ArkeiStealer, Smoke botnet controller and malware distribution @95.213.216.231

According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address.

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.

ArkeiStealer botnet controller located at 95.213.216.231 on port 80 (using HTTP POST):
hXXp://coin-file-file-19.com/tratata.php

coin-file-file-19.com. 600 IN A 95.213.216.231

Referencing malware binaries (MD5 hash):
07187aaa44a712bf4d7d6d128c5feb85 — AV detection: 44 / 71 (61.97)
375e3abc3b6ac06e46ffddc157c117ef — AV detection: 28 / 70 (40.00)
52f0721d0a1e2d79fc72b65353c6ff0a — AV detection: 25 / 69 (36.23)
b0fd980ce7cf54c7f24ba5eb54c713f2 — AV detection: 44 / 71 (61.97)
b5fead869ba6f1446828cbb619b927a1 — AV detection: 47 / 69 (68.12)
dac68fc285c980b3ea163584948a6551 — AV detection: 23 / 68 (33.82)
fd68374b79182d936dc3b661de7bd104 — AV detection: 27 / 70 (38.57)

Smoke Loader botnet controller located at 95.213.216.231 on port 80 (using HTTP POST):
hXXp://file-coin-host-12.com/

file-coin-host-12.com. 600 IN A 95.213.216.231

Referencing malware binaries (MD5 hash):
709cdc8f1ffceb73206dec78221d895e — AV detection: 23 / 67 (34.33)
9fe895c3631429459b128bff1cb6f948 — AV detection: 20 / 66 (30.30)
d0f36dcf733939b17f962b83082e15b1 — AV detection: 23 / 67 (34.33)

Malware distribution located here:
hXXp://file-coin-coin-10.com/files/13_1647960020_5631.exe
hXXp://file-coin-coin-10.com/files/9911_1647683570_4333.exe
hXXp://privacy-tools-for-you-795.com/downloads/toolspab2.exe
hXXp://privacy-tools-for-you-796.com/downloads/toolspab3.exe

file-coin-coin-10.com. 600 IN A 95.213.216.231
privacy-tools-for-you-795.com. 600 IN A 95.213.216.231

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.

Malware botnet controller located at 95.213.216.231 on port 443:
$ telnet 95.213.216.231 443
Trying 95.213.216.231…
Connected to 95.213.216.231.
Escape character is ‘^]’

Additional malicious domains observed at this IP address:
coin-file-file-19.com. 600 IN A 95.213.216.231
file-coin-coin-10.com. 600 IN A 95.213.216.231
file-coin-host-12.com. 600 IN A 95.213.216.231
file-file-host8.com. 600 IN A 95.213.216.231
privacy-tools-for-you-795.com. 600 IN A 95.213.216.231
privacy-tools-for-you-796.com. 600 IN A 95.213.216.231
stats404.info. 600 IN A 95.213.216.231

Опубликовано
В рубрике selectel.ru

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *