Malware sample โคต๏ธ
bazaar.abuse.ch/sample/d6316...
@abuse-ch.bsky.social
Fighting malware and botnets
Malware sample โคต๏ธ
bazaar.abuse.ch/sample/d6316...
RemoteX RAT admin panel
Yet another RAT in town: RemoteX๐ฅ๏ธ๐ฑ๏ธ
๐ชฒ Dropped by Amadey
๐ Written in Golang
๐ป Uses HKCU\...\CurrentVersion\Run\RemoteX for persitence (lame ๐ฝ)
๐ Uses WebSocket for C2 communication
๐ต๏ธโโ๏ธ Unauthenticated RAT admin panel ๐คก
Botnet C2:
๐ก 109.107.168.147:80 (Partner Hosting LTD ๐ฌ๐ง)
Xillen Stealer admin panel on Cloudflare
Xillen Stealer ๐ฃ, heavily dropped by Amadey ๐ฅ
Botnet C2:
https://goldenring[.]live/api/logs/check
"Invisible. Undetectedable. Unstopable." ๐คก
๐ github.com/BengaminButt...
Samples โคต๏ธ
bazaar.abuse.ch/browse/signa...
Additional IOCs on ThreatFox ๐ฆ
threatfox.abuse.ch/browse/tag/X...
Thank you @spamhaustech.bsky.social & @abuse-ch.bsky.social for being #PIVOTcon26 Silver Sponsor ๐
Read more about alliance: abuse.ch & spamhaus.com
This alliance empowers the largest independently crowdsourced intelligence of tracked malware and botnets pivotcon.org/sponsors
#CTI #ThreatIntel
Brazilian Banker "GHOST" panel
Brazillian banker ๐ง๐ท caught by @johnk3r ๐ฃ
GHOST panel ๐ง
007consultoriafinanceira .net
83.229.17.124:80 Clouvider ๐บ๐ธ
Payload delivery URL:
๐https://urlhaus.abuse.ch/url/3759148/
Malware sample (MSI):
โ๏ธhttps://bazaar.abuse.ch/sample/2cbafc607c5d38a891ab89799f98b6b754b519706eb6597e4c4f2d4f6fc5db21/
Payload hosted on Cloudflare R2 bucket, but already got nuked due to an abuse report from URLhaus ๐
๐ urlhaus.abuse.ch/url/3751500/
LogMeIn #GoToResolve payload ๐
bazaar.abuse.ch/sample/77e22...
Malspam from Microsoft Outlook spreading LogMeIn GoToResolve RMM
Fake PDF download spreading LogMeIn GoToResolve RMM
Malspam sent from Microsoft Outlook that is spreading #LogMeIn GoToResolve RMM, enabling threat actors to access the victim's machine from remote ๐ป๐๐ต๏ธ
IOCs:
๐ก adwestmailcenter .com โก๏ธ Landing page
๐ก insightme .im โก๏ธ fake PDF download
turbokent .name - CHICXULUB IMPACT
CHICXULUB IMPACT ๐ฅ
Botnet C2 URLs:
๐ก turbokent .name/api/initialize
๐ก turbokent .name/api/status
Sponsoring domain registrar: NICENIC ๐ญ๐ฐ
Malware sample ๐:
bazaar.abuse.ch/sample/c32e1...
Malware samples ๐ค:
bazaar.abuse.ch/browse/tag/S...
IOCs available on ThreatFox ๐ฆ:
threatfox.abuse.ch/browse/tag/S...
New Stealer in town: SantaStealer ๐
๐
Botnet C2s โก๏ธall hosted at AS399486 VIRTUO ๐จ๐ฆ:
๐ก31.57.38.119:6767
๐ก31.57.38.244:6767
๐ก80.76.49.114:6767
Stealer admin panel (via @darkwebinformer.com ๐ช):
๐ต๏ธ stealer. su
Artifacts ๐ป:
C:\tempLog\Clipboard.txt
%LocalAppData%\Temp\passwordslog.txt
Mirai malware delivery URLs
Love letter โค๏ธ from a threat actor ๐ต๏ธexploiting React2Shell vulnerability (CVE-2025-55182) to spread #Mirai malware โคต๏ธ
fuckoffurlhaus ๐
Payload URLs:
๐ urlhaus.abuse.ch/host/45.153....
Mirai botnet C2s:
๐ก marvisxoxo .st (ISTanCo ๐ท๐ธ)
๐ก 45.156.87 .231:23789 (AS51396 PFCLOUD ๐ฉ๐ช)
The same malware is also being spread by #Amadey pay-per-install (PPI):
โก๏ธ urlhaus.abuse.ch/url/3733103/
ClickFix infection chain
Unknown malware using WebSockets for botnet command&control, spreading through #ClickFix โคต๏ธ
๐ฑ๏ธClickFix -> ๐VBS -> โ๏ธMSI
Payload delivery host:
๐https://urlhaus.abuse.ch/host/103.27.157.60/
Malware sample ๐ค:
bazaar.abuse.ch/sample/4d8e5...
Botnet C2 domains:
๐กw2li .xyz
๐กw2socks .xyz
Mirai #malware sample ๐ค:
bazaar.abuse.ch/sample/ee2fe...
Payload delivery host ๐:
urlhaus.abuse.ch/host/172.237...
Releated IOCs ๐ฆ:
threatfox.abuse.ch/browse/tag/C...
Malicious bast script deliverying Mirai payload
Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection โคต๏ธ
Botnet Mirai C2 domains ๐ก:
fuckphillipthegerman .ru
Botnet Mirai C2 servers , all hosted at FORTIS ๐ท๐บ:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328
MaksRAT botnet C2 traffic
MaksRAT
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\javacom
Botnet C2s ๐ก
104.198.24 .41:6656
avocado .gay
www.foldacces .online
www.makslove .xyz
www.mavenrat .xyz
www.blackprofit .online
Sample shared by @smica83 ๐ช
bazaar.abuse.ch/sample/88310...
IOCs
threatfox.abuse.ch/browse/tag/M...
Mirai malware sample:
๐ค bazaar.abuse.ch/sample/11248...
More #Mirai IOCs are available on ThreatFox:
๐ฆ threatfox.abuse.ch/browse/malwa...
Mirai campaign spreading through 213.209.143.85 (Railnet ๐ณ๐ฑ), messing around with the victim's system iptables ๐ค
Mirai botnet C2 domain:
womp.datasurge .vip (NameCheap ๐บ๐ธ)
Mirai botnet C2 server:
176.65.148.57:6969 (Pfcloud ๐ฉ๐ช)
Payload URL:
๐ urlhaus.abuse.ch/url/3725743/
More #Mirai IOCs are available on ThreatFox:
๐ฆ threatfox.abuse.ch/browse/malwa...
Mirai bot "zerobot"
Mirai botnet #zerobot spreading through 172.86.123.179 (cloudzy ๐ฆ๐ช) โคต๏ธ
Mirai botnet C2 domain:
0bot.qzz .io (Gandi SAS ๐ซ๐ท)
Mirai botnet C2 server:
140.233.190.96:69 (Internet Magnate ๐ฟ๐ฆ)
Payload URLs:
๐ urlhaus.abuse.ch/host/172.86....
Mirai malware sample:
๐ค bazaar.abuse.ch/sample/9f64e...
URLhaus simply wouldn't exist without the help of awesome and committed contributors like this who diligently report malware URLs everyday ๐
URLhaus stats โก๏ธ urlhaus.abuse.ch/statistics/
URLhaus โก๏ธ urlhaus.abuse.ch
๐ซถ #SharingIsCaring #Community #StrengthInUnity
URLhaus Top Contributor โGeenenspโ
๐ Massive shout out to URLhaus Top Contributor โgeenenspโ
First seen April 13th 2020 and since then, theyโve shared an unbelievable 844,345 malware URLs!! ๐ฎ Over the last 30 days, they have shared 8,902 URLs, firmly securing their position at the top of the leaderboard ๐ช โคต๏ธ
GrokPy botnet C2 traffic
GrokPy malware samples on MalwareBazaar:
๐ bazaar.abuse.ch/browse/signa...
Botnet C2s on ThreatFox:
๐ฆ threatfox.abuse.ch/browse/tag/G...
๐ has OCR capabilities for screenshots obtained via CDP, which are used to extract text from captcha
๐ค uses a Grok LLM model that resides in the botnet C2 server to solve the captcha
Botnet C2 servers are all hosted at Hetzner ๐ฉ๐ช on port 8008:
46[.]62.225.51 [active]
46[.]62.224.205
46[.]62.205.38
๐ฑ creates new accounts on Discord to obtain authentication tokens, which are then reported back to the botnet C2
๐ง uses dilly + [a-zA-Z0-9]{8,11}@gmail
.com + password [a-zA-Z0-9]{8} as the email and password for the Discord registration process
โ๏ธ uses the CDP (Chrome developer protocol) of either Edge or Chrome installed on the victim machine for further malicious actions
๐ก calls back to the botnet C2 on the various stages of the infection and the results of its malicious actions
๐ช collects information about the infected device, such as screen resolution, public IP & location, ram usage and CPU name
๐ป attempts to escalate privileges by running as admin or as a scheduled task
Weโve identified an interesting malware family ๐, which weโve named #GrokPy due to its use of a Grok LLM model ๐ค to solve and subsequently bypass CAPTCHAs ๐ฅ
The malware gets dropped by #Amadey and:
Malware samples:
๐ hunting.abuse.ch/hunt/691d7ec...
Yet another new stealer in town: #ArkanixStealer ๐ฅ
%AppData%\Arkanix_lol\history.json
%AppData%\Arkanix_lol\system_info.json
%AppData%\Arkanix_lol\screenshot_monitor_1.png
Akranix botnet C2:
๐ก arkanix .pw/api/session/create
๐ก arkanix .pw/delivery
๐ก arkanix .pw/api/discord-injection/template