Skip to content

Files

Latest commit

author
Tom Lancaster
Aug 3, 2024
1d68065 · Aug 3, 2024

History

History
15 lines (15 loc) · 1.65 KB

File metadata and controls

15 lines (15 loc) · 1.65 KB
1
valueentity_typedescription
2
103.96.130.107ipaddressC2 server used during the DNS poisoining
3
152.32.159.8ipaddressMACMA C2 Server
4
122.10.90.20ipaddressCATCHDNS C2
5
122.10.89.110ipaddressCATCHDNS C2
6
59.188.69.231ipaddressCATCHDNS C2
7
049e8677406de5f0061f3960f9655b5f,d14431e79dc109d7aad91a5411d406c99ffc524c,4f3d35f4f8b810362cbd4c59bfe5a961e559fe5713c9478294ccb3af2d306515fileCATCHDNS
8
ce5fdde7db4ee41808f9c7d121311f78,bb030c405f33557bc5441165a0f8bf9a6d5a82a6,3f76933e053b2e8e3458f2e69d72e10b6b6a97fb8ba0f0300aa415b99c032aeafileCATCHDNS
9
2a6c10a34fa1e2a38673f4ca20c303a1,038bc60a0bf004e9a7cbc3a3cf814613e61ba7cc,17aebd011dcd3e7c11484c2f98fa0901c2ea1325fdd6c03904d30ebfc8747a99fileCATCHDNS
10
07e3b067dc5e5de377ce4a5eff3ccd4e6a2f1d7a47c23fe06b1ededa7aed1ab3,66346b3d841dc56a387f48b4dfba96083c37ec2e,ee28b3137d65d74c0234eea35fa536affileRELOADEXT installer
11
77406e090ad9214942d7ca91ddd09b0435bafe42ffa2512819a7bc6cdec112b8,68853cafd395edd08cd38ab6100c58e291a3a3d7,4958ede3b968ad464c983054479bf4d2fileMACMA keylogger
12
7e2e1fba2fabf677d08611a59b03d646a92bb6110182b61adae207c8a88b6d13,c68e86985a4cb2f69e16fb943723af63833859b3,6abf9a7926415dc00bcb482456cc9467fileRELOADEXT extension
13
806eabfa6ee245eaaf817c0336e07982fffc42efb1f39a2bfb44a5db2c89b126,37ee872f05a0273446dc7e2539b9dbf9bf7d80b4,25e4eef79ad4126d5dc5567949848070fileMACMA sample
14
b76a9034e9abc7a62171e80f9d1f7fdf565cda286bd10fd3984eae769113c8c5,84875b2cf9f8c778ff1462ef478918b4ac964afe,acfc69c743b733dd80c1d551ae01172bfileMACMA-GIMMICK sample
15
b77bcfb036f5a6a3973fdd68f40c0bd0b19af1246688ca4b1f9db02f2055ef9d,e8e4a3fa69173a46cdb60c53877c7ad557accc51,4c8a326899272d2fe30e818181f6f67ffileDUSTPAN malware