Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
The Gentlemen | Yes | 2026-04-02 02:02:58 | nginx | tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion |
No tools used available.
No vulnerabilities exploited available.
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|---|
| Exploit Public-Facing Application | Command and Scripting Interpreter | Boot or Logon Autostart Execution | Exploitation for Privilege Escalation | Impair Defenses | Network Service Discovery | Remote Services | Data Staged | Exfiltration Over Alternative Protocol | Application Layer Protocol | Data Encrypted for Impact |
| Valid Accounts | Command and Scripting Interpreter: PowerShell | Create Account | Modify Registry | Account Discovery | Remote Services: Remote Desktop Protocol | Data Staged: Local Data Staging | Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol: Web Protocols | Service Stop | |
| Valid Accounts: Domain Accounts | Command and Scripting Interpreter: Windows Command Shell | Obfuscated Files or Information | Account Discovery: Domain Account | Remote Services: SMB/Windows Admin Shares | Data from Network Shared Drive | Remote Access Software | Unsecured Credentials | |||
| Domain Policy Modification: Group Policy Modification | Domain Trust Discovery | Remote Services: SSH |
No negotiation chats available.
No YARA rules available.