Last 7 days

Mar 2, 2026
SHAs
1
C2 Total
1
C2 Unique
1
C2 New
1

Behavioral Tags

discovery100%trojan100%stealer100%persistence100%execution100%

MITRE ATT&CK Techniques

T1012Query Registry
100%

Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.

T1016.001Internet Connection Discovery
100%

Adversaries may check for Internet connectivity on compromised systems.

T1053.005Scheduled Task
100%

Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code.

T1112Modify Registry
100%

Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, persistence, and execution.

T1547.001Registry Run Keys / Startup Folder
100%

Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key.

Port Distribution

2026100% · 1 hosts