Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
83f52514cb5403c0f6cada3d3a68957922a5b5dfe985f5dacadfd9322a5cdd2d
309KB
211221-1j4hlafdep
4c74a642b85c6a9084d8ccfee6616cc1
ffdbb6d5413e7e171accaf34ed7c650b114d194d
83f52514cb5403c0f6cada3d3a68957922a5b5dfe985f5dacadfd9322a5cdd2d
9a53ee551304577a4486d915d3285bdd1c9d4de5e1aabe4ae18033ff9a575109308f0e7e04874d1ce0c1b68804c3bfd50dd3925d055da9f57ef583ad6b9d76fb
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
Family | redline |
Botnet | runpe |
C2 |
142.202.242.172:7667 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | redline |
Botnet | 444 |
C2 |
31.131.254.105:1498 |
83f52514cb5403c0f6cada3d3a68957922a5b5dfe985f5dacadfd9322a5cdd2d
4c74a642b85c6a9084d8ccfee6616cc1
309KB
ffdbb6d5413e7e171accaf34ed7c650b114d194d
83f52514cb5403c0f6cada3d3a68957922a5b5dfe985f5dacadfd9322a5cdd2d
9a53ee551304577a4486d915d3285bdd1c9d4de5e1aabe4ae18033ff9a575109308f0e7e04874d1ce0c1b68804c3bfd50dd3925d055da9f57ef583ad6b9d76fb
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Detects executables packed with VMProtect commercial packer.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.