ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://85.202.169.121/mann/index.php.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-17 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 395233 |
|---|---|
| IOC: | http://85.202.169.121/mann/index.php |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Azorult |
| Malware alias: | PuffStealer, Rultazo |
| Confidence Level : | Confidence level is high (100%) |
| ASN: | AS399471 AS-DESEQUITY |
| Country: | NL |
| First seen: | 2022-03-14 20:05:05 UTC |
| Last seen: | 2023-09-27 13:58:37 UTC |
| UUID: | 0a4f48f1-a3d2-11ec-a022-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | AZORult |
| Reference: | https://tria.ge/220314-ymactadghk |
AndreGironda
MITRE T1566.001Date: Mon, 14 Mar 2022 01:30-02:00 -0700
Received: from eastbaycf.org (64.188.20.118) by Server.kooiker.local
From: EDWARD <cloroxfndt@eastbaycf.org>
Subject: RFQ's
Message-ID: <20220314015124.0F75F8A35B2DCC12@eastbaycf.org>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_0012_220A62F4.3A3AEDE9"
Return-Path: cloroxfndt@eastbaycf.org
Attachment Name: RFQ.doc
RTF Maldoc SHA256: 7feaf2852f232c498ae22c5d65c8df6e2d6ac4b7d5c421c64143f2a300d439bf
Stage 1 URL: hXXp://2[.]58.149.41/mannzx[.]exe
Stage Executable SHA256: 456050b3b656fc30777d31163ef1677302f224c4d36bc43dff99ae91fec67d61
Stage 2 URL: hXXps://transfer[.]sh/get/QSd4kt/NURR.txt
Stage 3 URL: hXXps://transfer[.]sh/get/wYQnL5/BDLLL.txt
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
NL