's Avatar

@abuse-ch

Fighting malware and botnets

457
Followers
3
Following
186
Posts
07.02.2024
Joined
Posts Following

Latest posts by @abuse-ch

Preview
MalwareBazaar - ChromeSetup.msi (SparkRAT) ChromeSetup.msi has been detected as SparkRAT by MalwareBazaar

SparkRAT ➡️ ChromeSetup.msi ➡️ FUD 🔥

msftconnecttest .xyz ⤵️
Creation Date: 2024-12-02 ⤵️
After more than a year, this domain still has a detection rate of 1/93 🤯

Pointing to ⤵️
154.31.222.217:443 ➡️ DControl

Chinese? 🇨🇳
lang="zh-cn"

Malware sample:
bazaar.abuse.ch/sample/91a29...

26.02.2026 19:07 👍 0 🔁 0 💬 0 📌 0
Preview
ThreatFox - Tag FakeRMM Hunt for IOCs tagged with tag 'FakeRMM'

IOCs on ThreatFox:
🦊 threatfox.abuse.ch/browse/tag/F...

Malware samples:
📄 bazaar.abuse.ch/browse/tag/F...

25.02.2026 13:09 👍 0 🔁 0 💬 0 📌 0
Malware detonation suggests that the threat actor was likely playing around with ScreenConnect RMM before

Malware detonation suggests that the threat actor was likely playing around with ScreenConnect RMM before

It also seems that the threat actor was previously playing around with the legitimate RMM #ScreenConnect (aka ConnectWise) before switching to their own fake RMM 🛠️

What also stands out: the majority of the botnet C2s were hosted at Contabo GmbH 🇩🇪

We track the threat on our platforms as #FakeRMM ⤵️

25.02.2026 13:09 👍 0 🔁 0 💬 1 📌 0

Proofpoint recently identified a fake RMM (Remote Monitoring and Management Tool) called #TrustConnect and #DocConnect🔎💻 Pivoting the threat in our collection reveals that the threat actors spread the same malware under additional names, including:

➡️SoftConnect
➡️HardConnect
➡️AxisControl

25.02.2026 13:09 👍 2 🔁 0 💬 1 📌 0

Rogue #ScreenConnect RMM 🕵️‍♂️

Botnet C2:
📡 no.windowupdateservice .com
📡 relay.windowupdateservice .com
📡193.26.115.51:8041

Payload delivery URL:
🌐 urlhaus.abuse.ch/url/3782937/

Malware sample 📄:
bazaar.abuse.ch/sample/77dc5...

More ScreenConnect RMM IOCs ⤵️
threatfox.abuse.ch/browse/tag/S...

23.02.2026 09:23 👍 0 🔁 0 💬 0 📌 0

You can report false positives directly through the platform by navigating to the database entry and then choose "actions" -> "report FP"

20.02.2026 09:30 👍 0 🔁 0 💬 0 📌 0
Preview
MalwareBazaar - file (RemoteX) file has been detected as RemoteX by MalwareBazaar

Malware sample ⤵️
bazaar.abuse.ch/sample/d6316...

02.02.2026 14:40 👍 0 🔁 0 💬 0 📌 0
RemoteX RAT admin panel

RemoteX RAT admin panel

Yet another RAT in town: RemoteX🖥️🖱️

🪲 Dropped by Amadey
📃 Written in Golang
💻 Uses HKCU\...\CurrentVersion\Run\RemoteX for persitence (lame 🚽)
🌐 Uses WebSocket for C2 communication
🕵️‍♂️ Unauthenticated RAT admin panel 🤡

Botnet C2:
📡 109.107.168.147:80 (Partner Hosting LTD 🇬🇧)

02.02.2026 14:40 👍 0 🔁 0 💬 1 📌 0
Xillen Stealer admin panel on Cloudflare

Xillen Stealer admin panel on Cloudflare

Xillen Stealer 🎣, heavily dropped by Amadey 🔥

Botnet C2:
https://goldenring[.]live/api/logs/check

"Invisible. Undetectedable. Unstopable." 🤡

👉 github.com/BengaminButt...

Samples ⤵️
bazaar.abuse.ch/browse/signa...

Additional IOCs on ThreatFox 🦊
threatfox.abuse.ch/browse/tag/X...

30.01.2026 12:31 👍 0 🔁 0 💬 0 📌 0
Post image

Thank you @spamhaustech.bsky.social & @abuse-ch.bsky.social for being #PIVOTcon26 Silver Sponsor 🎉

Read more about alliance: abuse.ch & spamhaus.com
This alliance empowers the largest independently crowdsourced intelligence of tracked malware and botnets pivotcon.org/sponsors
#CTI #ThreatIntel

20.01.2026 14:11 👍 6 🔁 5 💬 0 📌 0
Brazilian Banker "GHOST" panel

Brazilian Banker "GHOST" panel

Brazillian banker 🇧🇷 caught by @johnk3r 🎣

GHOST panel 🧐

007consultoriafinanceira .net
83.229.17.124:80 Clouvider 🇺🇸

Payload delivery URL:
🌐https://urlhaus.abuse.ch/url/3759148/

Malware sample (MSI):
⚙️https://bazaar.abuse.ch/sample/2cbafc607c5d38a891ab89799f98b6b754b519706eb6597e4c4f2d4f6fc5db21/

16.01.2026 19:21 👍 0 🔁 0 💬 0 📌 0
Preview
MalwareBazaar - PicturesPreview.exe (GoToResolve) PicturesPreview.exe has been detected as GoToResolve by MalwareBazaar

Payload hosted on Cloudflare R2 bucket, but already got nuked due to an abuse report from URLhaus 🙌
🌐 urlhaus.abuse.ch/url/3751500/

LogMeIn #GoToResolve payload 📄
bazaar.abuse.ch/sample/77e22...

06.01.2026 18:48 👍 0 🔁 0 💬 0 📌 0
Malspam from Microsoft Outlook spreading LogMeIn GoToResolve RMM

Malspam from Microsoft Outlook spreading LogMeIn GoToResolve RMM

Fake PDF download spreading LogMeIn GoToResolve RMM

Fake PDF download spreading LogMeIn GoToResolve RMM

Malspam sent from Microsoft Outlook that is spreading #LogMeIn GoToResolve RMM, enabling threat actors to access the victim's machine from remote 💻🔍🕵️

IOCs:
📡 adwestmailcenter .com ➡️ Landing page
📡 insightme .im ➡️ fake PDF download

06.01.2026 18:48 👍 0 🔁 0 💬 1 📌 0
turbokent .name - CHICXULUB IMPACT

turbokent .name - CHICXULUB IMPACT

CHICXULUB IMPACT 💥

Botnet C2 URLs:
📡 turbokent .name/api/initialize
📡 turbokent .name/api/status

Sponsoring domain registrar: NICENIC 🇭🇰

Malware sample 📄:
bazaar.abuse.ch/sample/c32e1...

23.12.2025 17:05 👍 1 🔁 1 💬 0 📌 0
Preview
MalwareBazaar - Tag SantaStealer Hunt for malware samples tagged with tag 'SantaStealer'

Malware samples 🤖:
bazaar.abuse.ch/browse/tag/S...

IOCs available on ThreatFox 🦊:
threatfox.abuse.ch/browse/tag/S...

18.12.2025 09:46 👍 0 🔁 0 💬 0 📌 0

New Stealer in town: SantaStealer 🎅🎄

Botnet C2s ➡️all hosted at AS399486 VIRTUO 🇨🇦:
📡31.57.38.119:6767
📡31.57.38.244:6767
📡80.76.49.114:6767

Stealer admin panel (via @darkwebinformer.com 💪):
🕵️ stealer. su

Artifacts 💻:
C:\tempLog\Clipboard.txt
%LocalAppData%\Temp\passwordslog.txt

18.12.2025 09:46 👍 1 🔁 0 💬 1 📌 0
Mirai malware delivery URLs

Mirai malware delivery URLs

Love letter ❤️ from a threat actor 🕵️exploiting React2Shell vulnerability (CVE-2025-55182) to spread #Mirai malware ⤵️

fuckoffurlhaus 😂

Payload URLs:
🌐 urlhaus.abuse.ch/host/45.153....

Mirai botnet C2s:
📡 marvisxoxo .st (ISTanCo 🇷🇸)
📡 45.156.87 .231:23789 (AS51396 PFCLOUD 🇩🇪)

16.12.2025 07:15 👍 4 🔁 1 💬 1 📌 0
Preview
URLhaus - http://w2socks.xyz/uploads/5aba4745e080f54e.msi Malware distribution site: http://w2socks.xyz/uploads/5aba4745e080f54e.msi

The same malware is also being spread by #Amadey pay-per-install (PPI):
➡️ urlhaus.abuse.ch/url/3733103/

15.12.2025 07:40 👍 0 🔁 0 💬 0 📌 0
ClickFix infection chain

ClickFix infection chain

Unknown malware using WebSockets for botnet command&control, spreading through #ClickFix ⤵️

🖱️ClickFix -> 📃VBS -> ⚙️MSI

Payload delivery host:
🌐https://urlhaus.abuse.ch/host/103.27.157.60/

Malware sample 🤖:
bazaar.abuse.ch/sample/4d8e5...

Botnet C2 domains:
📡w2li .xyz
📡w2socks .xyz

15.12.2025 07:40 👍 1 🔁 1 💬 1 📌 0
Preview
MalwareBazaar - pew63 (Mirai) pew63 has been detected as Mirai by MalwareBazaar

Mirai #malware sample 🤖:
bazaar.abuse.ch/sample/ee2fe...

Payload delivery host 🌐:
urlhaus.abuse.ch/host/172.237...

Releated IOCs 🦊:
threatfox.abuse.ch/browse/tag/C...

10.12.2025 04:56 👍 0 🔁 0 💬 0 📌 0
Malicious bast script deliverying Mirai payload

Malicious bast script deliverying Mirai payload

Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection ⤵️

Botnet Mirai C2 domains 📡:
fuckphillipthegerman .ru

Botnet Mirai C2 servers , all hosted at FORTIS 🇷🇺:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328

10.12.2025 04:56 👍 1 🔁 0 💬 1 📌 0
MaksRAT botnet C2 traffic

MaksRAT botnet C2 traffic

MaksRAT

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\javacom

Botnet C2s 📡
104.198.24 .41:6656
avocado .gay
www.foldacces .online
www.makslove .xyz
www.mavenrat .xyz
www.blackprofit .online

Sample shared by @smica83 💪
bazaar.abuse.ch/sample/88310...

IOCs
threatfox.abuse.ch/browse/tag/M...

08.12.2025 15:41 👍 0 🔁 0 💬 0 📌 0
Preview
MalwareBazaar - data.arm7 (Mirai) data.arm7 has been detected as Mirai by MalwareBazaar

Mirai malware sample:

🤖 bazaar.abuse.ch/sample/11248...

More #Mirai IOCs are available on ThreatFox:

🦊 threatfox.abuse.ch/browse/malwa...

05.12.2025 11:40 👍 0 🔁 0 💬 0 📌 0
Post image

Mirai campaign spreading through 213.209.143.85 (Railnet 🇳🇱), messing around with the victim's system iptables 🤔

Mirai botnet C2 domain:
womp.datasurge .vip (NameCheap 🇺🇸)

Mirai botnet C2 server:
176.65.148.57:6969 (Pfcloud 🇩🇪)

Payload URL:
🌐 urlhaus.abuse.ch/url/3725743/

05.12.2025 11:40 👍 0 🔁 0 💬 1 📌 0
Preview
ThreatFox - Mirai Hunt for Mirai IOCs on ThreatFox

More #Mirai IOCs are available on ThreatFox:
🦊 threatfox.abuse.ch/browse/malwa...

04.12.2025 06:57 👍 0 🔁 0 💬 0 📌 0
Mirai bot "zerobot"

Mirai bot "zerobot"

Mirai botnet #zerobot spreading through 172.86.123.179 (cloudzy 🇦🇪) ⤵️

Mirai botnet C2 domain:
0bot.qzz .io (Gandi SAS 🇫🇷)

Mirai botnet C2 server:
140.233.190.96:69 (Internet Magnate 🇿🇦)

Payload URLs:
🌐 urlhaus.abuse.ch/host/172.86....

Mirai malware sample:
🤖 bazaar.abuse.ch/sample/9f64e...

04.12.2025 06:57 👍 0 🔁 0 💬 1 📌 0

URLhaus simply wouldn't exist without the help of awesome and committed contributors like this who diligently report malware URLs everyday 🙏

URLhaus stats ➡️ urlhaus.abuse.ch/statistics/
URLhaus ➡️ urlhaus.abuse.ch

🫶 #SharingIsCaring #Community #StrengthInUnity

03.12.2025 14:30 👍 0 🔁 0 💬 0 📌 0
URLhaus Top Contributor “Geenensp”

URLhaus Top Contributor “Geenensp”

🎉 Massive shout out to URLhaus Top Contributor “geenensp”

First seen April 13th 2020 and since then, they’ve shared an unbelievable 844,345 malware URLs!! 😮 Over the last 30 days, they have shared 8,902 URLs, firmly securing their position at the top of the leaderboard 💪 ⤵️

03.12.2025 14:30 👍 0 🔁 0 💬 1 📌 0
GrokPy botnet C2 traffic

GrokPy botnet C2 traffic

Post image Post image Post image

GrokPy malware samples on MalwareBazaar:
📄 bazaar.abuse.ch/browse/signa...

Botnet C2s on ThreatFox:
🦊 threatfox.abuse.ch/browse/tag/G...

27.11.2025 15:55 👍 0 🔁 0 💬 0 📌 0

🔍 has OCR capabilities for screenshots obtained via CDP, which are used to extract text from captcha
🤖 uses a Grok LLM model that resides in the botnet C2 server to solve the captcha

Botnet C2 servers are all hosted at Hetzner 🇩🇪 on port 8008:
46[.]62.225.51 [active]
46[.]62.224.205
46[.]62.205.38

27.11.2025 15:55 👍 0 🔁 0 💬 1 📌 0