ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://195.178.120.72/ch1t/inc/c20966a2dd74ab.php.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-26 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 872200 |
|---|---|
| IOC: | http://195.178.120.72/ch1t/inc/c20966a2dd74ab.php |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Agent Tesla |
| Malware alias: | AgenTesla, AgentTesla, Negasteal |
| Confidence Level : | Confidence level is high (100%) |
| ASN: | AS210218 OpenFiber-Italy |
| Country: | IT |
| First seen: | 2022-10-07 09:46:13 UTC |
| Last seen: | 2022-11-12 21:53:16 UTC |
| UUID: | e178ef61-4624-11ed-9bfe-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | AgentTesla |
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2022-10-07 09:50:43 | 6b4ae1bde5c68bdc96647dc1154eeea23eda290a970f8ddd9991a67337ab3689 |
IT