MalwareBazaar - ChromeSetup.msi (SparkRAT)
ChromeSetup.msi has been detected as SparkRAT by MalwareBazaar
SparkRAT ➡️ ChromeSetup.msi ➡️ FUD 🔥
msftconnecttest .xyz ⤵️
Creation Date: 2024-12-02 ⤵️
After more than a year, this domain still has a detection rate of 1/93 🤯
Pointing to ⤵️
154.31.222.217:443 ➡️ DControl
Chinese? 🇨🇳
lang="zh-cn"
Malware sample:
bazaar.abuse.ch/sample/91a29...
26.02.2026 19:07
👍 0
🔁 0
💬 0
📌 0
ThreatFox - Tag FakeRMM
Hunt for IOCs tagged with tag 'FakeRMM'
IOCs on ThreatFox:
🦊 threatfox.abuse.ch/browse/tag/F...
Malware samples:
📄 bazaar.abuse.ch/browse/tag/F...
25.02.2026 13:09
👍 0
🔁 0
💬 0
📌 0
Malware detonation suggests that the threat actor was likely playing around with ScreenConnect RMM before
It also seems that the threat actor was previously playing around with the legitimate RMM #ScreenConnect (aka ConnectWise) before switching to their own fake RMM 🛠️
What also stands out: the majority of the botnet C2s were hosted at Contabo GmbH 🇩🇪
We track the threat on our platforms as #FakeRMM ⤵️
25.02.2026 13:09
👍 0
🔁 0
💬 1
📌 0
Proofpoint recently identified a fake RMM (Remote Monitoring and Management Tool) called #TrustConnect and #DocConnect🔎💻 Pivoting the threat in our collection reveals that the threat actors spread the same malware under additional names, including:
➡️SoftConnect
➡️HardConnect
➡️AxisControl
25.02.2026 13:09
👍 2
🔁 0
💬 1
📌 0
Rogue #ScreenConnect RMM 🕵️♂️
Botnet C2:
📡 no.windowupdateservice .com
📡 relay.windowupdateservice .com
📡193.26.115.51:8041
Payload delivery URL:
🌐 urlhaus.abuse.ch/url/3782937/
Malware sample 📄:
bazaar.abuse.ch/sample/77dc5...
More ScreenConnect RMM IOCs ⤵️
threatfox.abuse.ch/browse/tag/S...
23.02.2026 09:23
👍 0
🔁 0
💬 0
📌 0
You can report false positives directly through the platform by navigating to the database entry and then choose "actions" -> "report FP"
20.02.2026 09:30
👍 0
🔁 0
💬 0
📌 0
RemoteX RAT admin panel
Yet another RAT in town: RemoteX🖥️🖱️
🪲 Dropped by Amadey
📃 Written in Golang
💻 Uses HKCU\...\CurrentVersion\Run\RemoteX for persitence (lame 🚽)
🌐 Uses WebSocket for C2 communication
🕵️♂️ Unauthenticated RAT admin panel 🤡
Botnet C2:
📡 109.107.168.147:80 (Partner Hosting LTD 🇬🇧)
02.02.2026 14:40
👍 0
🔁 0
💬 1
📌 0
Xillen Stealer admin panel on Cloudflare
Xillen Stealer 🎣, heavily dropped by Amadey 🔥
Botnet C2:
https://goldenring[.]live/api/logs/check
"Invisible. Undetectedable. Unstopable." 🤡
👉 github.com/BengaminButt...
Samples ⤵️
bazaar.abuse.ch/browse/signa...
Additional IOCs on ThreatFox 🦊
threatfox.abuse.ch/browse/tag/X...
30.01.2026 12:31
👍 0
🔁 0
💬 0
📌 0
Thank you @spamhaustech.bsky.social & @abuse-ch.bsky.social for being #PIVOTcon26 Silver Sponsor 🎉
Read more about alliance: abuse.ch & spamhaus.com
This alliance empowers the largest independently crowdsourced intelligence of tracked malware and botnets pivotcon.org/sponsors
#CTI #ThreatIntel
20.01.2026 14:11
👍 6
🔁 5
💬 0
📌 0
Brazilian Banker "GHOST" panel
Brazillian banker 🇧🇷 caught by @johnk3r 🎣
GHOST panel 🧐
007consultoriafinanceira .net
83.229.17.124:80 Clouvider 🇺🇸
Payload delivery URL:
🌐https://urlhaus.abuse.ch/url/3759148/
Malware sample (MSI):
⚙️https://bazaar.abuse.ch/sample/2cbafc607c5d38a891ab89799f98b6b754b519706eb6597e4c4f2d4f6fc5db21/
16.01.2026 19:21
👍 0
🔁 0
💬 0
📌 0
MalwareBazaar - PicturesPreview.exe (GoToResolve)
PicturesPreview.exe has been detected as GoToResolve by MalwareBazaar
Payload hosted on Cloudflare R2 bucket, but already got nuked due to an abuse report from URLhaus 🙌
🌐 urlhaus.abuse.ch/url/3751500/
LogMeIn #GoToResolve payload 📄
bazaar.abuse.ch/sample/77e22...
06.01.2026 18:48
👍 0
🔁 0
💬 0
📌 0
Malspam from Microsoft Outlook spreading LogMeIn GoToResolve RMM
Fake PDF download spreading LogMeIn GoToResolve RMM
Malspam sent from Microsoft Outlook that is spreading #LogMeIn GoToResolve RMM, enabling threat actors to access the victim's machine from remote 💻🔍🕵️
IOCs:
📡 adwestmailcenter .com ➡️ Landing page
📡 insightme .im ➡️ fake PDF download
06.01.2026 18:48
👍 0
🔁 0
💬 1
📌 0
turbokent .name - CHICXULUB IMPACT
CHICXULUB IMPACT 💥
Botnet C2 URLs:
📡 turbokent .name/api/initialize
📡 turbokent .name/api/status
Sponsoring domain registrar: NICENIC 🇭🇰
Malware sample 📄:
bazaar.abuse.ch/sample/c32e1...
23.12.2025 17:05
👍 1
🔁 1
💬 0
📌 0
MalwareBazaar - Tag SantaStealer
Hunt for malware samples tagged with tag 'SantaStealer'
Malware samples 🤖:
bazaar.abuse.ch/browse/tag/S...
IOCs available on ThreatFox 🦊:
threatfox.abuse.ch/browse/tag/S...
18.12.2025 09:46
👍 0
🔁 0
💬 0
📌 0
New Stealer in town: SantaStealer 🎅🎄
Botnet C2s ➡️all hosted at AS399486 VIRTUO 🇨🇦:
📡31.57.38.119:6767
📡31.57.38.244:6767
📡80.76.49.114:6767
Stealer admin panel (via @darkwebinformer.com 💪):
🕵️ stealer. su
Artifacts 💻:
C:\tempLog\Clipboard.txt
%LocalAppData%\Temp\passwordslog.txt
18.12.2025 09:46
👍 1
🔁 0
💬 1
📌 0
Mirai malware delivery URLs
Love letter ❤️ from a threat actor 🕵️exploiting React2Shell vulnerability (CVE-2025-55182) to spread #Mirai malware ⤵️
fuckoffurlhaus 😂
Payload URLs:
🌐 urlhaus.abuse.ch/host/45.153....
Mirai botnet C2s:
📡 marvisxoxo .st (ISTanCo 🇷🇸)
📡 45.156.87 .231:23789 (AS51396 PFCLOUD 🇩🇪)
16.12.2025 07:15
👍 4
🔁 1
💬 1
📌 0
ClickFix infection chain
Unknown malware using WebSockets for botnet command&control, spreading through #ClickFix ⤵️
🖱️ClickFix -> 📃VBS -> ⚙️MSI
Payload delivery host:
🌐https://urlhaus.abuse.ch/host/103.27.157.60/
Malware sample 🤖:
bazaar.abuse.ch/sample/4d8e5...
Botnet C2 domains:
📡w2li .xyz
📡w2socks .xyz
15.12.2025 07:40
👍 1
🔁 1
💬 1
📌 0
MalwareBazaar - pew63 (Mirai)
pew63 has been detected as Mirai by MalwareBazaar
Mirai #malware sample 🤖:
bazaar.abuse.ch/sample/ee2fe...
Payload delivery host 🌐:
urlhaus.abuse.ch/host/172.237...
Releated IOCs 🦊:
threatfox.abuse.ch/browse/tag/C...
10.12.2025 04:56
👍 0
🔁 0
💬 0
📌 0
Malicious bast script deliverying Mirai payload
Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection ⤵️
Botnet Mirai C2 domains 📡:
fuckphillipthegerman .ru
Botnet Mirai C2 servers , all hosted at FORTIS 🇷🇺:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328
10.12.2025 04:56
👍 1
🔁 0
💬 1
📌 0
MaksRAT botnet C2 traffic
MaksRAT
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\javacom
Botnet C2s 📡
104.198.24 .41:6656
avocado .gay
www.foldacces .online
www.makslove .xyz
www.mavenrat .xyz
www.blackprofit .online
Sample shared by @smica83 💪
bazaar.abuse.ch/sample/88310...
IOCs
threatfox.abuse.ch/browse/tag/M...
08.12.2025 15:41
👍 0
🔁 0
💬 0
📌 0
MalwareBazaar - data.arm7 (Mirai)
data.arm7 has been detected as Mirai by MalwareBazaar
Mirai malware sample:
🤖 bazaar.abuse.ch/sample/11248...
More #Mirai IOCs are available on ThreatFox:
🦊 threatfox.abuse.ch/browse/malwa...
05.12.2025 11:40
👍 0
🔁 0
💬 0
📌 0
Mirai campaign spreading through 213.209.143.85 (Railnet 🇳🇱), messing around with the victim's system iptables 🤔
Mirai botnet C2 domain:
womp.datasurge .vip (NameCheap 🇺🇸)
Mirai botnet C2 server:
176.65.148.57:6969 (Pfcloud 🇩🇪)
Payload URL:
🌐 urlhaus.abuse.ch/url/3725743/
05.12.2025 11:40
👍 0
🔁 0
💬 1
📌 0
Mirai bot "zerobot"
Mirai botnet #zerobot spreading through 172.86.123.179 (cloudzy 🇦🇪) ⤵️
Mirai botnet C2 domain:
0bot.qzz .io (Gandi SAS 🇫🇷)
Mirai botnet C2 server:
140.233.190.96:69 (Internet Magnate 🇿🇦)
Payload URLs:
🌐 urlhaus.abuse.ch/host/172.86....
Mirai malware sample:
🤖 bazaar.abuse.ch/sample/9f64e...
04.12.2025 06:57
👍 0
🔁 0
💬 1
📌 0
URLhaus simply wouldn't exist without the help of awesome and committed contributors like this who diligently report malware URLs everyday 🙏
URLhaus stats ➡️ urlhaus.abuse.ch/statistics/
URLhaus ➡️ urlhaus.abuse.ch
🫶 #SharingIsCaring #Community #StrengthInUnity
03.12.2025 14:30
👍 0
🔁 0
💬 0
📌 0
URLhaus Top Contributor “Geenensp”
🎉 Massive shout out to URLhaus Top Contributor “geenensp”
First seen April 13th 2020 and since then, they’ve shared an unbelievable 844,345 malware URLs!! 😮 Over the last 30 days, they have shared 8,902 URLs, firmly securing their position at the top of the leaderboard 💪 ⤵️
03.12.2025 14:30
👍 0
🔁 0
💬 1
📌 0
GrokPy botnet C2 traffic
GrokPy malware samples on MalwareBazaar:
📄 bazaar.abuse.ch/browse/signa...
Botnet C2s on ThreatFox:
🦊 threatfox.abuse.ch/browse/tag/G...
27.11.2025 15:55
👍 0
🔁 0
💬 0
📌 0
🔍 has OCR capabilities for screenshots obtained via CDP, which are used to extract text from captcha
🤖 uses a Grok LLM model that resides in the botnet C2 server to solve the captcha
Botnet C2 servers are all hosted at Hetzner 🇩🇪 on port 8008:
46[.]62.225.51 [active]
46[.]62.224.205
46[.]62.205.38
27.11.2025 15:55
👍 0
🔁 0
💬 1
📌 0