PikaBot C2 Detected – 172[.]232[.]162[.]198:13721

PikaBot Detection Alerts

image 35

PikaBot C2

The Information provided at the time of posting was detected as “PikaBot C2”. Depending on when you are viewing this article, it may no longer be the case and could be determined as being a false positive. Please do your own additional validation. – RedPacket Security


General Information

IP Address172[.]232[.]162[.]198
Port13721
Hostname (if available)172-232-162-198[.]ip[.]linodeusercontent[.]com
DescriptionMalwarebytes.com provides comprehensive security services for businesses, personal and business, including a full set of security features. £1.5m of research, research and development, as part of its annual review.
Date Detected2023-12-16T18:12:39.733000
Malware Families (linked to)Cobalt Strike, QakBot,
Tagspikabot, google, fakebat, ta577, javascript, qakbot, ole villadsen, msi installer, dropbox, unit, february, icedid, systembc, cobalt strike, darkgate, august, anydesk, marina, virustotal
Referenceshttps://www.malwarebytes.com/blog/threat-intelligence/2023/12/pikabot-distributed-via-malicious-ads
CountryUS

Mitre Att&ck Linked TTPS

Mitre Attack ID Mitre Attack Name
T1036 Masquerading
T1566 Phishing

 

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.