
bazaar.abuse.ch/browse/signa...
Additional IOCs on ThreatFox 🦊
threatfox.abuse.ch/browse/tag/X...
Botnet C2:
https://goldenring[.]live/api/logs/check
"Invisible. Undetectedable. Unstopable." 🤡
👉 github.com/BengaminButt...
Samples ⤵️
bazaar.abuse.ch/browse/signa...
Additional IOCs on ThreatFox 🦊
threatfox.abuse.ch/browse/tag/X...
Read more about alliance: abuse.ch & spamhaus.com
This alliance empowers the largest independently crowdsourced intelligence of tracked malware and botnets pivotcon.org/sponsors
#CTI #ThreatIntel
Read more about alliance: abuse.ch & spamhaus.com
This alliance empowers the largest independently crowdsourced intelligence of tracked malware and botnets pivotcon.org/sponsors
#CTI #ThreatIntel
GHOST panel 🧐
007consultoriafinanceira .net
83.229.17.124:80 Clouvider 🇺🇸
Payload delivery URL:
🌐https://urlhaus.abuse.ch/url/3759148/
Malware sample (MSI):
⚙️https://bazaar.abuse.ch/sample/2cbafc607c5d38a891ab89799f98b6b754b519706eb6597e4c4f2d4f6fc5db21/
GHOST panel 🧐
007consultoriafinanceira .net
83.229.17.124:80 Clouvider 🇺🇸
Payload delivery URL:
🌐https://urlhaus.abuse.ch/url/3759148/
Malware sample (MSI):
⚙️https://bazaar.abuse.ch/sample/2cbafc607c5d38a891ab89799f98b6b754b519706eb6597e4c4f2d4f6fc5db21/
🌐 urlhaus.abuse.ch/url/3751500/
LogMeIn #GoToResolve payload 📄
bazaar.abuse.ch/sample/77e22...
🌐 urlhaus.abuse.ch/url/3751500/
LogMeIn #GoToResolve payload 📄
bazaar.abuse.ch/sample/77e22...
IOCs:
📡 adwestmailcenter .com ➡️ Landing page
📡 insightme .im ➡️ fake PDF download
IOCs:
📡 adwestmailcenter .com ➡️ Landing page
📡 insightme .im ➡️ fake PDF download
Botnet C2 URLs:
📡 turbokent .name/api/initialize
📡 turbokent .name/api/status
Sponsoring domain registrar: NICENIC 🇭🇰
Malware sample 📄:
bazaar.abuse.ch/sample/c32e1...
Botnet C2 URLs:
📡 turbokent .name/api/initialize
📡 turbokent .name/api/status
Sponsoring domain registrar: NICENIC 🇭🇰
Malware sample 📄:
bazaar.abuse.ch/sample/c32e1...
bazaar.abuse.ch/browse/tag/S...
IOCs available on ThreatFox 🦊:
threatfox.abuse.ch/browse/tag/S...
bazaar.abuse.ch/browse/tag/S...
IOCs available on ThreatFox 🦊:
threatfox.abuse.ch/browse/tag/S...
Botnet C2s ➡️all hosted at AS399486 VIRTUO 🇨🇦:
📡31.57.38.119:6767
📡31.57.38.244:6767
📡80.76.49.114:6767
Stealer admin panel (via @darkwebinformer.com 💪):
🕵️ stealer. su
Artifacts 💻:
C:\tempLog\Clipboard.txt
%LocalAppData%\Temp\passwordslog.txt
Rapid7 Labs analyzed unstripped samples to detail how it operates and what defenders should know: https://r-7.co/4q5pk75
Botnet C2s ➡️all hosted at AS399486 VIRTUO 🇨🇦:
📡31.57.38.119:6767
📡31.57.38.244:6767
📡80.76.49.114:6767
Stealer admin panel (via @darkwebinformer.com 💪):
🕵️ stealer. su
Artifacts 💻:
C:\tempLog\Clipboard.txt
%LocalAppData%\Temp\passwordslog.txt
fuckoffurlhaus 😂
Payload URLs:
🌐 urlhaus.abuse.ch/host/45.153....
Mirai botnet C2s:
📡 marvisxoxo .st (ISTanCo 🇷🇸)
📡 45.156.87 .231:23789 (AS51396 PFCLOUD 🇩🇪)
fuckoffurlhaus 😂
Payload URLs:
🌐 urlhaus.abuse.ch/host/45.153....
Mirai botnet C2s:
📡 marvisxoxo .st (ISTanCo 🇷🇸)
📡 45.156.87 .231:23789 (AS51396 PFCLOUD 🇩🇪)
➡️ urlhaus.abuse.ch/url/3733103/
➡️ urlhaus.abuse.ch/url/3733103/
🖱️ClickFix -> 📃VBS -> ⚙️MSI
Payload delivery host:
🌐https://urlhaus.abuse.ch/host/103.27.157.60/
Malware sample 🤖:
bazaar.abuse.ch/sample/4d8e5...
Botnet C2 domains:
📡w2li .xyz
📡w2socks .xyz
🖱️ClickFix -> 📃VBS -> ⚙️MSI
Payload delivery host:
🌐https://urlhaus.abuse.ch/host/103.27.157.60/
Malware sample 🤖:
bazaar.abuse.ch/sample/4d8e5...
Botnet C2 domains:
📡w2li .xyz
📡w2socks .xyz
bazaar.abuse.ch/sample/ee2fe...
Payload delivery host 🌐:
urlhaus.abuse.ch/host/172.237...
Releated IOCs 🦊:
threatfox.abuse.ch/browse/tag/C...
bazaar.abuse.ch/sample/ee2fe...
Payload delivery host 🌐:
urlhaus.abuse.ch/host/172.237...
Releated IOCs 🦊:
threatfox.abuse.ch/browse/tag/C...
Botnet Mirai C2 domains 📡:
fuckphillipthegerman .ru
Botnet Mirai C2 servers , all hosted at FORTIS 🇷🇺:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328
Botnet Mirai C2 domains 📡:
fuckphillipthegerman .ru
Botnet Mirai C2 servers , all hosted at FORTIS 🇷🇺:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\javacom
Botnet C2s 📡
104.198.24 .41:6656
avocado .gay
www.foldacces .online
www.makslove .xyz
www.mavenrat .xyz
www.blackprofit .online
Sample shared by @smica83 💪
bazaar.abuse.ch/sample/88310...
IOCs
threatfox.abuse.ch/browse/tag/M...
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\javacom
Botnet C2s 📡
104.198.24 .41:6656
avocado .gay
www.foldacces .online
www.makslove .xyz
www.mavenrat .xyz
www.blackprofit .online
Sample shared by @smica83 💪
bazaar.abuse.ch/sample/88310...
IOCs
threatfox.abuse.ch/browse/tag/M...
🤖 bazaar.abuse.ch/sample/11248...
More #Mirai IOCs are available on ThreatFox:
🦊 threatfox.abuse.ch/browse/malwa...
🤖 bazaar.abuse.ch/sample/11248...
More #Mirai IOCs are available on ThreatFox:
🦊 threatfox.abuse.ch/browse/malwa...
Mirai botnet C2 domain:
womp.datasurge .vip (NameCheap 🇺🇸)
Mirai botnet C2 server:
176.65.148.57:6969 (Pfcloud 🇩🇪)
Payload URL:
🌐 urlhaus.abuse.ch/url/3725743/
Mirai botnet C2 domain:
womp.datasurge .vip (NameCheap 🇺🇸)
Mirai botnet C2 server:
176.65.148.57:6969 (Pfcloud 🇩🇪)
Payload URL:
🌐 urlhaus.abuse.ch/url/3725743/
Mirai botnet C2 domain:
0bot.qzz .io (Gandi SAS 🇫🇷)
Mirai botnet C2 server:
140.233.190.96:69 (Internet Magnate 🇿🇦)
Payload URLs:
🌐 urlhaus.abuse.ch/host/172.86....
Mirai malware sample:
🤖 bazaar.abuse.ch/sample/9f64e...
Mirai botnet C2 domain:
0bot.qzz .io (Gandi SAS 🇫🇷)
Mirai botnet C2 server:
140.233.190.96:69 (Internet Magnate 🇿🇦)
Payload URLs:
🌐 urlhaus.abuse.ch/host/172.86....
Mirai malware sample:
🤖 bazaar.abuse.ch/sample/9f64e...
URLhaus stats ➡️ urlhaus.abuse.ch/statistics/
URLhaus ➡️ urlhaus.abuse.ch
🫶 #SharingIsCaring #Community #StrengthInUnity
URLhaus stats ➡️ urlhaus.abuse.ch/statistics/
URLhaus ➡️ urlhaus.abuse.ch
🫶 #SharingIsCaring #Community #StrengthInUnity
First seen April 13th 2020 and since then, they’ve shared an unbelievable 844,345 malware URLs!! 😮 Over the last 30 days, they have shared 8,902 URLs, firmly securing their position at the top of the leaderboard 💪 ⤵️
First seen April 13th 2020 and since then, they’ve shared an unbelievable 844,345 malware URLs!! 😮 Over the last 30 days, they have shared 8,902 URLs, firmly securing their position at the top of the leaderboard 💪 ⤵️
📄 bazaar.abuse.ch/browse/signa...
Botnet C2s on ThreatFox:
🦊 threatfox.abuse.ch/browse/tag/G...
📄 bazaar.abuse.ch/browse/signa...
Botnet C2s on ThreatFox:
🦊 threatfox.abuse.ch/browse/tag/G...
🤖 uses a Grok LLM model that resides in the botnet C2 server to solve the captcha
Botnet C2 servers are all hosted at Hetzner 🇩🇪 on port 8008:
46[.]62.225.51 [active]
46[.]62.224.205
46[.]62.205.38
🤖 uses a Grok LLM model that resides in the botnet C2 server to solve the captcha
Botnet C2 servers are all hosted at Hetzner 🇩🇪 on port 8008:
46[.]62.225.51 [active]
46[.]62.224.205
46[.]62.205.38
📧 uses dilly + [a-zA-Z0-9]{8,11}@gmail
.com + password [a-zA-Z0-9]{8} as the email and password for the Discord registration process
📧 uses dilly + [a-zA-Z0-9]{8,11}@gmail
.com + password [a-zA-Z0-9]{8} as the email and password for the Discord registration process