Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Yes | 2026-05-19T13:09:36 | Microsoft-IIS 10.0 — PHP 8.2.28 |
ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
SoftPerfect NetScan
|
AnyDesk
Atera
Splashtop
|
|
ProcDump
|
Cobalt Strike
Metasploit
Meterpreter
|
|
|
|
| Stealth | Discovery | Lateral Movement | Command and Control | Impact |
|---|---|---|---|---|
| Obfuscated Files or Information | Remote System Discovery | Remote Services: SMB/Windows Admin Shares | Application Layer Protocol: Web Protocols | Data Encrypted for Impact |
| Obfuscated Files or Information: Dynamic API Resolution | Network Share Discovery | Service Stop | ||
| Valid Accounts: Local Accounts | Software Discovery: Security Software Discovery | Inhibit System Recovery | ||
| Modify Registry | System Location Discovery: System Language Discovery | |||
| Deobfuscate/Decode Files or Information | ||||
| Execution Guardrails | ||||
| Hide Artifacts | ||||
| Debugger Evasion |