Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
PLAY NEWS | No | 2026-05-15T17:45:19 |
mbrlkbtq5jonaqkurjwmxftytyn2ethqvbxfu4rgjbkkknndqwae6byd.onion
|
|||
|
|
PLAY NEWS | No | 2026-05-15T17:46:13 |
k7kg3jqxang3wh7hnmaiokchk7qoebupfgoik6rha6mjpzwupwtj25yd.onion
|
|||
|
|
PLAY NEWS | No | 2026-05-15T17:45:14 | nginx |
j75o7xvvsm4lpsjhkjvb4wl2q6ajegvabe6oswthuaubbykk4xkzgpid.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
AdFind
WKTools
|
|
EDRKill (echo_driver.sys + DBUtil 2.3)
GMER
IOBit
PowerTool
icardagt.exe (version.dll DLL sideload)
|
HandleKatz
Mimikatz
Nanodump
|
Cobalt Strike
WinPEAS
|
FRP
Plink
|
PsExec
|
WinSCP
|
| Initial Access | Execution | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Scheduled Task/Job: Scheduled Task | Obfuscated Files or Information | OS Credential Dumping: LSASS Memory | Network Service Discovery | Remote Services: Remote Desktop Protocol | Archive Collected Data: Archive via Utility | Exfiltration Over Alternative Protocol | Remote Access Software | Data Encrypted for Impact |
| Exploit Public-Facing Application | Command and Scripting Interpreter: PowerShell | Indicator Removal: Clear Windows Event Logs | OS Credential Dumping: NTDS | Account Discovery: Domain Account | Remote Services: SMB/Windows Admin Shares | Service Stop | |||
| Disable or Modify Tools | Inhibit System Recovery |
| Type | IOC |
|---|---|
Email
|
derdiarikucisv@gmx.de
|
Email
|
raniyumiamrm@gmx.de
|
Email
|
teilightomemaucd@gmx.com
|