Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Yes | 2026-05-13T22:45:28 | nginx |
rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion
|
|||
|
|
Rhysida | No | 2026-05-13T22:45:34 |
rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
PowerView
|
AnyDesk
|
|
|
Impacket
|
|
NTDS Utility (ntdsutil)
PsExec
WMIC
Windows Event Utility (wevtutil)
|
WinSCP
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Discovery | Collection | Exfiltration | Command and Control | Impact | Resource Development | Reconnaissance |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Abusing Elevation Control Mechanism: Bypass User Account Control | Command and Scripting Interpreter | Registry Run Keys / Startup Folder | Process Injection | Obfuscated Files or Information | Application Window Discovery | Data from Local System | Exfiltration Over C2 Channel | Application Layer Protocol | Data Encrypted for Impact | Acquire Infrastructure | Active Scanning |
| Phishing | Shared Modules | Thread Execution Hijacking | Masquerading | Process Discovery | Automated Collection | Web Protocols | Develop Capabilities | Phishing for Information | |||
| Registry Run Keys | Process Injection | System Information Discovery | |||||||||
| Thread Execution Hijacking | File and Directory Discovery | ||||||||||
| Virtualization/Sandbox Evasion | Virtualization/Sandbox Evasion | ||||||||||
| Hidden Artifacts | Security Software Discovery | ||||||||||
| NTFS File Attributes | |||||||||||
| Reflective DLL Injection |