's Avatar

@abuse-ch.bsky.social

Fighting malware and botnets

446 Followers  |  3 Following  |  180 Posts  |  Joined: 07.02.2024  |  2.0718

Latest posts by abuse-ch.bsky.social on Bluesky

Preview
MalwareBazaar - file (RemoteX) file has been detected as RemoteX by MalwareBazaar

Malware sample โคต๏ธ
bazaar.abuse.ch/sample/d6316...

02.02.2026 14:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
RemoteX RAT admin panel

RemoteX RAT admin panel

Yet another RAT in town: RemoteX๐Ÿ–ฅ๏ธ๐Ÿ–ฑ๏ธ

๐Ÿชฒ Dropped by Amadey
๐Ÿ“ƒ Written in Golang
๐Ÿ’ป Uses HKCU\...\CurrentVersion\Run\RemoteX for persitence (lame ๐Ÿšฝ)
๐ŸŒ Uses WebSocket for C2 communication
๐Ÿ•ต๏ธโ€โ™‚๏ธ Unauthenticated RAT admin panel ๐Ÿคก

Botnet C2:
๐Ÿ“ก 109.107.168.147:80 (Partner Hosting LTD ๐Ÿ‡ฌ๐Ÿ‡ง)

02.02.2026 14:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Xillen Stealer admin panel on Cloudflare

Xillen Stealer admin panel on Cloudflare

Xillen Stealer ๐ŸŽฃ, heavily dropped by Amadey ๐Ÿ”ฅ

Botnet C2:
https://goldenring[.]live/api/logs/check

"Invisible. Undetectedable. Unstopable." ๐Ÿคก

๐Ÿ‘‰ github.com/BengaminButt...

Samples โคต๏ธ
bazaar.abuse.ch/browse/signa...

Additional IOCs on ThreatFox ๐ŸฆŠ
threatfox.abuse.ch/browse/tag/X...

30.01.2026 12:31 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Thank you @spamhaustech.bsky.social & @abuse-ch.bsky.social for being #PIVOTcon26 Silver Sponsor ๐ŸŽ‰

Read more about alliance: abuse.ch & spamhaus.com
This alliance empowers the largest independently crowdsourced intelligence of tracked malware and botnets pivotcon.org/sponsors
#CTI #ThreatIntel

20.01.2026 14:11 โ€” ๐Ÿ‘ 6    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Brazilian Banker "GHOST" panel

Brazilian Banker "GHOST" panel

Brazillian banker ๐Ÿ‡ง๐Ÿ‡ท caught by @johnk3r ๐ŸŽฃ

GHOST panel ๐Ÿง

007consultoriafinanceira .net
83.229.17.124:80 Clouvider ๐Ÿ‡บ๐Ÿ‡ธ

Payload delivery URL:
๐ŸŒhttps://urlhaus.abuse.ch/url/3759148/

Malware sample (MSI):
โš™๏ธhttps://bazaar.abuse.ch/sample/2cbafc607c5d38a891ab89799f98b6b754b519706eb6597e4c4f2d4f6fc5db21/

16.01.2026 19:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
MalwareBazaar - PicturesPreview.exe (GoToResolve) PicturesPreview.exe has been detected as GoToResolve by MalwareBazaar

Payload hosted on Cloudflare R2 bucket, but already got nuked due to an abuse report from URLhaus ๐Ÿ™Œ
๐ŸŒ urlhaus.abuse.ch/url/3751500/

LogMeIn #GoToResolve payload ๐Ÿ“„
bazaar.abuse.ch/sample/77e22...

06.01.2026 18:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Malspam from Microsoft Outlook spreading LogMeIn GoToResolve RMM

Malspam from Microsoft Outlook spreading LogMeIn GoToResolve RMM

Fake PDF download spreading LogMeIn GoToResolve RMM

Fake PDF download spreading LogMeIn GoToResolve RMM

Malspam sent from Microsoft Outlook that is spreading #LogMeIn GoToResolve RMM, enabling threat actors to access the victim's machine from remote ๐Ÿ’ป๐Ÿ”๐Ÿ•ต๏ธ

IOCs:
๐Ÿ“ก adwestmailcenter .com โžก๏ธ Landing page
๐Ÿ“ก insightme .im โžก๏ธ fake PDF download

06.01.2026 18:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
turbokent .name - CHICXULUB IMPACT

turbokent .name - CHICXULUB IMPACT

CHICXULUB IMPACT ๐Ÿ’ฅ

Botnet C2 URLs:
๐Ÿ“ก turbokent .name/api/initialize
๐Ÿ“ก turbokent .name/api/status

Sponsoring domain registrar: NICENIC ๐Ÿ‡ญ๐Ÿ‡ฐ

Malware sample ๐Ÿ“„:
bazaar.abuse.ch/sample/c32e1...

23.12.2025 17:05 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
MalwareBazaar - Tag SantaStealer Hunt for malware samples tagged with tag 'SantaStealer'

Malware samples ๐Ÿค–:
bazaar.abuse.ch/browse/tag/S...

IOCs available on ThreatFox ๐ŸฆŠ:
threatfox.abuse.ch/browse/tag/S...

18.12.2025 09:46 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

New Stealer in town: SantaStealer ๐ŸŽ…๐ŸŽ„

Botnet C2s โžก๏ธall hosted at AS399486 VIRTUO ๐Ÿ‡จ๐Ÿ‡ฆ:
๐Ÿ“ก31.57.38.119:6767
๐Ÿ“ก31.57.38.244:6767
๐Ÿ“ก80.76.49.114:6767

Stealer admin panel (via @darkwebinformer.com ๐Ÿ’ช):
๐Ÿ•ต๏ธ stealer. su

Artifacts ๐Ÿ’ป:
C:\tempLog\Clipboard.txt
%LocalAppData%\Temp\passwordslog.txt

18.12.2025 09:46 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Mirai malware delivery URLs

Mirai malware delivery URLs

Love letter โค๏ธ from a threat actor ๐Ÿ•ต๏ธexploiting React2Shell vulnerability (CVE-2025-55182) to spread #Mirai malware โคต๏ธ

fuckoffurlhaus ๐Ÿ˜‚

Payload URLs:
๐ŸŒ urlhaus.abuse.ch/host/45.153....

Mirai botnet C2s:
๐Ÿ“ก marvisxoxo .st (ISTanCo ๐Ÿ‡ท๐Ÿ‡ธ)
๐Ÿ“ก 45.156.87 .231:23789 (AS51396 PFCLOUD ๐Ÿ‡ฉ๐Ÿ‡ช)

16.12.2025 07:15 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
URLhaus - http://w2socks.xyz/uploads/5aba4745e080f54e.msi Malware distribution site: http://w2socks.xyz/uploads/5aba4745e080f54e.msi

The same malware is also being spread by #Amadey pay-per-install (PPI):
โžก๏ธ urlhaus.abuse.ch/url/3733103/

15.12.2025 07:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
ClickFix infection chain

ClickFix infection chain

Unknown malware using WebSockets for botnet command&control, spreading through #ClickFix โคต๏ธ

๐Ÿ–ฑ๏ธClickFix -> ๐Ÿ“ƒVBS -> โš™๏ธMSI

Payload delivery host:
๐ŸŒhttps://urlhaus.abuse.ch/host/103.27.157.60/

Malware sample ๐Ÿค–:
bazaar.abuse.ch/sample/4d8e5...

Botnet C2 domains:
๐Ÿ“กw2li .xyz
๐Ÿ“กw2socks .xyz

15.12.2025 07:40 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
MalwareBazaar - pew63 (Mirai) pew63 has been detected as Mirai by MalwareBazaar

Mirai #malware sample ๐Ÿค–:
bazaar.abuse.ch/sample/ee2fe...

Payload delivery host ๐ŸŒ:
urlhaus.abuse.ch/host/172.237...

Releated IOCs ๐ŸฆŠ:
threatfox.abuse.ch/browse/tag/C...

10.12.2025 04:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Malicious bast script deliverying Mirai payload

Malicious bast script deliverying Mirai payload

Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection โคต๏ธ

Botnet Mirai C2 domains ๐Ÿ“ก:
fuckphillipthegerman .ru

Botnet Mirai C2 servers , all hosted at FORTIS ๐Ÿ‡ท๐Ÿ‡บ:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328

10.12.2025 04:56 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
MaksRAT botnet C2 traffic

MaksRAT botnet C2 traffic

MaksRAT

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\javacom

Botnet C2s ๐Ÿ“ก
104.198.24 .41:6656
avocado .gay
www.foldacces .online
www.makslove .xyz
www.mavenrat .xyz
www.blackprofit .online

Sample shared by @smica83 ๐Ÿ’ช
bazaar.abuse.ch/sample/88310...

IOCs
threatfox.abuse.ch/browse/tag/M...

08.12.2025 15:41 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
MalwareBazaar - data.arm7 (Mirai) data.arm7 has been detected as Mirai by MalwareBazaar

Mirai malware sample:

๐Ÿค– bazaar.abuse.ch/sample/11248...

More #Mirai IOCs are available on ThreatFox:

๐ŸฆŠ threatfox.abuse.ch/browse/malwa...

05.12.2025 11:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Mirai campaign spreading through 213.209.143.85 (Railnet ๐Ÿ‡ณ๐Ÿ‡ฑ), messing around with the victim's system iptables ๐Ÿค”

Mirai botnet C2 domain:
womp.datasurge .vip (NameCheap ๐Ÿ‡บ๐Ÿ‡ธ)

Mirai botnet C2 server:
176.65.148.57:6969 (Pfcloud ๐Ÿ‡ฉ๐Ÿ‡ช)

Payload URL:
๐ŸŒ urlhaus.abuse.ch/url/3725743/

05.12.2025 11:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
ThreatFox - Mirai Hunt for Mirai IOCs on ThreatFox

More #Mirai IOCs are available on ThreatFox:
๐ŸฆŠ threatfox.abuse.ch/browse/malwa...

04.12.2025 06:57 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Mirai bot "zerobot"

Mirai bot "zerobot"

Mirai botnet #zerobot spreading through 172.86.123.179 (cloudzy ๐Ÿ‡ฆ๐Ÿ‡ช) โคต๏ธ

Mirai botnet C2 domain:
0bot.qzz .io (Gandi SAS ๐Ÿ‡ซ๐Ÿ‡ท)

Mirai botnet C2 server:
140.233.190.96:69 (Internet Magnate ๐Ÿ‡ฟ๐Ÿ‡ฆ)

Payload URLs:
๐ŸŒ urlhaus.abuse.ch/host/172.86....

Mirai malware sample:
๐Ÿค– bazaar.abuse.ch/sample/9f64e...

04.12.2025 06:57 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

URLhaus simply wouldn't exist without the help of awesome and committed contributors like this who diligently report malware URLs everyday ๐Ÿ™

URLhaus stats โžก๏ธ urlhaus.abuse.ch/statistics/
URLhaus โžก๏ธ urlhaus.abuse.ch

๐Ÿซถ #SharingIsCaring #Community #StrengthInUnity

03.12.2025 14:30 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
URLhaus Top Contributor โ€œGeenenspโ€

URLhaus Top Contributor โ€œGeenenspโ€

๐ŸŽ‰ Massive shout out to URLhaus Top Contributor โ€œgeenenspโ€

First seen April 13th 2020 and since then, theyโ€™ve shared an unbelievable 844,345 malware URLs!! ๐Ÿ˜ฎ Over the last 30 days, they have shared 8,902 URLs, firmly securing their position at the top of the leaderboard ๐Ÿ’ช โคต๏ธ

03.12.2025 14:30 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
GrokPy botnet C2 traffic

GrokPy botnet C2 traffic

Post image Post image Post image

GrokPy malware samples on MalwareBazaar:
๐Ÿ“„ bazaar.abuse.ch/browse/signa...

Botnet C2s on ThreatFox:
๐ŸฆŠ threatfox.abuse.ch/browse/tag/G...

27.11.2025 15:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

๐Ÿ” has OCR capabilities for screenshots obtained via CDP, which are used to extract text from captcha
๐Ÿค– uses a Grok LLM model that resides in the botnet C2 server to solve the captcha

Botnet C2 servers are all hosted at Hetzner ๐Ÿ‡ฉ๐Ÿ‡ช on port 8008:
46[.]62.225.51 [active]
46[.]62.224.205
46[.]62.205.38

27.11.2025 15:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿ‘ฑ creates new accounts on Discord to obtain authentication tokens, which are then reported back to the botnet C2
๐Ÿ“ง uses dilly + [a-zA-Z0-9]{8,11}@gmail
.com + password [a-zA-Z0-9]{8} as the email and password for the Discord registration process

27.11.2025 15:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

โš™๏ธ uses the CDP (Chrome developer protocol) of either Edge or Chrome installed on the victim machine for further malicious actions
๐Ÿ“ก calls back to the botnet C2 on the various stages of the infection and the results of its malicious actions

27.11.2025 15:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿช collects information about the infected device, such as screen resolution, public IP & location, ram usage and CPU name
๐Ÿ’ป attempts to escalate privileges by running as admin or as a scheduled task

27.11.2025 15:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Weโ€™ve identified an interesting malware family ๐Ÿ”, which weโ€™ve named #GrokPy due to its use of a Grok LLM model ๐Ÿค– to solve and subsequently bypass CAPTCHAs ๐Ÿ”ฅ

The malware gets dropped by #Amadey and:

27.11.2025 15:55 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Hunt for arkanix.pw/ on abuse.ch Hunt for CTI related to arkanix.pw on abuse.ch Hunting Platform

Malware samples:
๐Ÿ‘‰ hunting.abuse.ch/hunt/691d7ec...

19.11.2025 08:30 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Yet another new stealer in town: #ArkanixStealer ๐Ÿ”ฅ

%AppData%\Arkanix_lol\history.json
%AppData%\Arkanix_lol\system_info.json
%AppData%\Arkanix_lol\screenshot_monitor_1.png

Akranix botnet C2:
๐Ÿ“ก arkanix .pw/api/session/create
๐Ÿ“ก arkanix .pw/delivery
๐Ÿ“ก arkanix .pw/api/discord-injection/template

19.11.2025 08:30 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

@abuse-ch is following 3 prominent accounts