Back to reports
highPhishing

CountLoader HTML Smuggling Campaign — Breakglass Intelligence Report

PublishedMarch 13, 2026
Threat Actors:ProfileAssessmentOperational Patterns
phishingvidarcountloaderlummasocial-engineeringc2ransomwaremalware-analysisspearphishing

TLP: WHITE Date: 2026-03-11 Analyst: GHOST (Breakglass Intelligence) Classification: Cybercrime — Loader/Dropper Distribution Investigation Slug: summer-data-rar-march11


Executive Summary

A sample named Summer_Data_Primary_44.rar (SHA256: e27ff6646a2f98b81ea5da4d0d93127f0f3e68a5e6728f404724e388376ede84) submitted to MalwareBazaar on 2026-03-11 was identified as an active CountLoader HTML Application (HTA) payload disguised with a .rar file extension. The file is delivered via the typosquatting domain ccleaner[.]gl, impersonating the legitimate CCleaner software. This investigation uncovered a sprawling CountLoader campaign operating across 49+ domains, 6+ IP addresses spanning Moldova, Netherlands, Bulgaria, Germany, and Iran, with at least 25 unique samples observed in the last 72 hours alone. The campaign uses automated filename generation with randomized lure names and diverse file extensions (.rar, .pptx, .wav, .txt, .jpeg, .csv, .xml, .docx, .bin, .cfg, .webp, .mp4, .json, .ini, .jpg, .pdf, .xlsx, .bak) to evade detection, all containing identical HTA payloads that execute via mshta.exe. The infrastructure shows characteristics of a well-resourced cybercrime operation with bulletproof hosting in Moldova (AlexHost) and Bulgaria (Tamatiya EOOD/4vendeta).

Key Findings

  • HTML Smuggling via HTA: File is text/html (HTA) disguised as .rar -- triggers mshta.exe execution with full system privileges
  • Typosquatting: Delivery domain ccleaner[.]gl impersonates the legitimate CCleaner software (ccleaner.com), registered 2026-03-03 via NiceNIC (Chinese registrar)
  • Campaign Scale: 25+ unique HTA samples with randomized filenames identified in 72 hours (March 9-11, 2026)
  • 49+ domains in the CountLoader infrastructure, including numbered C2 domain series (alphazero[1-10]-endscape[.]cc, api-microservice-us[1-10][.]com, globalsnn[1-10]-new[.]cc)
  • 6 confirmed C2/delivery IPs: 85[.]121[.]148[.]80 (AlexHost, Moldova), 78[.]128[.]114[.]182 (Tamatiya/4vendeta, Bulgaria), 178[.]255[.]222[.]234 (CloudBackbone, Estonia/NL), 65[.]21[.]174[.]205 (Hetzner, link-host.net), 194[.]76[.]226[.]162 (Servinga, Germany), 45[.]156[.]87[.]31 (RIPE/NL)
  • Brand Impersonation Themes: CCleaner (ccleaner[.]gl), RARLab (s1-rarlab[.]com), Python (s3-python[.]cc, py-installer[.]cc), Telegram (updateservice1-telegramweb[.]com), Web3/DeFi (web3-walletnotify[.]cc, debank-api[.]cc)
  • YARA Detection: Two community YARA rules match: CP_Script_Inject_Detector (code injection) and Sus_CMD_Powershell_Usage (obfuscated PowerShell/CMD)
  • Blacklisted: Spamhaus DBL (malware_domain), SURBL (listed), Spamhaus HBL (suspicious)
  • No VirusTotal detections at time of analysis -- 0/0 detection rate, indicating brand-new campaign evasion

What Was Found vs. What Was Known

AspectPrior Public ReportingOur Findings
Infrastructureccleaner[.]gl + burning-edge[.]sbs (URLhaus)49+ domains across 5+ hosting providers, 6+ C2 IPs
Samples1 untagged sample on MalwareBazaar25+ tagged CountLoader samples, all HTA disguised
C2 Servers2 C2 IP:port entries on ThreatFox6 confirmed IPs, numbered domain rotation scheme
AttributionNoneBulletproof hosting in Moldova (AlexHost) + Bulgaria (4vendeta), Chinese registrar
Naming PatternNot documentedAutomated [Word]_[Word]_[Word]_[Number].[ext] lure generator
Campaign TimelineMarch 2026Active since at least Feb 22, 2026; older infra (burning-edge.sbs) since Nov 2025

Attack Chain

[1] SEO Poisoning / Malvertising / Social Engineering
       |
[2] Victim visits typosquat domain (e.g., ccleaner[.]gl)
       |
[3] Browser downloads HTA file with deceptive extension (.rar, .pptx, .wav, etc.)
       |
[4] Victim double-clicks file -> Windows associates .rar/.pptx -> handler fails
     OR
[4a] File saved as .hta -> mshta.exe executes with full privileges (T1218.005)
       |
[5] HTA contains obfuscated JavaScript/VBScript
       |
[6] PowerShell/CMD commands execute (identified by YARA)
       |
[7] Second-stage payload downloaded from C2 infrastructure
       |
[8] CountLoader establishes persistence + C2 beacon
       |
[9] Follow-on payload delivery (info-stealer, RAT, ransomware)

Infrastructure Analysis

Network Infrastructure

IPASN/ProviderCountryPortsServicesRoleStatus
85[.]121[.]148[.]80AlexHost SRL (CLOUDATAMD-MNT)MD (Moldova)UnknownUnknownPrimary delivery (8+ domains)LIVE
78[.]128[.]114[.]182Tamatiya EOOD / 4vendetaBG (Bulgaria)22, 80, 443Nginx, OpenSSH 8.2p1, UbuntuC2 (alphazero, globalsnn series)LIVE
178[.]255[.]222[.]234AS56971 / CloudBackboneNL/EE (Estonia)22OpenSSH 8.4p1, Debianccleaner[.]gl deliveryLIVE
65[.]21[.]174[.]205Hetzner / link-host.netDE (Germany)21,22,53,80,110,143,443,465,587,993,995,1500,2083,3306Nginx 1.26.3, MySQL 8.0.41, Exim 4.98.2, PHP 8.0.30burning-edge[.]sbs hostingLIVE
194[.]76[.]226[.]162Servinga GmbHDE (Germany)UnknownUnknownC2 (port 7673)LIVE
45[.]156[.]87[.]31RIPE NCC regionNL80, 3389Nginx 1.24.0, RDPC2 (port 443)LIVE

Domain Infrastructure — Delivery Domains

DomainRegistrarCreatedIPPurposeStatus
ccleaner[.]glNiceNIC International2026-03-03178[.]255[.]222[.]234CCleaner typosquat deliveryLIVE
burning-edge[.]sbsUnknownPre-2025-1165[.]21[.]174[.]205DeliveryLIVE
s1-rarlab[.]comUnknownUnknown85[.]121[.]148[.]80RARLab impersonationLIVE
s3-python[.]ccUnknownUnknown85[.]121[.]148[.]80Python impersonationLIVE
py-installer[.]ccUnknownUnknown85[.]121[.]148[.]80Python installer impersonationLIVE
node2-py-store[.]comUnknownUnknown85[.]121[.]148[.]80Python/Node impersonationLIVE
updateservice1-telegramweb[.]comUnknownUnknown85[.]121[.]148[.]80Telegram impersonationLIVE
web3-walletnotify[.]ccUnknownUnknown85[.]121[.]148[.]80Web3/DeFi impersonationLIVE
magnusworkspace[.]comUnknownUnknown85[.]121[.]148[.]80Generic lureLIVE
bigbrainsholdings[.]comUnknownUnknown85[.]121[.]148[.]80Generic lureLIVE
debank-api[.]ccUnknownUnknownN/ADeFi/DeBank impersonationOFFLINE
forest-entity[.]ccUnknownUnknown78[.]128[.]114[.]182C2/DeliveryLIVE

Domain Infrastructure — C2 Domains (Numbered Series)

Domain SeriesActive IPsCountPurpose
alphazero[N]-endscape[.]cc (N=1-10)78[.]128[.]114[.]182 (N=1)11 domainsC2 rotation pool
api-microservice-us[N][.]com (N=1-10)78[.]128[.]114[.]182 (N=1)10 domainsC2 rotation pool
globalsnn[N]-new[.]cc (N=1-10)78[.]128[.]114[.]182 (N=1-3)11 domainsC2 rotation pool
critical-service[.]ccN/A1 domainC2 (offline)
immortal-service[.]cc45[.]153[.]34[.]551 domainC2
fileless-market[.]cc94[.]26[.]106[.]1121 domainC2
indeanapolice[.]cc94[.]183[.]233[.]211 domainC2 (misspelled "Indianapolis")

Certificate Analysis

ccleaner[.]gl Certificates:

  • Sectigo DV wildcard cert issued 2026-03-03 (serial: 00f9da74f4d6b769bf104e0afe1c3376dc) -- covers *.ccleaner[.]gl
  • Let's Encrypt E8 wildcard cert issued 2026-03-03 (serial: 063d130930bee27268fa29136fc012ec5a6d)
  • Let's Encrypt E8 cert renewed 2026-03-11 (serial: 068615d2dad25998f654eb5a53c228f695be) -- domain-only, no wildcard
  • Both Sectigo AND Let's Encrypt certificates obtained simultaneously on registration day -- indicates automated certificate provisioning
  • Certificate renewal on 2026-03-11 suggests infrastructure rotation or reconfiguration

burning-edge[.]sbs Certificates:

  • Let's Encrypt R12/R13 certificates dating back to 2025-11-11 -- older infrastructure component
  • Most recent renewal: 2026-03-11 -- still actively maintained

Hosting Analysis

ProviderIPsCountryReputation
AlexHost SRL (CLOUDATAMD-MNT)85[.]121[.]148[.]80MoldovaKnown bulletproof hoster, frequently appears in malware campaigns
Tamatiya EOOD / 4vendeta (TAMATYA-MNT)78[.]128[.]114[.]182BulgariaBulletproof hosting, abuse-resistant
CloudBackbone (AS56971)178[.]255[.]222[.]234Estonia/NetherlandsOffshore hosting
Hetzner / link-host[.]net65[.]21[.]174[.]205GermanyShared hosting reseller
Servinga GmbH194[.]76[.]226[.]162GermanyHosting provider

Malware Analysis

Sample Details

FieldValue
FilenameSummer_Data_Primary_44.rar
SHA256e27ff6646a2f98b81ea5da4d0d93127f0f3e68a5e6728f404724e388376ede84
SHA1864c8e5c8b35259b3c1bba92b3cd082c53179105
MD597d7e925fa706e94e74986ca116baa53
TLSHT1E3B3019D098E8CE9CB1F2028551F5D0B998EA3130B1DC9907BDFBE553F22CB571AA9D0
SSDeep1536:iAAx4vi7h/VNAOAV1uhy8iSPJ8rfznbj79ubTF3F:+DU1u2znbjxubTb
File Size114,641 bytes
MIME Typetext/html
Magika Detectionhtml
URLhaus Typehta
SignatureCountLoader (not tagged on sample, confirmed via URLhaus)
Delivery Methodweb_download
Origin CountryDE (Germany)
First Seen2026-03-11 21:09:53 UTC
Downloads36 (at time of analysis)

Filename Pattern Analysis

The campaign uses an automated filename generator following the pattern: [Word1]_[Word2]_[Word3]_[Number].[Extension]

Word Pool (observed): Summer, Data, Primary, Quantum, Session, Winter, Report, Draft, Video, Home, Global, Project, Release, Finance, Gamma, Config, External, Notes, Monthly, User, Archive, Raw, Photos, Daily, Omega, NewYork, Meeting, Temp, Fusion, Images, Travel, Europe, Dataset, Final, Sales, Core, Invoice, Beta, Journal, Delta, Holiday, Moscow, Nova, Design, Work, Backup, Clean

Extension Pool (observed): .rar, .pptx, .wav, .txt, .jpeg, .csv, .xml, .docx, .bin, .cfg, .webp, .mp4, .json, .ini, .jpg, .pdf, .xlsx, .bak

This randomization serves multiple purposes:

  1. Evade hash-based detection -- every sample has unique content
  2. Evade filename-based rules -- no consistent filename pattern
  3. Social engineering -- diverse filenames match diverse lure contexts
  4. Bypass email filters -- randomized names avoid pattern matching

Behavioral Indicators (from YARA matches)

  • Code Injection (CP_Script_Inject_Detector): The HTA payload injects code into another process
  • PowerShell/CMD Abuse (Sus_CMD_Powershell_Usage): Contains obfuscated PowerShell or CMD commands
  • mshta.exe Execution: Confirmed by URLhaus ua-mshta tag -- payload is designed to execute in the mshta.exe context

Vendor Intelligence

VendorAssessment
Spamhaus HBLSuspicious
Spamhaus DBLmalware_domain (ccleaner[.]gl)
SURBLListed (ccleaner[.]gl)
CERT-PL MWDBIndexed
InQuestNo verdict
VirusTotal0/0 detections (NOT YET SCANNED -- brand new)
SHA256FilenameSizeFirst Seen
e27ff664...Summer_Data_Primary_44.rar114,6412026-03-11 21:09
d0ebabd4...Quantum_Session_Winter_9936.pptx125,4452026-03-11 08:25
4f21bd26...Report_Draft_v5.3.wav111,7582026-03-11 02:41
09dca286...Video_Home__93.txt125,2752026-03-10 21:38
0ada96fe...Global_Project_Release_6060.jpeg127,1122026-03-10 16:12
db469e31...External_Notes_Monthly_3626.txt123,9252026-03-10 15:42
7c7f0a3d...User_Archive_Raw_3885.xlsx123,0602026-03-10 15:29
d44e68bd...Quantum_Project_Canada_9531.json125,1252026-03-10 14:18
4f92cd75...Finance_Gamma_Config_487.webp123,1382026-03-10 09:31
e867b6ea...Travel_X_Config_917.wav124,5782026-03-09 21:30
084dbd55...Europe_Dataset_Final_334.ini122,9572026-03-09 21:18
31ee0d6b...Sales_Core_Data_518.csv121,3632026-03-09 21:14
4c44bd2c...Photos_Daily_v3.0.xml124,3942026-03-09 20:59
b959663a...Omega_Data_NewYork_2087.xml125,1042026-03-09 20:42
4b044b4e...Meeting_Photos_Temp_6194.mp4123,5962026-03-09 20:34
3297233d...User_Fusion_Images_997.cfg125,0182026-03-09 20:15
1b9115b9...Archive_Draft_v3.6.pptx123,0582026-03-09 14:15
06a3c6c9...Invoice_Beta_v4.8.jpg125,3932026-03-09 08:03
47fe8a5f...Journal_Raw_v2.9.webp126,0592026-03-09 08:03
a00975ac...Delta_Dataset_Holiday_2082.bak121,5052026-03-09 08:03
a54bc8b9...Delta_Journal_Moscow_6150.ini125,1962026-03-09 08:03
0d24a35b...NewYork_Release_Temp_153.docx123,3062026-03-09 08:03
846380ab...Design_Quantum_Video_584.docx124,6122026-03-09 08:03
0b7aaef1...Fusion_Document_Europe_6517.bin124,0442026-03-09 08:03
40e61e80...Nova_Data_NewYork_5969.xml125,2542026-03-09 08:03
d763d05f...Work_Backup_Clean_4396.pdf114,2932026-03-09 07:42

Sample size range: 111,758 - 127,112 bytes (mean ~123 KB) -- consistent with templated HTA generation with variable padding/obfuscation.

Threat Actor Profile

Attribution Assessment

  • Confidence: MEDIUM
  • Country/Region: Eastern Europe (Moldova, Bulgaria) / possible Russian-speaking nexus
  • Evidence:
    • Primary hosting in Moldova (AlexHost) and Bulgaria (Tamatiya/4vendeta) -- both known for hosting cybercrime infrastructure
    • Domain indeanapolice[.]cc contains the misspelling "Indeanapolice" (Indianapolis) -- non-native English speaker
    • Domain Delta_Journal_Moscow_6150.ini filename includes "Moscow" -- possible geographic reference
    • Chinese registrar (NiceNIC) used for ccleaner[.]gl -- common in Eastern European cybercrime for domain registration
    • Numbered domain series pattern (alphazero[1-10], api-microservice-us[1-10], globalsnn[1-10]) indicates automated infrastructure generation -- characteristic of organized cybercrime operations
  • Motivation: Financial (loader-as-a-service / pay-per-install model)
  • Sophistication: MEDIUM-HIGH -- automated sample generation, multi-domain C2 rotation, brand impersonation, bulletproof hosting, but OPSEC failures in domain naming

Actor Operational Patterns

  1. Infrastructure Rotation: New domains activated in waves (Feb 22 -> Mar 1 -> Mar 7 -> Mar 9-11)
  2. C2 Resilience: Numbered domain series with only 1-3 active at any time -- remaining dormant as fallbacks
  3. Brand Diversity: Impersonates CCleaner, RARLab, Python, Telegram, Web3/DeFi platforms -- targets developer and crypto audiences
  4. Hosting Diversity: Distributes infrastructure across 5+ countries (MD, BG, NL, EE, DE)
  5. Sample Volume: 25+ samples in 72 hours suggests automated build pipeline

OPSEC Failures

  1. Misspelled domain: indeanapolice[.]cc -- "Indeana" instead of "Indiana"
  2. Moscow reference in filename: Geographic leak in auto-generated filenames
  3. Consistent file size range: 111-127 KB range across all samples enables size-based heuristic detection
  4. Shared IP hosting: 8+ domains on single IP (85[.]121[.]148[.]80) enables single-pivot mapping of full infrastructure
  5. All samples untagged on initial upload: Suggests automated MalwareBazaar submission pipeline or honeypot catch, not manual analysis

MITRE ATT&CK Mapping

TacticTechniqueIDApplication
Resource DevelopmentAcquire Infrastructure: DomainsT1583.00149+ malicious domains registered
Resource DevelopmentStage Capabilities: Upload MalwareT1608.001HTA payloads staged on delivery domains
Initial AccessPhishing: Spearphishing LinkT1566.002Links to typosquat domains distributed
Initial AccessDrive-by CompromiseT1189Typosquat domains serve malicious downloads
ExecutionSystem Binary Proxy Execution: MshtaT1218.005HTA payload executes via mshta.exe
ExecutionCommand and Scripting Interpreter: PowerShellT1059.001Obfuscated PowerShell in HTA payload
ExecutionCommand and Scripting Interpreter: Windows Command ShellT1059.003CMD commands in HTA payload
ExecutionCommand and Scripting Interpreter: JavaScriptT1059.007JavaScript embedded in HTA
Defense EvasionMasquerading: Match Legitimate NameT1036.005Files named .rar/.pptx/.wav to appear legitimate
Defense EvasionMasquerading: Double File ExtensionT1036.007HTML content with non-HTML extensions
Defense EvasionObfuscated Files or InformationT1027Obfuscated JavaScript/PowerShell
Defense EvasionHTML SmugglingT1027.006HTML file disguised as archive/document
Command and ControlApplication Layer Protocol: Web ProtocolsT1071.001C2 over HTTP/HTTPS
Command and ControlDynamic Resolution: Domain GenerationT1568.002Numbered domain series for C2 rotation

IOC Summary

Network Indicators — Delivery Domains (Defanged)

ccleaner[.]gl
burning-edge[.]sbs
s1-rarlab[.]com
s3-python[.]cc
py-installer[.]cc
node2-py-store[.]com
updateservice1-telegramweb[.]com
web3-walletnotify[.]cc
magnusworkspace[.]com
bigbrainsholdings[.]com
debank-api[.]cc
forest-entity[.]cc

Network Indicators — C2 Domains (Defanged)

alphazero[1-10]-endscape[.]cc
alphazero-endscape[.]cc
api-microservice-us[1-10][.]com
globalsnn[1-10]-new[.]cc
globalsnn-new[.]cc
critical-service[.]cc
immortal-service[.]cc
fileless-market[.]cc
indeanapolice[.]cc

Network Indicators — IP Addresses (Defanged)

85[.]121[.]148[.]80          (AlexHost, Moldova — primary delivery)
78[.]128[.]114[.]182         (Tamatiya/4vendeta, Bulgaria — C2)
178[.]255[.]222[.]234        (CloudBackbone, Estonia/NL — ccleaner[.]gl)
65[.]21[.]174[.]205          (Hetzner/link-host, Germany — burning-edge[.]sbs)
194[.]76[.]226[.]162:7673    (Servinga, Germany — C2)
45[.]156[.]87[.]31:443       (NL — C2)
45[.]153[.]34[.]55           (immortal-service[.]cc)
94[.]26[.]106[.]112          (fileless-market[.]cc)
94[.]183[.]233[.]21          (indeanapolice[.]cc)

File Indicators — Primary Sample

SHA256:  e27ff6646a2f98b81ea5da4d0d93127f0f3e68a5e6728f404724e388376ede84
SHA1:    864c8e5c8b35259b3c1bba92b3cd082c53179105
MD5:     97d7e925fa706e94e74986ca116baa53
TLSH:    T1E3B3019D098E8CE9CB1F2028551F5D0B998EA3130B1DC9907BDFBE553F22CB571AA9D0
SSDeep:  1536:iAAx4vi7h/VNAOAV1uhy8iSPJ8rfznbj79ubTF3F:+DU1u2znbjxubTb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TLS Certificate Serials

068615d2dad25998f654eb5a53c228f695be  (LE E8, ccleaner[.]gl, 2026-03-11)
050108b42309c4c0f00e8e599febd1f188dd  (LE E8, ccleaner[.]gl, 2026-03-03)
063d130930bee27268fa29136fc012ec5a6d  (LE E8, *.ccleaner[.]gl, 2026-03-03)
00f9da74f4d6b769bf104e0afe1c3376dc    (Sectigo DV, *.ccleaner[.]gl, 2026-03-03)

Immediate (24-48 hours)

  1. Block all IOC domains and IPs at perimeter firewalls, DNS sinkholes, and web proxies
  2. Add YARA rules (below) to endpoint detection platforms
  3. Deploy Suricata rules (below) on network sensors
  4. Search email logs for links to any CountLoader delivery domains
  5. Hunt for mshta.exe executions in EDR logs -- especially mshta.exe launching with network connections to the listed C2 IPs
  6. Search proxy/DNS logs for connections to any of the 49+ listed domains
  7. Alert SOC to monitor for .rar, .pptx, .wav files with text/html MIME type (Content-Type mismatch detection)

Short-term (1-2 weeks)

  1. Submit abuse reports to AlexHost (Moldova), Tamatiya/4vendeta (Bulgaria), and CloudBackbone (Estonia) for infrastructure takedown
  2. Report to NiceNIC registrar for ccleaner[.]gl domain suspension
  3. Report to CCleaner/Piriform brand protection team about typosquat domain
  4. Monitor CT logs for new certificates issued to CountLoader-associated domain patterns
  5. TLSH fuzzy matching across incoming samples to detect new CountLoader variants (threshold: distance < 150)

Medium-term (1-3 months)

  1. Implement MIME-type checking at email gateway and web proxy -- flag downloads where Content-Type does not match file extension
  2. Block .hta file execution via Group Policy or application control (most organizations never need mshta.exe)
  3. Deploy browser extension/policy to warn on .gl and .sbs TLDs (commonly abused)
  4. Monitor MalwareBazaar and ThreatFox for new CountLoader submissions
  5. Investigate follow-on payloads -- CountLoader is a first-stage loader, determine what second-stage payloads are being deployed (likely info-stealers such as Lumma, Vidar, or RedLine)

Abuse Reports

AlexHost SRL (Moldova) — 85[.]121[.]148[.]80

To: abuse@alexhost.com
Subject: Active malware delivery infrastructure on 85.121.148.80

Dear AlexHost Abuse Team,

The IP address 85.121.148.80 in your network is hosting active CountLoader
malware delivery infrastructure. At least 8 domains resolving to this IP are
distributing malicious HTA files disguised as legitimate software downloads.

Domains: s1-rarlab.com, s3-python.cc, py-installer.cc, node2-py-store.com,
updateservice1-telegramweb.com, web3-walletnotify.cc, magnusworkspace.com,
bigbrainsholdings.com

Evidence: URLhaus (abuse.ch), ThreatFox IOCs, MalwareBazaar samples
Reference: https://urlhaus.abuse.ch/host/ccleaner.gl/

Please investigate and take appropriate action.

TELE Greenland / NiceNIC — ccleaner[.]gl

To: gl-admin@telepost.gl
Subject: Typosquatting/malware domain: ccleaner.gl

The domain ccleaner.gl (Registry Domain ID: D627609486-CNIC) registered
2026-03-03 is being used to distribute CountLoader malware by impersonating
the legitimate CCleaner software (ccleaner.com).

This domain is listed on Spamhaus DBL as malware_domain and on SURBL.
URLhaus reference: https://urlhaus.abuse.ch/url/3791619/

Please suspend this domain immediately.

References

  • MalwareBazaar: hxxps://bazaar[.]abuse[.]ch/sample/e27ff6646a2f98b81ea5da4d0d93127f0f3e68a5e6728f404724e388376ede84/
  • URLhaus: hxxps://urlhaus[.]abuse[.]ch/url/3791619/
  • URLhaus Host: hxxps://urlhaus[.]abuse[.]ch/host/ccleaner[.]gl/
  • ThreatFox CountLoader IOCs: hxxps://threatfox[.]abuse[.]ch/browse/malware/win.count_loader/
  • Malpedia: hxxps://malpedia[.]caad[.]fkie[.]fraunhofer[.]de/details/win.count_loader
  • CERT-PL MWDB: hxxps://mwdb[.]cert[.]pl/sample/e27ff6646a2f98b81ea5da4d0d93127f0f3e68a5e6728f404724e388376ede84/
  • crt.sh ccleaner[.]gl: hxxps://crt[.]sh/?q=ccleaner.gl

GHOST -- Breakglass Intelligence "One indicator. Total infrastructure."

Share