PikaBot C2 Detected – 103[.]82[.]243[.]5:13785
PikaBot Detection Alerts
PikaBot C2
The Information provided at the time of posting was detected as “PikaBot C2”. Depending on when you are viewing this article, it may no longer be the case and could be determined as being a false positive. Please do your own additional validation. – RedPacket Security
General Information
IP Address | 103[.]82[.]243[.]5 |
Port | 13785 |
Hostname (if available) | 103-82-243-5[.]idcloudhosting[.]my[.]id |
Description | The full text of the full report on 9 February 2017:-18 March 2017, subject to approval by the Court of Arbitration for Sport (CAS), on 1 March 2018, for 22 February |
Date Detected | 2024-02-26T18:33:29.820000 |
Malware Families (linked to) | pikabot, |
Tags | t1033 system, over c2, channel, t1046 network, t1053 scheduled, taskjob, t1055 process, injection, t1057 process, discovery |
References | https://www.pcrisk.es/guias-de-desinfeccion/12089-pikabot-malware |
Country | ID |
Mitre Att&ck Linked TTPS
Mitre Attack ID | Mitre Attack Name |
T1027 | Obfuscated Files or Information |
T1033 | System Owner/User Discovery |
T1041 | Exfiltration Over C2 Channel |
T1046 | Network Service Scanning |
T1053 | Scheduled Task/Job |
T1055 | Process Injection |
T1057 | Process Discovery |
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.