Skip to main content

Ransomware Tracker

The C2i published in these lists are extracted from the malicious binaries. These executables are the final payloads served by the Emotet malware.
You can use this information to create block-lists. All C2i published here is active at the time of publishing but some of these C2s can go offline at any time after that. All information provided here is free to use.
C2i published on this site could cause some FPs as these IPs/URIs get recycled frequently, you agree to that before using any C2i from this site.

Lists are NOT deduped.  

May 2021

REvil 

hxxp://blossombeyond50.com
hxxp://aco-media.nl
hxxp://oemands.dk
hxxp://clos-galant.com
hxxp://gantungankunciakrilikbandung.com
hxxp://thaysa.com
hxxp://promesapuertorico.com
hxxp://mariposapropaneaz.com
hxxp://acomprarseguidores.com
hxxp://pubweb.carnet.hr
hxxp://team-montage.dk
hxxp://funjose.org.gt
hxxp://sahalstore.com
hxxp://fatfreezingmachines.com
hxxp://dubnew.com
hxxp://jolly-events.com
hxxp://wmiadmin.com
hxxp://fayrecreations.com
hxxp://promalaga.es
hxxp://schraven.de
hxxp://castillobalduz.es
hxxp://ftlc.es
hxxp://classycurtainsltd.co.uk
hxxp://simpkinsedwards.co.uk
hxxp://sporthamper.com
hxxp://transportesycementoshidalgo.es
hxxp://hokagestore.com
hxxp://devlaur.com
hxxp://sagadc.com
hxxp://greenko.pl
hxxp://skiltogprint.no
hxxp://geisterradler.de
hxxp://easytrans.com.au
hxxp://ra-staudte.de
hxxp://spargel-kochen.de
hxxp://herbstfeststaefa.ch
hxxp://rocketccw.com
hxxp://musictreehouse.net
hxxp://2ekeus.nl
hxxp://craigmccabe.fun
hxxp://tecnojobsnet.com
hxxp://qualitus.com
hxxp://schlafsack-test.net
hxxp://fitovitaforum.com
hxxp://kevinjodea.com
hxxp://buroludo.nl
hxxp://bouquet-de-roses.com
hxxp://humancondition.com
hxxp://rebeccarisher.com
hxxp://gonzalezfornes.es
hxxp://babcockchurch.org
hxxp://danholzmann.com
hxxp://dezatec.es
hxxp://modestmanagement.com
hxxp://bogdanpeptine.ro
hxxp://durganews.com
hxxp://chrissieperry.com
hxxp://appsformacpc.com
hxxp://abogados-en-alicante.es
hxxp://allure-cosmetics.at
hxxp://dpo-as-a-service.com
hxxp://lykkeliv.net
hxxp://dsl-ip.de
hxxp://sla-paris.com
hxxp://live-con-arte.de
hxxp://assurancesalextrespaille.fr
hxxp://mylolis.com
hxxp://paymybill.guru
hxxp://ecopro-kanto.com
hxxp://forskolorna.org
hxxp://marchand-sloboda.com
hxxp://syndikat-asphaltfieber.de
hxxp://jusibe.com
hxxp://psa-sec.de
hxxp://xoabigail.com
hxxp://bodyfulls.com
hxxp://handi-jack-llc.com
hxxp://solinegraphic.com
hxxp://ymca-cw.org.uk
hxxp://waynela.com
hxxp://kaminscy.com
hxxp://globedivers.wordpress.com
hxxp://danskretursystem.dk
hxxp://boulderwelt-muenchen-west.de
hxxp://ilive.lt
hxxp://kuntokeskusrok.fi
hxxp://foryourhealth.live
hxxp://noesis.tech
hxxp://lescomtesdemean.be
hxxp://rerekatu.com
hxxp://ivivo.es
hxxp://modamilyon.com
hxxp://c-a.co.in
hxxp://thedad.com
hxxp://work2live.de
hxxp://bafuncs.org
hxxp://aglend.com.au
hxxp://iqbalscientific.com
hxxp://tuuliautio.fi
hxxp://narcert.com

Comments

Popular posts from this blog

Major update: Emotet C2i Apr 2019

Emotet has updated the C2 comms in the latest release, going for URIs instead of IPs (root). Here’s a complete list of the current campaign: Emotet C2i: http://51.255.50.164:8080/window/child/ringin/ http://109.104.79.48:8080/cookies/tlb/ http://92.48.118.27:8080/rtm/pnp/ http://197.248.67.226:8080/enabled/forced/ http://181.170.93.38:8080/teapot/balloon/ http://69.163.33.82:8080/glitch/scripts/arizona/ http://192.155.90.90:7080/prov/odbc/arizona/ http://43.229.62.186:8080/teapot/ http://72.47.248.48:8080/sess/cone/ http://209.159.244.240:443/publish/vermont/tlb/ http://197.248.67.226:8080/codec/between/tlb/ http://176.58.93.123:8080/splash/ http://72.47.248.48:8080/sess/glitch/entries/ http://181.170.93.38:8080/schema/free/ http://69.163.33.82:8080/badge/symbols/results/ http://109.73.52.242:8080/results/prov/ http://68.191.37.107/iplk/vermont/sym/merge/ http://154.120.228.126:8080/xian/enabled/sym/merge/ http://136.49.87.106/usbccid/taskbar/enabled/ http://5.9.128.163:8080/json

Grinju Downloader: Anti-analysis (on steroids) | Part 2

  This malware takes anti-analysis and stealth techniques to a new level We took a look at this malware in the Part 1 of this publication. Now let’s carry on with the analysis and dig deeper into the various anti-analysis and stealth-exec features of this malware in Part2. Malpedia Inventory: https://malpedia.caad.fkie.fraunhofer.de/details/vbs.grinju Secondary Macro Code First of all, here’s the entire code that is dumped in the sheet once all the macro functions have been completed. Take a look at these lines and try to figure out what they are meant to do. Then we’ll take a look at the most important of these briefly before moving on to the next section. =CLOSE(FALSE) =FORMULA(LEN(APP.MAXIMIZE())+-459,Sheet1!R18690C129) =FORMULA(LEN(GET.WINDOW(7))+-131,Sheet1!R18691C129) =FORMULA(LEN(GET.WINDOW(20))+-893,Sheet1!R18692C129) =FORMULA(LEN(GET.WINDOW(23)=3)+433,Sheet1!R18693C129) =FORMULA(LEN(GET.WORKSPACE(31))+864,Sheet1!R18694C129) =FORMULA(LEN(GET.WORKSPACE(13)>770)+707,Sheet1!R18

Emotet C2 Network IOC August 2018 Week 4 Campaign

Article by  Vishal Thakur IP Port COUNTRY REGION CITY TIME ZONE 50.33.142.65 United States Texas Dallas CST 173.63.125.138 United States New Jersey EST 67.175.118.157 United States South Carolina Tamassee EST 47.186.71.56 Canada Ontario Ottawa EST 71.12.111.50 443 United States Georgia Moultrie EST 100.16.243.115 443 United States Virginia Ashburn EST 80.89.191.118 United Arab Emirates Dubai GMT+4 104.219.132.28 United States Oklahoma Oklahoma City CST 23.25.247.205 443 United States Massachusetts Cambridge EST 118.244.214.210 443 Korea, Republic Of Seoul GMT+9 212.129.56.179 443 Russian Federation Moscow GMT+3 47.16.187.196 8090 Canada Ontario Ottawa EST 97.68.6.155 8090 United States New Jersey Bedminster EST 71.174.9.241 United States Florida Brandon EST 14.1.39.3 443 China Guangzhou GMT+8 199.119.78.38 443 United States Missouri Springfield CST 71.8.233.246 7080 United States Delaware Seaford EST 108.191.59.73 United States District Of Columbia Washingt