不正URLへのアクセス、不正メールの受信
-
メール受信した
弊社お客様0社 URLアクセスした
弊社お客様2社 -
2026/01/15
※2026/01/15 更新
マルウェア感染させると考えられるURLを検知(2026/01/15)
■IoC(※1)
| Type: | IOC: | Signature: |
|---|---|---|
| URL | hxxp://91[.]92[.]241[.]10/wow2[.]sh hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/05%2012%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/05%2011%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/03%2010%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/04%2012%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/04%2007%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/04%2009%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/02%2012%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/03%2007%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/04%2008%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/05%2010%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/03%2012%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/03%2011%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/03%2009%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/05%2008%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/05%2009%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/06%2007%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/04%2011%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/05%2007%202025/info[.]zip hxxp://81[.]42[.]249[.]132:5000/R-02-RADIOLE/03%2008%202025/info[.]zip hxxp://87[.]121[.]84[.]129/wow2[.]sh hxxp://93[.]103[.]89[.]76:8802/runtime/read/emulated/0/Alarms/Photo[.]scr hxxp://93[.]103[.]89[.]76:8802/runtime/read/emulated/0/Android/obb/AV[.]scr hxxp://176[.]65[.]148[.]217/xmrig |
Coinminer |
| URL | hxxp://185[.]132[.]53[.]174/maybe[.]exe | SalatStealer |
| URL | hxxp://64[.]227[.]48[.]87/sex[.]sh hxxp://78[.]142[.]229[.]7/2016Nwjsh4 hxxp://78[.]142[.]229[.]7/2016Nwjmpsl |
Bashlite |
| URL | hxxp://68[.]64[.]178[.]11/updatea hxxp://68[.]64[.]178[.]11/update hxxp://68[.]64[.]178[.]11/update[.]exe |
Sliver |
| URL | hxxp://179[.]43[.]186[.]214:7889/zEk3 hxxp://110[.]40[.]198[.]62:5555/02[.]08[.]2022[.]exe hxxp://110[.]40[.]198[.]62/02[.]08[.]2022[.]exe hxxp://151[.]243[.]18[.]176/02[.]08[.]2022[.]exe hxxp://129[.]204[.]11[.]247:7777/02[.]08[.]2022[.]exe hxxp://198[.]176[.]63[.]214/02[.]08[.]2022[.]exe hxxp://120[.]48[.]168[.]57:8080/02[.]08[.]2022[.]exe hxxp://47[.]121[.]29[.]60/02[.]08[.]2022[.]exe hxxp://39[.]105[.]193[.]156/02[.]08[.]2022[.]exe |
Cobalt Strike |
| URL | hxxps://possuhb[.]cyou/api | Lumma Stealer |
| URL | hxxp://103[.]67[.]197[.]187:9999/DismCore[.]dll | XWorm |
| URL | hxxp://158[.]94[.]208[.]6/h8jfdmdWS/Plugins/cred64[.]dll hxxp://158[.]94[.]208[.]6/h8jfdmdWS/Plugins/cred[.]dll |
Amadey |
| URL | hxxps://bechtellr[.]com/6o9p[.]js hxxps://bechtellr[.]com/js[.]php |
KongTuke |







