AsyncRAT botnet controller @20.52.33.123

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.

Malware botnet controller located at 20.52.33.123 on port 2222 TCP:
$ telnet 20.52.33.123 2222
Trying 20.52.33.123…
Connected to 20.52.33.123.
Escape character is ‘^]’

Referencing malware samples (MD5 hash):
32ecfe02dff3f6e8ca454c6d1d9b3d07 — AV detection: 50 / 68 (73.53%)
7562ef962c748191787a5ee63d62fdbc — AV detection: 21 / 69 (30.43%)

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *