threatintel
actor tracker
ioc pivot · 149 indicators

Whose IOC is this?

Paste a hash, domain, IP, file name, or mutex to pivot from a value to the actor it's cataloged against, with citation. The full catalog is listed below — narrow it with the type chips, or start typing to search by value.

Pasting unstructured OSINT instead? Use the entity extractor to pull all IOCs / CVEs / techniques / actor mentions out at once.

type
Showing 149 of 149 indicators. Type 2+ characters to pivot on a specific value.
  • RU · Russia8BaseSHA-256 · high
    518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c

    Phobos-derived 8Base ransomware payload analyzed by VMware Carbon Black in the June 2023 spike of double-extortion intrusions. Loaded via SmokeLoader with SystemBC for C2.

    family · Phobosfirst seen · May 31, 2023VMware Carbon Black
  • RU · Russia8BaseSHA-256 · high
    5ba74a5693f4810a8eb9b9eeb1d69d943cf5bbc46f319a32802c23c7654194b0

    8Base ransom note dropped after Phobos-based encryption in the campaigns documented by VMware Carbon Black researchers.

    family · Phobosfirst seen · May 31, 2023VMware Carbon Black
  • RU · Russia8BaseDomain · high
    admlogs25[.]xyz

    SystemBC C2 / staging domain in the 8Base infrastructure cluster (admlogs25, admhexlogs25, admlog2, serverlogs37, dnm777, dexblog, blogstat355, blogstatserv25, wlaexfpxrs) listed by VMware Carbon Black.

    family · SystemBCfirst seen · May 31, 2023VMware Carbon Black
  • ?? · UnknownAkiraSHA-256 · high
    3298d203c2acb68c474e5fdad8379181890b4403d6491c523c13730129be3f75

    SHA-256 of Akira_v2, a Rust-based variant of the Akira ransomware that targets VMware ESXi servers. Published in Table 2 of CISA AA24-109A.

    family · Akira_v2first seen · Dec 31, 2023CISA
  • ?? · UnknownAkiraSHA-256 · high
    9585af44c3ff8fd921c713680b0c2b3bbc9d56add848ed62164f7c9b9f23d065

    SHA-256 of the Megazord encryptor — the Rust-based Akira variant that appends a `.powerranges` extension. Listed in the Megazord row of Table 2 of CISA AA24-109A.

    family · Megazordfirst seen · Jul 31, 2023CISA
  • ?? · UnknownAkiraSHA-256 · high
    d2fd0654710c27dcf37b6c1437880020824e161dd0bf28e3a133ed777242a0ca

    SHA-256 of the Akira ransomware encryptor `w.exe`. Listed in Table 2 of CISA AA24-109A as the canonical C++ Akira encryptor observed in early intrusions.

    family · Akirafirst seen · Feb 28, 2023CISA
  • bbfe7289de6ab1f374d0bcbeecf31cad2333b0928ea883ca13b9e733b58e27b1

    SHA-256 of an ALPHV BlackCat Linux encryptor sample listed in CISA/FBI/HHS joint advisory AA23-353A (Table 2).

    family · ALPHV/BlackCatfirst seen · Dec 18, 2023CISA
  • c64300cf8bacc4e42e74715edf3f8c3287a780c9c0a38b0d9675d01e7e231f16

    SHA-256 of an ALPHV BlackCat Windows encryptor sample listed in CISA/FBI/HHS joint advisory AA23-353A (Table 2).

    family · ALPHV/BlackCatfirst seen · Dec 18, 2023CISA
  • resources[.]docusong[.]com

    Command-and-control domain used by ALPHV BlackCat affiliates, published in the Network Indicators table of CISA/FBI/HHS advisory AA23-353A.

    family · ALPHV/BlackCatfirst seen · Dec 18, 2023CISA
  • KP · DPRKAndarielSHA-256 · high
    5b7ecf7e9d0715f1122baf4ce745c5fcd769dee48150616753fec4d6da16e99e

    Maui ransomware sample (maui.exe). FBI / CISA / Treasury advisory AA22-187A documents its use by DPRK state actors against U.S. Healthcare and Public Health sector targets from at least May 2021. Encryption combines AES, RSA and XOR and is driven manually via CLI by the operator.

    family · Mauifirst seen · Apr 30, 2021CISA
  • KP · DPRKAndarielSHA-256 · high
    ed8ec7a8dd089019cfd29143f008fa0951c56a35d73b2e1b274315152d0c0ee6

    Andariel implant sample listed in CISA / FBI / NSA joint advisory AA24-207A (25 July 2024) covering the RGB 3rd Bureau group also tracked as Onyx Sleet / Stonefly / Silent Chollima. The advisory ties the group to defence, aerospace, nuclear and engineering espionage in support of DPRK military and nuclear programs.

    first seen · Jul 24, 2024CISA
  • @InfraShutdown

    Primary Telegram handle/channel branding used by Anonymous Sudan to claim DDoS attacks (also operated companion bot @InfraShutdown_bot and channel 'Skynet/Godzilla-BotNet'). Documented verbatim throughout the DOJ indictment of the Omer brothers (Central District of California, March 2024, unsealed October 2024).

    first seen · Jan 17, 2023U.S. Department of Justice
  • InfraShutdown

    Operator name for the Distributed Cloud Attack Tool (DCAT) used by Anonymous Sudan to launch 35,000+ DDoS attacks. Aliased as 'Skynet' and 'Godzilla Botnet' in the same Telegram channels. Tool seized and operators charged by DOJ in the unsealed October 2024 indictment of brothers Ahmed and Alaa Salah Yusuuf Omer.

    family · DCATfirst seen · Jan 17, 2023U.S. Department of Justice
  • CN · ChinaAPT10Domain · high
    domainnow[.]yourtrap[.]com

    Dynamic-DNS C2 hostname listed in PwC's Operation Cloud Hopper Annex A domain table. Used by APT10 across MSP-pivot intrusions documented in the 2016-2017 Cloud Hopper campaign.

    first seen · Apr 4, 2017PwC UK / BAE Systems
  • CN · ChinaAPT10Name · high
    RedLeaves

    RedLeaves is a custom RAT first publicly associated with APT10 / menuPass in PwC and BAE Systems' Operation Cloud Hopper report. The Cloud Hopper IOC annex enumerates RedLeaves implant paths such as `C:\windows\system32\RedLeaves.exe` on victim hosts.

    family · RedLeavesfirst seen · Apr 4, 2017PwC UK / BAE Systems
  • CN · ChinaAPT10Name · high
    UPPERCUT

    UPPERCUT (a.k.a. ANEL) backdoor attributed to APT10 / menuPass by MITRE ATT&CK (S0275). Deployed in long-running espionage campaigns against Japanese targets and tracked alongside the Cloud Hopper MSP intrusion set.

    family · UPPERCUTfirst seen · Sep 12, 2018MITRE ATT&CK
  • RU · RussiaAPT28Name · high
    Drovorub

    Linux malware toolset attributed by NSA and FBI to GRU 85th GTsSS Military Unit 26165 (APT28 / Fancy Bear / Strontium). Comprises a kernel-module rootkit, client, agent, and file-transfer / port-forwarding server, all communicating via JSON over WebSockets. Disclosed in joint advisory AA20-280A on 13 August 2020.

    family · Drovorubfirst seen · Aug 12, 2020CISA
  • RU · RussiaAPT29Domain · high
    avsvmcloud[.]com

    Primary first-stage command-and-control domain used by the SUNBURST backdoor inside trojanized SolarWinds Orion updates. Subdomains under this domain encoded victim identifiers.

    family · SUNBURSTfirst seen · Dec 12, 2020CISA
  • CN · ChinaAPT3Name · high
    Pirpi (RSFuncs / sslshell)

    Custom Windows RAT used by APT3 (Gothic Panda / TG-0110 / UPS) in browser zero-day campaigns. Group is attributed to Guangzhou Bo Yu Information Technology Co., Ltd. (Boyusec), a MSS contractor. On 27 November 2017 the U.S. DOJ unsealed an indictment against Boyusec employees Wu Yingzhuo, Dong Hao and Xia Lei for intrusions into Moody's, Siemens and Trimble between 2011 and 2017.

    family · Pirpifirst seen · Dec 31, 2009U.S. Department of Justice
  • IR · IranAPT33SHA-256 · high
    7eb2e9e8cd450fc353323fd2e8b84fbbdfe061a8441fd71750250752c577d198

    Tickler custom multi-stage backdoor sample published by Microsoft Threat Intelligence in August 2024 as part of Peach Sandstorm operations against satellite, oil-and-gas, communications and US/UAE federal and state government targets observed April-July 2024.

    family · Ticklerfirst seen · Mar 31, 2024Microsoft
  • IR · IranAPT33Name · high
    go-http-client

    User-agent string Microsoft observed in the Feb-Jul 2023 Peach Sandstorm password-spray wave against thousands of organizations in satellite, defense and pharmaceutical sectors. Sprays were routed through TOR exit nodes; Microsoft attributes the activity to overlaps with APT33 / Elfin / Refined Kitten.

    first seen · Jan 31, 2023Microsoft
  • IR · IranAPT33Domain · high
    subreviews[.]azurewebsites[.]net

    Azure App Service C2 subdomain associated with Tickler backdoor activity. Microsoft's August 2024 Peach Sandstorm report lists this in the IOC appendix alongside other actor-controlled azurewebsites.net subdomains used to abuse fraudulent Azure tenants for command-and-control.

    family · Ticklerfirst seen · Mar 31, 2024Microsoft
  • IR · IranAPT34SHA-256 · high
    26884f872f4fae13da21fa2a24c24e963ee1eb66da47e270246d6d9dc7204c2b

    Malicious Excel document 'Confirmation Receive Document.xls' used by APT34 to drop the Saitama backdoor in the April 2022 Jordanian Foreign Ministry spearphishing campaign analyzed by Malwarebytes.

    family · Saitamafirst seen · Apr 25, 2022Malwarebytes (ThreatDown)
  • IR · IranAPT34SHA-256 · high
    e0872958b8d3824089e5e1cfab03d9d98d22b9bcb294463818d721380075a52d

    Saitama .NET backdoor payload (update.exe) attributed by Malwarebytes/ThreatDown to APT34 (OilRig / Helix Kitten / Hazel Sandstorm) in a May 2022 spearphishing operation against a Jordanian Ministry of Foreign Affairs official. Saitama uses DNS tunneling for C2.

    family · Saitamafirst seen · Apr 25, 2022Malwarebytes (ThreatDown)
  • IR · IranAPT34Domain · high
    uber-asia[.]com

    DNS-tunneling C2 domain used by APT34's Saitama backdoor per the May 2022 Malwarebytes analysis; one of three actor-controlled domains (alongside asiaworldremit.com and joexpediagroup.com) impersonating legitimate travel and remittance brands.

    family · Saitamafirst seen · Apr 25, 2022Malwarebytes (ThreatDown)
  • IR · IranAPT35SHA-256 · high
    f2dec56acef275a0e987844e98afcc44bf8b83b4661e83f89c6a2a72c5811d5f

    MediaPl custom backdoor (MediaPl.dll) masquerading as Windows Media Player, attributed by Microsoft in January 2024 to a Mint Sandstorm subgroup (APT35 / Charming Kitten / Phosphorus) targeting Middle East affairs researchers at universities in BE, FR, IL, UK and US. Communicates with C2 via AES-CBC encrypted, Base64-encoded channels.

    family · MediaPlfirst seen · Oct 31, 2023Microsoft
  • IR · IranAPT35Name · high
    MischiefTut

    PowerShell reconnaissance backdoor named by Microsoft in the January 2024 Mint Sandstorm advisory; deployed post-intrusion alongside MediaPl to write recon output to documentLoger.txt and pull additional tools onto victim hosts at Middle East research organizations.

    family · MischiefTutfirst seen · Oct 31, 2023Microsoft
  • KP · DPRKAPT37SHA-256 · high
    5c430e2770b59cceba1f1587b34e686d586d2c8ba1908bb5d066a616466d2cc6

    BLUELIGHT backdoor sample published by Volexity on 17 August 2021 in the 'InkySquid' blog. BLUELIGHT uses the Microsoft Graph API (OneDrive appfolder) for C2 and was deployed via IE / legacy-Edge zero-days CVE-2020-1380 and CVE-2021-26411 from a strategic web compromise of dailynk.com. Volexity attributes InkySquid to APT37 / ScarCruft.

    family · BLUELIGHTfirst seen · Aug 16, 2021Volexity
  • KP · DPRKAPT37SHA-256 · high
    b3de3f9309b2f320738772353eb724a0782a1fc2c912483c036c303389307e2e

    RokRAT (DOGCALL) backdoor sample documented by Cisco Talos in 'ROKRAT Reloaded' (November 2017). RokRAT abuses legitimate cloud services (pCloud, Box, Dropbox, Yandex) as C2 and is consistently attributed to APT37 / ScarCruft / Reaper / Group 123 (DPRK MSS).

    family · RokRATfirst seen · Nov 15, 2017Cisco Talos
  • KP · DPRKAPT37Domain · high
    jquery[.]services

    APT37 / InkySquid C2 root. Subdomains ui.jquery.services and storage.jquery.services served BLUELIGHT loader scripts via a strategic web compromise of South Korean news site dailynk.com starting April 2021. Reported by Volexity.

    family · BLUELIGHTfirst seen · Mar 31, 2021Volexity
  • IR · IranAPT39Name · high
    MAR-10303705-1.v1

    Identifier for the CISA-hosted STIX bundle accompanying the FBI Malware Analysis Report on Rana / APT39 tooling, released alongside Treasury press release SM1127 on 17 Sep 2020. The bundle enumerates hashes, file names and C2 infrastructure for the eight malware sets attributed to MOIS through Rana.

    family · Rana toolsetfirst seen · Sep 16, 2020U.S. Department of the Treasury
  • IR · IranAPT39Name · high
    Rana Intelligence Computing toolset

    Composite designation Treasury and the FBI used on 17 Sep 2020 for the eight malware sets (VBS/AutoIt scripts, BITS 1.0 and BITS 2.0 variants, a Firefox-impersonating binary, a Python tool, Android malware and Depot.dat) operated by MOIS front company Rana Intelligence Computing Company (APT39 / Chafer / Remix Kitten). Released as FBI advisory MAR-10303705 the same day Treasury sanctioned the front company and 45 associated individuals.

    family · Rana toolsetfirst seen · Sep 16, 2020FBI
  • CN · ChinaAPT40Name · high
    AIRBREAK

    AIRBREAK (a.k.a. Orz) JavaScript-based backdoor enumerated in the malware-family list of CISA AA21-200A as part of APT40's toolkit. Cross-referenced to MITRE S0229.

    family · AIRBREAKfirst seen · Jul 18, 2021CISA
  • CN · ChinaAPT40Domain · high
    huntingtomingalls[.]com

    Typosquat of `huntingtoningalls.com` (Huntington Ingalls Industries, a U.S. Navy shipbuilder) listed in the domain appendix of CISA AA21-200A. Characteristic of APT40's MSS Hainan-directed targeting of the U.S. maritime defense industrial base.

    first seen · Jul 18, 2021CISA
  • CN · ChinaAPT40Domain · high
    thyssenkrupp-marinesystems[.]org

    Typosquat of Thyssenkrupp Marine Systems (German naval shipbuilder) listed in the domain appendix of CISA AA21-200A as APT40 infrastructure - consistent with the Hainan State Security Department's interest in naval technology.

    first seen · Jul 18, 2021CISA
  • CN · ChinaAPT41MD5 · high
    17d0ada8f5610ff29f2e8eaf0e3bb578

    MD5 of an `aclui.dll` DUSTPAN in-memory dropper sample, listed in the host-based IOC table of Mandiant's 'APT41 Has Arisen From the DUST' report. DUSTPAN is a C++ ChaCha20 loader masked as `w3wp.exe` / `conn.exe`.

    family · DUSTPANfirst seen · Jul 17, 2024Mandiant / Google Cloud
  • CN · ChinaAPT41MD5 · high
    9991ce9d2746313f505dbf0487337082

    MD5 of a `dbgeng.dll` DUSTTRAP plugin-framework sample listed in the host-based IOC table of Mandiant's APT41 DUST report. DUSTTRAP is a multi-stage backdoor that AES-128-CFB decrypts an on-disk payload and runs it in memory.

    family · DUSTTRAPfirst seen · Jul 17, 2024Mandiant / Google Cloud
  • CN · ChinaAPT41Domain · high
    www[.]eloples[.]com

    DUSTTRAP command-and-control FQDN observed by Mandiant during the APT41 DUST campaign (first observed 2024-02-21, last observed 2024-07-16). Listed in the Network-Based Indicators table of the Google Cloud / Mandiant report.

    family · DUSTTRAPfirst seen · Feb 20, 2024Mandiant / Google Cloud
  • 170[.]130[.]165[.]73

    Likely Black Basta Cobalt Strike infrastructure first seen October 14, 2024 per Table 7 of the November 8, 2024 update to AA24-131A.

    family · Black Bastafirst seen · Oct 13, 2024CISA
  • exckicks[.]com

    Suspected Black Basta Cobalt Strike domain first seen October 2, 2024, listed alongside moereng.com in Table 8 of the November 8, 2024 update to AA24-131A.

    family · Black Bastafirst seen · Oct 1, 2024CISA
  • moereng[.]com

    Suspected Black Basta Cobalt Strike domain first seen October 9, 2024 and listed in Table 8 of the November 8, 2024 update to joint FBI/CISA/HHS/MS-ISAC advisory AA24-131A. Black Basta is a Conti-spinoff RaaS that hit more than 500 organizations across 12 critical-infrastructure sectors, including healthcare.

    family · Black Bastafirst seen · Oct 8, 2024CISA
  • readme.txt

    Black Basta ransom note filename described in AA24-131A; the note omits a payment amount and directs victims to a .onion site (Basta News). Encrypted files receive a .basta or random extension after ChaCha20+RSA-4096 encryption.

    family · Black Bastafirst seen · May 9, 2024CISA
  • ?? · UnknownBlackSuitSHA-256 · high
    8a99353662ccae117d2bb22efd8c43d7169060450be413af763e8ad7522d2451

    SHA256 of the Chisel TCP/UDP-over-HTTP tunneling tool used by Royal/BlackSuit operators for C2 egress, listed in Table 4 of AA23-061A as of January 2023.

    family · BlackSuitfirst seen · Mar 1, 2023CISA
  • ?? · UnknownBlackSuitSHA-256 · high
    af9f95497b8503af1a399bc6f070c3bbeabc5aeecd8c09bca80495831ae71e61

    SHA256 of 1.exe, the BlackSuit encryptor identified by FBI in threat-response activity through July 2024 and published in Table 10 of the August 7, 2024 update to joint FBI/CISA advisory AA23-061A - the rebrand of Royal ransomware (active September 2022 through June 2023).

    family · BlackSuitfirst seen · Aug 6, 2024CISA
  • ?? · UnknownBlackSuitDomain · medium
    altocloudzone[.]live

    Royal/BlackSuit malicious domain last observed December 2022 and published in Table 3 of AA23-061A.

    family · BlackSuitfirst seen · Nov 30, 2022CISA
  • readme.BlackSuit.txt

    BlackSuit ransom note filename documented in YARA rules and IOC tables of the August 7, 2024 update to AA23-061A. Royal-era victims received README.TXT with the .royal extension; BlackSuit demands have totaled $500M+ with individual asks up to $60M.

    family · BlackSuitfirst seen · Aug 6, 2024CISA
  • KP · DPRKBlueNoroffSHA-256 · high
    927b3564c1cf884d2a05e1d7bd24362ce8563a1e9b85be776190ab7f8af192f6

    SHA-256 of the KANDYKORN macOS backdoor staged via SUGARLOADER in the Elastic-tracked REF7001 intrusion against a cryptocurrency exchange. Capabilities include arbitrary command execution, file upload/download, directory listing, and secure deletion.

    family · KANDYKORNfirst seen · Oct 31, 2023Elastic Security Labs
  • KP · DPRKBlueNoroffDomain · high
    cloud[.]dnx[.]capital

    C2 domain associated with the RustBucket macOS malware family attributed to BlueNoroff in Jamf Threat Labs' April 2023 disclosure. The malware was delivered via a backdoored 'Internal PDF Viewer' application targeting finance-sector users.

    family · RustBucketfirst seen · Apr 20, 2023Jamf Threat Labs
  • KP · DPRKBlueNoroffDomain · high
    tp-globa[.]xyz

    Command-and-control domain used by the SUGARLOADER stage of the KANDYKORN intrusion chain; identified in Elastic Security Labs' REF7001 report on the DPRK macOS campaign against blockchain engineers.

    family · KANDYKORNfirst seen · Oct 31, 2023Elastic Security Labs
  • a196c6b8ffcb97ffb276d04f354696e2391311db3841ae16c8c9f56f36a38e92

    WhisperGate stage1.exe - MBR-corrupting destructive payload disguised as ransomware, deployed against Ukrainian organisations from 13 January 2022. Hash from Microsoft MSTIC, republished in CISA / FBI AA22-057A Table 1. Microsoft renamed the responsible actor Cadet Blizzard (DEV-0586) in June 2023 and attributed it to a GRU subgroup.

    family · WhisperGatefirst seen · Jan 12, 2022CISA
  • dcbbae5a1c61dbbbb7dcd6dc5dd1eb1169f5329958d38b58c3fd9384081c9b78

    WhisperGate stage2.exe - the file-corruption stage that overwrites files matching a hardcoded extension list, downloaded over Discord CDN. Hash from Microsoft MSTIC via CISA / FBI AA22-057A Table 1.

    family · WhisperGatefirst seen · Jan 12, 2022CISA
  • ?? · UnknownCl0pSHA-256 · high
    0b3220b11698b1436d1d866ac07cc90018e59884e91a8cb71ef8924309f1e0e9

    SHA256 of a LEMURLOOT web-shell ASPX sample listed in the MOVEit Campaign IOC table of AA23-158A; one of the ~40 hashes the FBI/CISA released June 7, 2023 covering TA505 web-shell deployments against MOVEit Transfer.

    family · LEMURLOOTfirst seen · May 26, 2023CISA
  • ?? · UnknownCl0pSHA-256 · high
    c58c2c2ea608c83fad9326055a8271d47d8246dc9cb401e420c0971c67e19cbf

    SHA256 of a compiled DLL generated from a human2.aspx LEMURLOOT payload, referenced in the Mandiant YARA rule M_Webshell_LEMURLOOT_DLL_1 included in AA23-158A as a hunting sample for the CL0P MOVEit zero-day intrusion set.

    family · LEMURLOOTfirst seen · May 31, 2023CISA
  • ?? · UnknownCl0pName · high
    human2.aspx

    LEMURLOOT web-shell filename masquerading as MOVEit's legitimate human.aspx, dropped via CVE-2023-34362 starting May 27, 2023. Primary breach indicator per joint FBI/CISA advisory AA23-158A on the CL0P/TA505 MOVEit campaign.

    family · LEMURLOOTfirst seen · May 26, 2023CISA
  • ?? · UnknownCl0pEmail · high
    unlock[at]rsv-box[.]com

    CL0P negotiation email address published in ransom notes during the MOVEit and GoAnywhere campaigns, listed in the email-address IOC table of AA23-158A.

    family · CL0Pfirst seen · Jun 6, 2023CISA
  • RU · RussiaCOLDRIVERSHA-256 · high
    c97acea1a6ef59d58a498f1e1f0e0648d6979c4325de3ee726038df1fc2e831d

    SPICA - Rust backdoor delivered as 'Proton-decrypter.exe' in a fake PDF-decryption lure. Google Threat Analysis Group disclosed the sample on 18 January 2024 as the first custom malware they have attributed to COLDRIVER (Star Blizzard / Callisto / SEABORGIUM), assessed as FSB Centre 18.

    family · SPICAfirst seen · Aug 31, 2023Google TAG
  • Star Blizzard (Callisto / SEABORGIUM)

    Long-running FSB Centre 18 spear-phishing cluster targeting academia, defence, NGOs and government in the UK, US and allied countries. NCSC UK and Five Eyes partners published a joint advisory on 7 December 2023; same day, US Treasury (OFAC) and UK sanctioned FSB officer Ruslan Peretyatko and Andrey Korinets for their role in the operation.

    first seen · Dec 31, 2018NCSC UK
  • RU · RussiaContiIPv4 · high
    162[.]244[.]80[.]235

    Cobalt Strike C2 server IP identified in artifacts leaked with the Conti 'playbook' and republished in the March 9, 2022 update to joint CISA/FBI/NSA/USSS advisory AA21-265A as previously used by Conti affiliates.

    family · Contifirst seen · Sep 21, 2021CISA
  • RU · RussiaContiIPv4 · high
    185[.]141[.]63[.]120

    Cobalt Strike C2 server IP attributed to Conti operators in the leaked-playbook artifacts referenced in the March 2022 update to AA21-265A. Conti relied on Cobalt Strike alongside TrickBot for post-exploitation.

    family · Contifirst seen · Sep 21, 2021CISA
  • RU · RussiaContiDomain · medium
    badiwaw[.]com

    One of 98 lookalike domains sharing registration and naming characteristics of Conti-distribution infrastructure published by CISA in the February-March 2022 update to AA21-265A.

    family · Contifirst seen · Mar 8, 2022CISA
  • 178[.]162[.]227[.]180

    IP address listed as 'suspected' in the original CISA AA23-335A appendix as associated with Crucio Ransomware activity tied to CyberAv3ngers. Indicator fidelity in the source is Suspected; the advisory's December 2024 revision removed all IOCs.

    family · Cruciofirst seen · Dec 13, 2023CISA
  • BA284A4B508A7ABD8070A427386E93E0

    MD5 hash listed as 'suspected' in the original (14 Dec 2023) version of CISA AA23-335A as associated with Crucio Ransomware activity attributed to CyberAv3ngers. CISA marked the indicator fidelity as Suspected, not Confirmed; the December 2024 update of the advisory removed IOCs as outdated.

    family · Cruciofirst seen · Dec 13, 2023CISA
  • RU · RussiaDarkSideDomain · high
    athaliaoriginals[.]com

    DarkSide command-and-control domain documented in Mandiant's May 11, 2021 report on the DARKSIDE ransomware-as-a-service operation, contemporaneous with the Colonial Pipeline incident addressed in joint CISA/FBI advisory AA21-131A.

    family · DarkSidefirst seen · May 10, 2021Mandiant
  • RU · RussiaDarkSideDomain · high
    darksidedxcftmqa[.]onion

    DarkSide data-leak Tor hidden service URL embedded in victim ransom notes during the campaigns Mandiant profiled in its May 11, 2021 'Shining a Light on DARKSIDE' report covering UNC2628, UNC2659 and UNC2465 affiliates - the same RaaS used against Colonial Pipeline on May 7, 2021 (CISA AA21-131A).

    family · DarkSidefirst seen · May 10, 2021Mandiant
  • power_encryptor.exe

    DarkSide encryptor binary name observed across the intrusions Mandiant documented in 'Shining a Light on DARKSIDE' (May 11, 2021) - the public report on the Carbon Spider-aligned RaaS responsible for the Colonial Pipeline shutdown.

    family · DarkSidefirst seen · May 10, 2021Mandiant
  • bild[.]work

    Spoofed clone of German tabloid Bild used in the Doppelganger influence operation; among the 32 domains seized by the U.S. DOJ on 4 September 2024.

    first seen · Sep 3, 2024U.S. Department of Justice
  • lemonde[.]ltd

    Spoofed clone of French daily Le Monde used in the Doppelganger influence operation; among the 32 domains seized by the U.S. DOJ on 4 September 2024. The same operation was sanctioned by US Treasury on 5 March 2024 (naming SDA founder Ilya Gambashidze) and exposed earlier by EU DisinfoLab in 2022.

    first seen · Sep 3, 2024U.S. Department of Justice
  • washingtonpost[.]pm

    Spoofed clone of The Washington Post used to host Doppelganger propaganda targeting U.S. audiences. Seized by the U.S. DOJ on 4 September 2024 as part of an action against 32 Doppelganger domains operated by Russia's Social Design Agency (SDA), Structura and ANO Dialog at the direction of the Russian Presidential Administration.

    first seen · Sep 3, 2024U.S. Department of Justice
  • Havex (Backdoor.Oldrea)

    OPC-aware RAT used by Dragonfly / Energetic Bear from 2013 in supply-chain compromises of ICS vendor websites (MESA Imaging, eWON/Talk2M, MB Connect Line). Activity is named as BERSERK BEAR in CISA / FBI joint advisory AA22-110A (20 April 2022), which attributes the group to FSB Centre 16 (Military Unit 71330).

    family · Havexfirst seen · Dec 31, 2012CISA
  • Triton / Havex - DOJ 2022 indictment (Akulov, Gavrilov, Tyukov)

    On 24 March 2022 the U.S. DOJ unsealed an indictment charging three FSB Centre 16 officers - Pavel Akulov, Mikhail Gavrilov, and Marat Tyukov - for a 2012-2017 energy-sector intrusion campaign tracked publicly as Dragonfly / Berserk Bear / Energetic Bear / Crouching Yeti, including the Wolf Creek nuclear plant compromise.

    first seen · Mar 23, 2022U.S. Department of Justice
  • 5cd04805f9753ca08b82e88c27bf5426d1d356bb

    WastedLocker ransomware sample published in Symantec's June 2020 analysis of Evil Corp attacks against US organizations.

    family · WastedLockerfirst seen · Jun 24, 2020Symantec (Broadcom)
  • 887aac61771af200f7e58bf0d02cb96d9befa11d

    Second WastedLocker payload hash from Symantec's June 2020 report on Evil Corp's coordinated US ransomware campaign.

    family · WastedLockerfirst seen · Jun 24, 2020Symantec (Broadcom)
  • ?? · UnknownFIN7Name · high
    Carbanak

    Full-featured remote backdoor family (a.k.a. Anunak) catalogued by MITRE ATT&CK as S0030 and historically attributed to the Carbanak group (G0008) and FIN7 (G0046). Used by FIN7 as part of post-exploitation toolchains delivered via POWERTRASH / EugenLoader.

    family · Carbanakfirst seen · Nov 30, 2014MITRE ATT&CK
  • ?? · UnknownFIN7Name · high
    POWERSOURCE

    PowerShell-based downloader (a.k.a. heavily modified DNSMessenger) tracked by MITRE ATT&CK as S0145 and attributed to FIN7. Used as a first-stage stager in 2017-era FIN7 phishing campaigns to retrieve the TEXTMATE and Carbanak follow-on payloads.

    family · POWERSOURCEfirst seen · Jan 31, 2017MITRE ATT&CK
  • 7992c0a816246b287d991c4ecf68f2d32e4bca18

    SHA-1 fingerprint of a TLS certificate observed on Flax Typhoon SoftEther VPN bridge infrastructure, published in the August 2023 Microsoft Threat Intelligence disclosure `Flax Typhoon using legitimate software to quietly access Taiwanese organizations`.

    first seen · Aug 23, 2023Microsoft Threat Intelligence
  • vpnbridge.exe

    SoftEther VPN bridge binary renamed by Flax Typhoon to `conhost.exe` or `dllhost.exe` to masquerade as Windows system components. Microsoft's August 2023 advisory describes this as the actor's signature persistence mechanism, used to tunnel SoftEther over HTTPS to TCP/443.

    first seen · Aug 23, 2023Microsoft Threat Intelligence
  • w8510[.]com

    Tier-2 C2 root domain for the `Oriole` campaign of the Raptor Train IoT botnet operated by Flax Typhoon - linked by DOJ/FBI to Beijing-based Integrity Technology Group. Active June 2023 through the FBI takedown announced September 2024; documented by Lumen Black Lotus Labs.

    first seen · May 31, 2023Lumen Black Lotus Labs
  • RU · RussiaGamaredonSHA-256 · high
    0afce2247ffb53783259b7dc5a0afe04d918767c991db2da906277898fd80be5

    QuietSieve information-stealer sample associated with Gamaredon and published in Microsoft's February 2022 ACTINIUM indicator list.

    family · QuietSievefirst seen · Feb 3, 2022Microsoft
  • RU · RussiaGamaredonSHA-256 · high
    51b9e03db53b2d583f66e47af56bb0146630f8a175d4a439369045038d6d2a45

    Pterodo backdoor sample listed in Microsoft Threat Intelligence Center's February 2022 ACTINIUM report on Gamaredon activity against Ukrainian organizations.

    family · Pterodofirst seen · Feb 3, 2022Microsoft
  • RU · RussiaGamaredonSHA-256 · high
    714aeb3d778bbd03d0c9eaa827ae8c91199ef07d916405b7f4acd470f9a2a437

    GammaSteel PowerShell infostealer component recovered from the February–March 2025 Shuckworm intrusion into a foreign military mission in Ukraine, documented by Symantec's Threat Hunter Team.

    family · GammaSteelfirst seen · Apr 9, 2025Symantec (Broadcom)
  • 3cb9dea916432ffb8784ac36d1f2d3cd

    Handala PowerShell wiper component MD5 from Check Point Research's 2026 Handala Hack report. Distributed via Group Policy logon scripts as a scheduled task; the batch loader 'handala.bat' chains the executable and the PowerShell script to overwrite files and corrupt the MBR.

    family · Handala Wiperfirst seen · Mar 31, 2024Check Point Research
  • 5986ab04dd6b3d259935249741d3eff2

    Handala Wiper executable ('handala.exe') MD5 published in Check Point Research's 2026 'Handala Hack - Unveiling Group's Modus Operandi' follow-up to the May 2024 'Bad Karma, No Justice' report. CPR explicitly attributes the Handala persona to Void Manticore (aka Red Sandstorm / Banished Kitten), affiliated with Iran's MOIS Counter-Terrorism Division.

    family · Handala Wiperfirst seen · Mar 31, 2024Check Point Research
  • IR · IranHandalaIPv4 · high
    82[.]25[.]35[.]25

    Handala-controlled VPS IP listed in Check Point Research's 2026 report. Used alongside 31.57.35.223 and 107.189.19.52 for hands-on-keyboard operations via RDP and NetBird remote access tooling during MOIS-attributed destructive intrusions in Israel.

    first seen · Mar 31, 2024Check Point Research
  • ?? · UnknownHiveDomain · high
    asq[.]r77vh0[.]pw

    Hive affiliate staging server hosting a malicious HTA file used during intrusions, listed in Table 2 of AA22-321A. The .pw infrastructure cluster was seized alongside the Hive back-end on Jan. 26, 2023 in the DOJ/FBI takedown announcement.

    family · Hivefirst seen · Nov 16, 2022CISA
  • ?? · UnknownHiveName · high
    HOW_TO_DECRYPT.txt

    Hive ransom note dropped into every encrypted directory; instructs victims not to modify the *.key file in C:\ or /root and links to the HiveLeaks Tor chat panel. Listed in Table 2 of joint FBI/CISA/HHS advisory AA22-321A (Nov. 17, 2022).

    family · Hivefirst seen · Nov 16, 2022CISA
  • ?? · UnknownHiveName · high
    Windows_x64_encrypt.exe

    Hive ransomware Windows 64-bit encryptor binary listed as a known IOC in Table 2 of AA22-321A. Hive shipped matching Linux, ESXi and FreeBSD variants and victimized over 1,300 organizations for ~$100M in payments before the FBI infiltrated its network in July 2022.

    family · Hivefirst seen · Nov 16, 2022CISA
  • 7b71764236f244ae971742ee1bc6b098

    Disk wiper 'cl.exe' MD5 published in Appendix A of CISA AA22-264A on the July 2022 HomeLand Justice destructive attack against the Government of Albania. Pairs with the 'rwdsk.sys' RawDisk driver (MD5 8f6e7653807ebb57ecc549cef991d505) to wipe raw disk drives. Mandiant tracks the same payload as a ZEROCLEAR variant.

    family · Cl Wiperfirst seen · Jul 14, 2022CISA
  • 8f766dea3afd410ebcd5df5994a3c571

    'Pickers.aspx' webshell MD5 from CISA AA22-264A Appendix A. Used by the HomeLand Justice operators for persistence after initial access via CVE-2019-0604 on an Internet-facing SharePoint server roughly 14 months before the July 2022 destructive attack on Albanian government networks.

    first seen · Apr 30, 2021CISA
  • bbe983dba3bf319621b447618548b740

    'GoXML.exe' ransomware-style file encryptor MD5 from CISA AA22-264A Appendix A. Drops the ransom note How_To_Unlock_MyFiles.txt and is propagated across the victim print-server network by 'mellona.exe'. Mandiant tracks the same family as ROADSWEEP, which dropped a politically themed anti-MEK note for the HomeLand Justice persona.

    family · ROADSWEEPfirst seen · Jul 14, 2022CISA
  • df9ab47726001883b5fcf58b56b34b41

    CHIMNEYSWEEP backdoor MD5 published in Mandiant's August 2022 'Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government' report. CHIMNEYSWEEP was deployed alongside ROADSWEEP ransomware and a ZEROCLEAR-variant wiper in the HomeLand Justice operation; Mandiant assesses involvement of one or more actors operating in support of Iranian goals with moderate confidence.

    family · CHIMNEYSWEEPfirst seen · Jul 25, 2021Mandiant (Google Cloud)
  • RU · RussiaINC RansomSHA-256 · high
    accd8bc0d0c2675c15c169688b882ded17e78aed0d914793098337afc57c289c

    INC Encryptor binary (PDB string 'C:\source\INC Encryptor\Release\INC Encryptor.pdb') used in the early INC Ransom intrusions investigated by Huntress and mapped to MITRE ATT&CK software entry S1139.

    family · INC Ransomwarefirst seen · Jul 31, 2023Huntress
  • INC-README.txt

    Ransom note filename dropped per directory by INC Ransom (also seen as INC-README.html / *.inc-readme.txt). Documented in Huntress and Secureworks (GOLD IONIC) analyses.

    family · INC Ransomwarefirst seen · Jul 31, 2023Sophos / Secureworks CTU
  • KP · DPRKKimsukyName · high
    BabyShark

    VBS-based first-stage loader staged via mshta.exe and HTA files. CISA / FBI / CNMF advisory AA20-301A (27 October 2020) attributes BabyShark to Kimsuky and documents its delivery via spearphishing against U.S. and South Korean think tanks, nuclear-policy experts and the cryptocurrency industry.

    family · BabySharkfirst seen · Oct 31, 2018CISA
  • KP · DPRKKimsukyDomain · high
    naver[.]pw

    Kimsuky lookalike domain (.pw ccTLD spoofing the Naver portal). Listed in CISA / FBI / CNMF advisory AA20-301A, Table 1.

    first seen · Oct 26, 2020CISA
  • KP · DPRKKimsukyDomain · high
    nidnaver[.]net

    Kimsuky credential-phishing domain impersonating Naver (Korean portal). Listed in CISA / FBI / CNMF advisory AA20-301A, Table 1 (Domains used by Kimsuky). The campaign registered many lookalikes of Naver, Daum and Hanmail to harvest webmail credentials from South Korean targets.

    first seen · Oct 26, 2020CISA
  • iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com

    WannaCry kill-switch domain. Discovery and sinkholing by a security researcher ("MalwareTech") on 12 May 2017 halted the ransomware's worldwide spread within hours of the outbreak.

    family · WannaCryfirst seen · May 11, 2017MalwareTech
  • RU · RussiaLockBitDomain · high
    adobe-us-updatefiles[.]digital

    Tool-download domain contacted by adobelib.dll POST requests in the LockBit 3.0 Citrix Bleed campaign; resolved to 172.67.129.176 and 104.21.1.180 as of November 16, 2023. Table 3 of AA23-325A.

    family · LockBitfirst seen · Nov 15, 2023CISA
  • RU · RussiaLockBitSHA-256 · high
    cc21c77e1ee7e916c9c48194fad083b2d4b2023df703e544ffb2d6a0bfc90a63

    SHA256 of Mag.dll, the persistence module identified running within the UpdateAdobeTask scheduled job on victims of the LockBit 3.0 Citrix Bleed campaign. Table 3 of AA23-325A.

    family · LockBitfirst seen · Nov 20, 2023CISA
  • CVE-2023-4966 (Citrix Bleed)

    LockBit 3.0 affiliates' primary initial-access vector during the October-November 2023 wave documented in joint CISA/FBI/MS-ISAC/ACSC advisory AA23-325A - NetScaler ADC and Gateway session-token theft used against Boeing, ICBC, Allen & Overy, and DP World.

    family · LockBitfirst seen · Nov 20, 2023CISA
  • RU · RussiaLockBitSHA-256 · high
    ed5d694d561c97b4d70efe934936286fe562addf7d6836f795b336d9791a5c44

    SHA256 of adobelib.dll dropped to C:\Users\Public\ by the 123.ps1 PowerShell loader during the LockBit 3.0 Citrix Bleed campaign, executed via rundll32 with a 104-hex-character key. Table 3 of AA23-325A.

    family · LockBitfirst seen · Nov 20, 2023CISA
  • 95[.]181[.]161[.]49

    Adversary-controlled C2 IP hard-coded in the newly identified MuddyWater PowerShell backdoor sample published in CISA AA22-055A; the script encrypts traffic with a single-byte XOR key 0x02 and beacons over HTTP to /index.php with a victim identifier.

    family · POWERSTATSfirst seen · Feb 23, 2022CISA
  • IR · IranMuddyWaterSHA-256 · high
    b75208393fa17c0bcbc1a07857686b8c0d7e0471d00a167a07fd0d52e1fc9054

    Small Sieve NSIS installer 'gram_app.exe' analyzed by NCSC-UK and published in Appendix B of CISA AA22-055A. Drops the Python-based Telegram-Bot-API backdoor index.exe and persists via the registry Run key OutlookMicrosift.

    family · Small Sievefirst seen · Feb 23, 2022CISA
  • IR · IranMuddyWaterSHA-256 · high
    bf090cf7078414c9e157da7002ca727f06053b39fa4e377f9a0050f2af37d3a2

    Small Sieve Python backdoor payload 'index.exe' (PyInstaller-bundled Python 3.9) - hash published in Appendix B Table 3 of CISA AA22-055A. Beacons via the Telegram Bot API with hex byte-shuffling traffic obfuscation.

    family · Small Sievefirst seen · Feb 23, 2022CISA
  • POWERSTATS

    PowerShell backdoor family attributed to MuddyWater in joint CISA/FBI/CNMF/NCSC-UK advisory AA22-055A, which catalogues POWERSTATS, Small Sieve, Mori, Canopy/Starwhale and PowGoop tooling used since approximately 2018 by this MOIS subordinate APT group (also tracked as Static Kitten, Mango Sandstorm, MERCURY, Seedworm, TEMP.Zagros).

    family · POWERSTATSfirst seen · Feb 23, 2022CISA
  • 45[.]142[.]166[.]112

    PlugX USB-worm command-and-control IP attributed to Mustang Panda. Sinkholed by Sekoia in September 2023 (the address had lapsed and was re-registered for USD 7). This is the same C2 the FBI/DOJ used for the court-authorized self-delete operation that cleaned ~4,258 U.S. hosts (announced Jan 2025).

    family · PlugXfirst seen · Aug 31, 2023Sekoia.io
  • 85ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654

    SHA-256 of `AvastSvc.exe`, the legitimate Avast binary abused for DLL side-loading by the Mustang Panda PlugX USB worm. Listed alongside the malicious DLL in the Sophos IOC table; drops the side-load triad into `%userprofile%/AvastSvcpCP/`.

    family · PlugXfirst seen · Mar 8, 2023Sophos X-Ops
  • e8f55d0f327fd1d5f26428b890ef7fe878e135d494acda24ef01c695a2e9136d

    SHA-256 of the malicious `wsc.dll` PlugX loader from the border-hopping USB-worm variant attributed by Sophos X-Ops to PKPLUG / Mustang Panda. Listed in the IOC table of the March 2023 Sophos News disclosure and re-confirmed by Sekoia's September 2023 sinkholing report.

    family · PlugXfirst seen · Mar 8, 2023Sophos X-Ops
  • CN · ChinaNaikonSHA-256 · high
    4cab6bf0b63cea04c4a44af1cf25e214771c4220ed48fff5fca834efa117e5db

    Aria-body backdoor payload sample published in Appendix C of Check Point's 2020 Naikon report.

    family · Aria-bodyfirst seen · May 6, 2020Check Point Research
  • CN · ChinaNaikonSHA-256 · high
    78782a24805b52713cb63ba3cad2569b905edea96ca3609f8464f1b7c1ba05dc

    RainyDay rdmin.src encrypted payload sample (C2 asp.asphspes.com) published in Bitdefender's 2021 Naikon whitepaper IOC section.

    family · RainyDayfirst seen · Apr 26, 2021Bitdefender
  • CN · ChinaNaikonDomain · high
    blog[.]toptogear[.]com

    Naikon Aria-body C2 domain listed in Check Point's 2020 Aria-body IOC appendix.

    family · Aria-bodyfirst seen · May 6, 2020Check Point Research
  • CN · ChinaNaikonDomain · high
    spool[.]jtjewifyn[.]com

    Naikon Aria-body command-and-control domain identified by Check Point Research in the 2020 'Cyber Espionage Reloaded' campaign against APAC government targets.

    family · Aria-bodyfirst seen · May 6, 2020Check Point Research
  • 138[.]68[.]90[.]19

    DigitalOcean-hosted IP observed by FBI in Pioneer Kitten operations January-August 2024, listed in Table 10 of CISA AA24-241A. The group exploits edge devices (Citrix Netscaler CVE-2019-19781/CVE-2023-3519, F5 BIG-IP CVE-2022-1388, Ivanti CVE-2024-21887, PanOS CVE-2024-3400, Check Point CVE-2024-24919) for initial access.

    first seen · Dec 31, 2023CISA
  • api[.]gupdate[.]net

    Recent infrastructure domain listed in Table 10 of CISA AA24-241A (FBI/CISA/DC3 joint advisory, 28 Aug 2024) on Iran-based Pioneer Kitten / Fox Kitten / UNC757 / Parisite / Lemon Sandstorm / Br0k3r enabling ransomware affiliates NoEscape, RansomHouse and ALPHV/BlackCat. First observed September 2022, most recently August 2024.

    first seen · Aug 31, 2022CISA
  • githubapp[.]net

    Pioneer Kitten infrastructure domain listed in CISA AA24-241A Table 10 (Indicators of Compromise - Recent). First observed February 2024 and still active through August 2024 per the joint FBI/CISA/DC3 advisory.

    first seen · Jan 31, 2024CISA
  • netscaler.1

    Credential-capturing webshell artifact dropped by Pioneer Kitten on compromised Citrix Netscaler appliances - the file collects login credentials and is placed in the same directory as a PHP webshell (ctxHeaderLogon.php / netscaler.php) per CISA AA24-241A.

    first seen · Sep 30, 2023CISA
  • ?? · UnknownPlaySHA-256 · high
    47B7B2DD88959CD7224A5542AE8D5BCE928BFC986BF0D0321532A7515C244A1E

    SHA-256 of an SVCHost.dll backdoor associated with Play ransomware operators, published in the June 2025 update to CISA/FBI/ACSC joint advisory AA23-352A (Table 2).

    family · Playcryptfirst seen · Jun 3, 2025CISA
  • ?? · UnknownPlaySHA-256 · high
    75B525B220169F07AECFB3B1991702FBD9A1E170CAF0040D1FCB07C3E819F54A

    SHA-256 of the GRIXBA information-stealer / custom data gathering tool used by Play ransomware affiliates, published in the June 2025 update to CISA/FBI/ACSC advisory AA23-352A.

    family · Grixbafirst seen · Jun 3, 2025CISA
  • ?? · UnknownPlaySHA-256 · high
    7DEA671BE77A2CA5772B86CF8831B02BFF0567BCE6A3AE023825AA40354F8ACA

    SHA-256 of a SystemBC malware DLL used by Play ransomware actors for SOCKS proxy / C2 traffic, listed in the June 2025 update to CISA/FBI/ACSC joint advisory AA23-352A (Table 2).

    family · SystemBCfirst seen · Jun 3, 2025CISA
  • 6709d332fbd5cde1d8e5b0373b6ff70c85fee73bd911ab3f1232bb5db9242dd4

    'Stardust' wiper variant documented by Check Point Research from earlier Indra/Predatory Sparrow operations against Syrian targets (Katerji Group, Arfada Petroleum, Cham Wings) in 2019-2020. Listed alongside Meteor and Comet in the August 2021 attribution of the Iran Railways attack.

    family · Stardustfirst seen · Dec 31, 2019Check Point Research
  • 68e95a3ccde3ea22b8eb8adcf0ad53c7993b2ea5316948e31d9eadd11b5151d7

    'Meteor' wiper sample documented in Check Point Research's August 2021 analysis of the 9-10 July 2021 cyberattack on Iranian Railways and the Ministry of Roads and Urban Development. The payload 'msapp.exe' writes 'Meteor has started.' to its encrypted log file, locks the host and wipes contents. Check Point ties the campaign to a self-identified 'Indra' persona that the wider community tracks as Predatory Sparrow / Gonjeshke Darande.

    family · Meteorfirst seen · Jul 8, 2021Check Point Research
  • ?? · UnknownQilinName · high
    Agenda

    Original Go-based ransomware family name used by Qilin affiliates from mid-2022 before the Rust rewrite. Group-IB and SentinelOne both track Qilin/Agenda as one lineage; the operators encrypted Synnovis pathology systems on 3 June 2024 causing the south-London NHS hospital outage.

    family · Agenda/Qilinfirst seen · Aug 24, 2022SentinelOne
  • ?? · UnknownQilinSHA-256 · medium
    e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527

    Qilin ransomware Windows sample referenced in vendor emulation packs (AttackIQ, MyCERT) drawing on Group-IB's Qilin Revisited 2024 technical analysis.

    family · Agenda/Qilinfirst seen · Jul 16, 2024Group-IB
  • ?? · UnknownRansomHubSHA-256 · high
    02e9f0fbb7f3acea4fcf155dc7813e15c1c8d1c77c3ae31252720a9fa7454292

    RansomHub Windows encryptor sample published in Symantec's August 2024 analysis tying the family back to its Knight / Cyclops origins. Sample uses Curve25519 with intermittent encryption as described in CISA AA24-242A.

    family · RansomHubfirst seen · Jul 31, 2024Symantec
  • 188[.]34[.]188[.]7

    RansomHub affiliate staging host serving second-stage payloads (NEWOFFICIALPROGRAMCAUSEOFNEWUPDATE.exe and helper DLLs under /555/) per Table 4 of CISA joint advisory AA24-242A.

    family · RansomHubfirst seen · Aug 28, 2024CISA
  • brahma2023[at]onionmail[.]org

    RansomHub affiliate contact address listed in Table 5 of CISA AA24-242A (2023-2024).

    family · RansomHubfirst seen · Aug 28, 2024CISA
  • RU · RussiaREvilName · high
    mpsvc.dll

    Sodinokibi/REvil encryptor DLL side-loaded by a renamed MsMpEng.exe in the July 2, 2021 Kaseya VSA supply-chain compromise. Vasinskyi was indicted Nov. 8, 2021 by DOJ for deploying this code through Kaseya's auto-update channel to roughly 1,500 downstream customers.

    family · REvilfirst seen · Jul 1, 2021DOJ
  • RU · RussiaREvilName · high
    Sodinokibi/REvil ransomware

    Malware family DOJ identified by name in the November 8, 2021 unsealed indictment of Ukrainian national Yaroslav Vasinskyi as the payload deployed through the Kaseya VSA agent on July 2, 2021. Vasinskyi was sentenced May 1, 2024 to 13 years 7 months and $16M restitution.

    family · REvilfirst seen · Jul 1, 2021DOJ
  • RU · RussiaRomComDomain · high
    advanced-ip-scaner[.]com

    Typosquat of advanced-ip-scanner.com used by Storm-0978 (Microsoft's tracker for the RomCom operator) to deliver trojanized installers - documented in the Microsoft Security Blog write-up that disclosed CVE-2023-36884 exploitation.

    family · RomCom RATfirst seen · Jul 10, 2023Microsoft Threat Intelligence
  • RU · RussiaRomComSHA-256 · high
    b5978cf7d0c275d09bedf09f07667e139ad7fed8f9e47742e08c914c5cf44a53

    ROMCOM RAT sample observed by Palo Alto Networks Unit 42 in the August 2022 Tropical Scorpius / Cuba ransomware intrusions - the first public attribution of the backdoor to this operator.

    family · RomCom RATfirst seen · Jul 31, 2022Palo Alto Networks Unit 42
  • RU · RussiaRomComDomain · high
    combinedresidency[.]org

    Tropical Scorpius staging domain documented by Unit 42 in their August 2022 Cuba ransomware / ROMCOM report. Listed alongside optasko[.]com as actor-controlled infrastructure.

    family · RomCom RATfirst seen · Jul 31, 2022Palo Alto Networks Unit 42
  • 7394229455151a9cd036383027a1536b

    MD5 of the Demodex kernel-mode rootkit driver published by Kaspersky in the September 2021 disclosure that originally named the actor `GhostEmperor` - the cluster now publicly tracked by U.S. agencies as Salt Typhoon. Loaded by bypassing Driver Signature Enforcement via the signed Cheat Engine driver `dbk64.sys`.

    family · Demodexfirst seen · Sep 29, 2021Kaspersky (Securelist)
  • eba9ae70d1b22de67b0eba160a6762d8

    MD5 of `cmd3`, a Linux/Go SFTP staging client paired with `cmd1` in Salt Typhoon intrusions. Listed in Table 4 of the joint AA25-239A advisory; written by the same developer as `cmd1` based on shared Go build paths (`C:/work/sync/cmd/...`).

    first seen · Aug 26, 2025CISA / NSA / FBI
  • f2bbba1ea0f34b262f158ff31e00d39d89bbc471d04e8fca60a034cabe18e4f4

    SHA-256 of `cmd1`, a Linux/Go custom SFTP client used by the Salt Typhoon / GhostEmperor cluster to stage and exfiltrate encrypted archives. Listed in Table 5 of the September 2025 joint advisory `Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System` (AA25-239A).

    first seen · Aug 26, 2025CISA / NSA / FBI
  • RU · RussiaSandwormSHA-256 · high
    1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591

    HermeticWiper / Trojan.Killdisk sample (Symantec Threat Hunter Team), deployed against Ukrainian organisations from 23 February 2022. Listed in CISA / FBI joint advisory AA22-057A appendix Table 2. The campaign is widely attributed to GRU Unit 74455 (Sandworm).

    family · HermeticWiperfirst seen · Feb 22, 2022CISA
  • RU · RussiaSandwormSHA-256 · high
    9b4dfaca873961174ba935fddaf696145afe7bbf5734509f95feb54f3584fd9a

    AcidRain - MIPS ELF wiper (filename 'ukrop') that bricked modems on Viasat's KA-SAT network on 24 February 2022, disrupting service across Ukraine and downstream wind-turbine telemetry in Germany. SentinelLabs published the hash and noted code overlap with VPNFilter (attributed to Sandworm).

    family · AcidRainfirst seen · Feb 23, 2022SentinelLabs
  • fd9c17c35a68fc505235e20c6e50c622aed8dea0

    Industroyer2 sample (108_100.exe), an IEC-104 ICS-disruption tool that Sandworm deployed against a Ukrainian energy provider on 8 April 2022. Discovery and IOC publication by ESET working with CERT-UA; ESET assesses Sandworm responsibility with high confidence.

    family · Industroyer2first seen · Apr 7, 2022ESET
  • AveMaria

    Commodity remote-access trojan (also tracked as WarZone, MITRE S0670) used by Scattered Spider for hands-on-keyboard access post-compromise, per Table 2 of CISA AA23-320A.

    family · AveMaria/WarZonefirst seen · Nov 15, 2023CISA
  • Raccoon Stealer

    Information stealer (credentials, browser history, cookies) named in Table 2 of CISA/FBI joint advisory AA23-320A as part of Scattered Spider's post-access toolset.

    family · Raccoon Stealerfirst seen · Nov 15, 2023CISA
  • VIDAR Stealer

    Information stealer listed in Table 2 of CISA AA23-320A as used by Scattered Spider for credential and cookie theft after initial help-desk social engineering.

    family · VIDARfirst seen · Nov 15, 2023CISA
  • 45[.]27[.]26[.]205

    Sample VPS exfiltration IP (ALEXHOST SRL, AS200019) used by UNC5537 to stage stolen Snowflake-customer data. Listed in Mandiant's June 2024 disclosure.

    first seen · May 21, 2024Mandiant (Google Cloud)
  • FROSTBITE

    Custom Snowflake reconnaissance utility (.NET and Java variants, attacker-named 'rapeflake') deployed by UNC5537 / ShinyHunters during the 2024 Snowflake-customer extortion campaign disclosed by Mandiant in June 2024.

    family · FROSTBITEfirst seen · Apr 13, 2024Mandiant (Google Cloud)
  • shinysp1d3r

    RaaS brand launched on a Scattered Lapsus$ Hunters Telegram channel in August 2025, marketed alongside the Trinity of Chaos data-leak site that went live on the TOR network on 3 October 2025 listing 39 Salesforce/Salesloft victims.

    family · ShinySp1d3rfirst seen · Aug 7, 2025Resecurity
  • CN · ChinaSpamouflageDomain · medium
    dailydispatcher[.]com

    Inauthentic outlet operated by DURINBRIDGE, identified by Google Threat Intelligence Group as republishing DRAGONBRIDGE articles within the broader GLASSBRIDGE ecosystem of PRC-aligned fake news sites.

    first seen · Nov 21, 2024Google Threat Intelligence Group
  • CN · ChinaSpamouflageDomain · medium
    japandigest[.]net

    Inauthentic news site operated by Shenzhen Bowen Media as part of the GLASSBRIDGE network used to launder pro-PRC and DRAGONBRIDGE narratives, per Google Threat Intelligence Group's November 2024 disclosure.

    first seen · Nov 21, 2024Google Threat Intelligence Group
  • CN · ChinaSpamouflageDomain · medium
    taiwanweekly[.]com

    Inauthentic news site operated by Shanghai Haixun Technology within the GLASSBRIDGE network and used to distribute pro-PRC content amplifying DRAGONBRIDGE narratives, per Google/Mandiant November 2024 reporting.

  • RU · RussiaTurlaName · high
    Snake (Uroburos)

    Sophisticated modular peer-to-peer implant attributed to FSB Center 16 (Turla). Known under multiple names — Snake, Uroburos, Turla, EkulturaFS — across ~20 years of operation. Disrupted by the U.S. DOJ's Operation MEDUSA in May 2023.

    family · Snakefirst seen · Dec 31, 2013CISA
  • 64[.]176[.]169[.]22

    IP address listed in Check Point Research's Void Manticore IOC appendix (May 2024 report on destructive activities in Israel).

    first seen · May 19, 2024Check Point Research
  • D0C03D40772CD468325BBC522402F7B737F18B8F37A89BACC5C8A00C2B87BFC6

    SHA-256 listed in Check Point Research's May 2024 'Bad Karma, No Justice' report on Void Manticore. The actor uses BiBi wiper (Linux and Windows variants) along with CIWiper and partition wipers in destructive operations against Israeli and Albanian targets.

    family · BiBi Wiperfirst seen · May 19, 2024Check Point Research
  • KV-botnet

    Operator-named botnet family running on compromised end-of-life SOHO routers (predominantly Cisco RV320/325, NETGEAR ProSAFE, Axis IP cameras). Used as obfuscation infrastructure for Volt Typhoon operations; the DOJ disrupted the network in Operation Dying Ember (announced 31 Jan 2024).

    family · KV-botnetfirst seen · Jan 30, 2024CISA