Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
87706490fa6b8194c63d5a9f39b85946b48533600c693ecff43f83f63eb1426f
134KB
211221-td12ysegbr
56d47e51d5f2e852bdf91506c55ee621
38f5b323e9d3a70f9bea3a75903ab80e72c78f66
87706490fa6b8194c63d5a9f39b85946b48533600c693ecff43f83f63eb1426f
f7afd3417f2a69a47e297b1cd1b00b55e7ff1b0748f1a86283362a2ba9d70bce808e7c9fd77f7a44f949465d42b3f5f8f4173c18bbc0d899ad6ab36add02e364
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
Family | redline |
Botnet | runpe |
C2 |
142.202.242.172:7667 |
87706490fa6b8194c63d5a9f39b85946b48533600c693ecff43f83f63eb1426f
56d47e51d5f2e852bdf91506c55ee621
134KB
38f5b323e9d3a70f9bea3a75903ab80e72c78f66
87706490fa6b8194c63d5a9f39b85946b48533600c693ecff43f83f63eb1426f
f7afd3417f2a69a47e297b1cd1b00b55e7ff1b0748f1a86283362a2ba9d70bce808e7c9fd77f7a44f949465d42b3f5f8f4173c18bbc0d899ad6ab36add02e364
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.