Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Sarcoma Group | Yes | 2026-05-23T14:12:24 |
sarcomawmawlhov7o5mdhz4eszxxlkyaoiyiy2b5iwxnds2dmb4jakad.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Advanced IP Scanner
|
| Initial Access | Persistence | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Scheduled Task/Job | Obfuscated Files or Information | OS Credential Dumping | Remote System Discovery | Remote Services | Archive Collected Data | Exfiltration Over Web Service | Remote Access Tools | Data Encrypted for Impact |
| Exploit Public-Facing Application | Scheduled Task/Job: Cron | Modify Registry | File and Directory Discovery | Service Stop | |||||
| Trusted Relationship | Impair Defenses | System Location Discovery | Inhibit System Recovery | ||||||
| Phishing | Impair Defenses: Disable or Modify Tools | System Location Discovery: System Language Discovery | |||||||
| Phishing: Spearphishing Attachment |