ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://178.250.159.102/1vzbhwx9m3zcoop2v63fxe/dn5krv82yiibh83tsrqasyp59oii2npz7y43x9/bgsvcg47wn8njkzj1bkilypeu18lmzmncm0be4oxas/8537e73266353b47b77e12f9386dedc5.php.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-16 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 130842 |
|---|---|
| IOC: | http://178.250.159.102/1vzbhwx9m3zcoop2v63fxe/dn5krv82yiibh83tsrqasyp59oii2npz7y43x9/bgsvcg47wn8njkzj1bkilypeu18lmzmncm0be4oxas/8537e73266353b47b77e12f9386dedc5.php |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | DCRat |
| Malware alias: | DarkCrystal RAT |
| Confidence Level : | Confidence level is high (100%) |
| ASN: | AS29182 RU-JSCIOT |
| Country: | RU |
| First seen: | 2021-06-16 18:15:30 UTC |
| Last seen: | never |
| UUID: | d5c23765-cece-11eb-b17b-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | DCRat C&C |
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2021-06-16 18:15:33 | 7ee77a45282939f784f7d224b7345399efa09a14a9ca619d6692d6ac04ebfa17 |
RU