Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Qilin | No | 2026-04-28T07:25:49 |
ozsxj4hwxub7gio347ac7tyqqozvfioty37skqilzo2oqfs4cw2mgtyd.onion
|
|||
|
|
DDOS Protection | No | 2026-04-28T07:28:21 |
kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion
|
|||
|
|
Qilin blog | Yes | 2026-05-15T02:41:24 | Apache |
ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion
|
||
|
|
Sign In | No | 2026-04-28T07:30:53 |
ji57fr53anp7wb44tbbnp72qcgbhqywy4jmbncawdcrejj5amuvh3zqd.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Nmap
Nping
|
NetSupport
ScreenConnect
|
EDRSandBlast
PCHunter
PowerTool
Toshiba power management driver (BYOVD)
Updater for Carbon Black’s Cloud Sensor AV (upd.exe)
YDArk
Zemana Anti-Rootkit driver
|
Mimikatz
|
Cobalt Strike
Evilginx
Kali Linux
NetExec
SystemBC
Tofsee
|
Proxychains
|
PowerShell
PsExec
WinRM
fsutil
|
EasyUpload.io
MEGA
|
| Initial Access | Execution | Persistence | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Command and Scripting Interpreter: PowerShell | Scheduled Task/Job: Scheduled Task | Obfuscated Files or Information | OS Credential Dumping: LSASS Memory | Network Service Discovery | Remote Services: Remote Desktop Protocol | Archive Collected Data: Archive via Utility | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Application Layer Protocol: Web Protocols | Data Encrypted for Impact |
| Exploit Public-Facing Application | Command and Scripting Interpreter: Unix Shell | Disable or Modify Tools | Credentials from Web Browsers | System Information Discovery | Remote Services: SMB/Windows Admin Shares | Inhibit System Recovery | ||||
| Phishing: Spearphishing via Service |