Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Donex ransomeware leakage - | No | 2026-04-28T07:23:37 |
g3h3klsev3eiofxhykmtenmdpi67wzmaixredk5pjuttbx7okcfkftqd.onion
|
| Execution | Persistence | Defense Evasion | Credential Access | Discovery | Collection | Impact |
|---|---|---|---|---|---|---|
| Windows Management Instrumentation | Windows Services | Obfuscated Files or Information | Input Capture | System Service Discovery | Data Staged | Data Destruction |
| Command and Scripting Interpreter | Indicator Removal from Tools | Application Window Discovery | Automated Collection | Data Encrypted for Impact | ||
| Scripting | Embedded Payloads | System Network Configuration Discovery | Service Stop | |||
| Native API | Masquerading | Remote System Discovery | Inhibit System Recovery | |||
| Shared Modules | Scripting | Process Discovery | ||||
| Clear Windows Event Logs | System Information Discovery | |||||
| File Deletion | File and Directory Discovery | |||||
| Indirect Command Execution | Network Share Discovery | |||||
| File and Directory Permissions Modification | Security Software Discovery | |||||
| Abuse Elevation Control Mechanism | ||||||
| Disable or Modify Tools | ||||||
| Hidden Window |