Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
589b26584826917cb1e4ee0961ca07f08a7f6e6bc382d072b530647dfad4b43e
212KB
211221-z6fjlsfddm
7969e97b5c96227bab5fd5f2096e3d6f
5951dfae9592a28db76596e6e35dc10728c31755
589b26584826917cb1e4ee0961ca07f08a7f6e6bc382d072b530647dfad4b43e
36c413e717718d118c9c1364e20abe35d79bb81fa797ff3c4eb92a39ffc06bdf56cb0497e23534fa09a7682d81f421b2f49fa792987bdea8ec7a706d522acac1
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
Family | redline |
Botnet | runpe |
C2 |
142.202.242.172:7667 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | redline |
Botnet | 444 |
C2 |
31.131.254.105:1498 |
589b26584826917cb1e4ee0961ca07f08a7f6e6bc382d072b530647dfad4b43e
7969e97b5c96227bab5fd5f2096e3d6f
212KB
5951dfae9592a28db76596e6e35dc10728c31755
589b26584826917cb1e4ee0961ca07f08a7f6e6bc382d072b530647dfad4b43e
36c413e717718d118c9c1364e20abe35d79bb81fa797ff3c4eb92a39ffc06bdf56cb0497e23534fa09a7682d81f421b2f49fa792987bdea8ec7a706d522acac1
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
A keylogger first seen in Nov 2020.
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Detects executables packed with VMProtect commercial packer.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.