Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
ce449a40b636204bf154265fd7296ce8e9b2df92bde80474314312f0086d6b9b
330KB
211221-3ypzvsfefq
5cd9785d43f1b4e06bd24537954e92b7
64df0558fcd2c453160c1343d8ed4da75a96a192
ce449a40b636204bf154265fd7296ce8e9b2df92bde80474314312f0086d6b9b
0d5f8682094ffd97818466ffe1100d1a427291854ded138c45345eb5c4fb710fa2a3ce9fe0fb2592711da45039a3d573c84a4baa87522d667e4b3712d7f6f448
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
Family | redline |
Botnet | runpe |
C2 |
142.202.242.172:7667 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | redline |
Botnet | 444 |
C2 |
31.131.254.105:1498 |
ce449a40b636204bf154265fd7296ce8e9b2df92bde80474314312f0086d6b9b
5cd9785d43f1b4e06bd24537954e92b7
330KB
64df0558fcd2c453160c1343d8ed4da75a96a192
ce449a40b636204bf154265fd7296ce8e9b2df92bde80474314312f0086d6b9b
0d5f8682094ffd97818466ffe1100d1a427291854ded138c45345eb5c4fb710fa2a3ce9fe0fb2592711da45039a3d573c84a4baa87522d667e4b3712d7f6f448
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Detects executables packed with VMProtect commercial packer.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.