Malware Botnet C&C

You are currently viewing the database entry for the malware botnet command&control server (C&C) hosted at 39.33.170.57 . You can get additional information about this C&C here, such as first seen, last seen and associated malware samples.

Database Entry


IP address:39.33.170.57
Hostname:n/a
AS number:AS17557
AS name:PKTELECOM-AS-PK Pakistan Telecommunication Company Limited
Country:- PK
First seen:2022-05-05 11:27:46 UTC
Last online:2022-05-06 10:xx:xx UTC

Botnet C&Cs

The table below shows all botnet C&Cs know to Feodo Tracker that are hosted on this host.

First seen (UTC)IP addressPortMalwareStatusAbuse compltain sent?Last online (UTC)
2022-05-05 11:27:4639.33.170.57995
QakBot
Offline
Yes (2022-05-05 11:30:03 UTC)2022-05-06 10:xx:xx

Referencing Malware Samples

The following table shows the most recent malware samples associated with malware botnet C&Cs hosted on 39.33.170.57. Please consider that the output is limited to the 500 most recent malware samples.

Time stamp (UTC)MD5 hashFile TypeVirustotalMalware
2022-05-15 05:55:39eedd696c0e9fb0c122a95a69798b6dcbDLL dlln/a
Quakbot
2022-05-13 08:03:376ef01b3d6cb387aa3b957506da0a03d1DLL dlln/a
Quakbot
2022-05-11 11:01:5159264478b1f47c3c5ae623e2432ac0e5DLL dlln/a
n/a
2022-05-10 19:22:39b015295b41e6934648c6aaf07acf92a9DLL dlln/a
n/a
2022-05-10 18:25:136fa62c110cb73a6d83e28cdb0861b1d3DLL dlln/a
n/a
2022-05-10 05:00:5694c73bbef1666a302212e493c48e5b33DLL dlln/a
Quakbot
2022-05-09 16:57:33623188e4e000ac1a9bef7370c0a7c8d8DLL dlln/a
n/a
2022-05-08 16:21:5601cf0b420a531b952f665eab79cfb686DLL dlln/a
Quakbot
2022-05-08 08:06:05d6474a8b4d4d526b8dc5b70ae25ab58dDLL dlln/a
Quakbot
2022-05-08 07:11:4056b086e7a5f3372f2203b2512b54e5e0DLL dllVirustotal results 44.62%
Quakbot
2022-05-08 07:10:4996110adb383a7a88d23ac3dc2251a107DLL dlln/a
Quakbot
2022-05-07 21:15:0038ad770f8403537ebf40f4c124a3336dDLL dllVirustotal results 44.12%
Quakbot
2022-05-07 08:30:054f7a41b2e72682c221b47563499bb77eDLL dlln/a
n/a
2022-05-06 23:14:45cc332c61f83042ed265981779ed8fb74DLL dlln/a
n/a