PikaBot C2 Detected – 86[.]38[.]225[.]105:13721

PikaBot Detection Alerts

image 35

PikaBot C2

The Information provided at the time of posting was detected as “PikaBot C2”. Depending on when you are viewing this article, it may no longer be the case and could be determined as being a false positive. Please do your own additional validation. – RedPacket Security


General Information

IP Address86[.]38[.]225[.]105
Port13721
Hostname (if available)
DescriptionThe full text of the full report on 9 February 2017:-18 March 2017, subject to approval by the Court of Arbitration for Sport (CAS), on 1 March 2018, for 22 February
Date Detected2024-02-26T18:33:29.820000
Malware Families (linked to)pikabot,
Tagst1033 system, over c2, channel, t1046 network, t1053 scheduled, taskjob, t1055 process, injection, t1057 process, discovery
Referenceshttps://www.pcrisk.es/guias-de-desinfeccion/12089-pikabot-malware
CountryUS

Mitre Att&ck Linked TTPS

Mitre Attack ID Mitre Attack Name
T1027 Obfuscated Files or Information
T1033 System Owner/User Discovery
T1041 Exfiltration Over C2 Channel
T1046 Network Service Scanning
T1053 Scheduled Task/Job
T1055 Process Injection
T1057 Process Discovery

 

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.