Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Donex ransomeware leakage - | No | 2025-06-01 21:18:38 | g3h3klsev3eiofxhykmtenmdpi67wzmaixredk5pjuttbx7okcfkftqd.onion |
No ransom notes available.
No tools used available.
No vulnerabilities exploited available.
| Execution | Persistence | Defense Evasion | Credential Access | Discovery | Collection | Impact |
|---|---|---|---|---|---|---|
| Windows Management Instrumentation | Windows Services | Obfuscated Files or Information | Input Capture | System Service Discovery | Data Staged | Data Encrypted for Impact |
| Command and Scripting Interpreter | Indicator Removal from Tools | Application Window Discovery | Automated Collection | Service Stop | ||
| Scripting | Embedded Payloads | System Network Configuration Discovery | Inhibit System Recovery | |||
| Native API | Masquerading | Remote System Discovery | Data Destruction | |||
| Shared Modules | Scripting | Process Discovery | ||||
| Clear Windows Event Logs | System Information Discovery | |||||
| File Deletion | File and Directory Discovery | |||||
| Indirect Command Execution | Network Share Discovery | |||||
| File and Directory Permissions Modification | Security Software Discovery | |||||
| Abuse Elevation Control Mechanism | ||||||
| Disable or Modify Tools | ||||||
| Hidden Window |
No negotiation chats available.
No YARA rules available.
No IoCs available for this group.