Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
Victims count: 105
Last discovered victim 2024-02-01
First discovered victims: 2021-02-03
Favicon | Title | Type | Available | Last Visit | FQDN | |
---|---|---|---|---|---|---|
![]() |
None | No | 2025-01-28 10:00:23 | cuba4mp6ximo2zlo.onion |
||
![]() |
Cuba | No | 2025-01-28 10:00:47 | cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion |
Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
---|---|---|---|---|---|---|---|
|
NetSupport
|
Avast Anti-Rootkit driver
|
Mimikatz
|
Cobalt Strike
Meterpreter
|
Termite
|
PsExec
|
|
No vulnerabilities exploited available.
Initial Access | Execution | Defense Evasion | Discovery | Lateral Movement | Credential Access | Command and Control |
---|---|---|---|---|---|---|
External Remote Services | Native API | Masquerading: Match Legitimate Name or Location | Time Discovery | Tool Transfer | Exploitation for Credential Access | Remote Desktop Protocol |
Valid Accounts: Local Accounts | User Execution: Malicious File | Exploitation for Privilege Escalation | Network Share Discovery | External Remote Services | Remote Services: External Remote Services | Multi-hop Proxy |
Command and Scripting Interpreter: PowerShell | Remote System Discovery | Application Layer Protocol: DNS | ||||
Command and Scripting Interpreter: Windows Command Shell | File and Directory Discovery | Application Layer Protocol: Web Protocols | ||||
System Services: Service Execution | Process Discovery | |||||
Network Configuration Discovery: Network Connection Enumeration |
No negotiation chats available.
No YARA rules available.