Help RSS API Feed Maltego Contact                        

Domain > iicsdrd.com

More information on this domain is in AlienVault OTX

Is this malicious?

Reports

http://ransomwaretracker.abuse.ch/feeds/csv/    
https://otx.alienvault.com/pulse/56b2251167db8c168...    
https://otx.alienvault.com/pulse/56e85de34637f24cb...    
https://ransomwaretracker.abuse.ch/downloads/RW_UR...    
https://techhelplist.com/spam-list/1039-money-tran...    

Files that talk to iicsdrd.com

MD5A/V
a01d37a1ba32af8947db3359408faf21[Ransom.FileLocker] [Trojan.Cryptlock.N!g2] [BehavesLike.Win32.PWSZbot.dh]
95713fe27cf3d4ab43af566e836a6534[Trojan.Cryptlock.N!g2] [BehavesLike.Win32.Expiro.fh]
41661762466bbc7fd3a4886542f70f35
d35f8ac998d1ab023127ce95c88b4e6d[BackDoor-FDCH!D35F8AC998D1]
24677dec505cb7e2e2f91f476b8bc17e[Trojan.MalPack.PK] [BehavesLike.Win32.Virut.gh]
676fcfb2195d844c7aefce89c4e80068[RDN/Ransom] [Win32/Filecoder.TeslaCrypt.I] [Uds.Dangerousobject.Multi!c] [BehavesLike.Win32.Sality.hc] [TR/Crypt.Xpack.445332] [Ransom:Win32/Tescrypt] [Trojan/Win32.Teslacrypt] [Trj/TeslaCrypt.A] [Trojan.Win32.Filecoder] [Malicious_Behavior.VEX.99] [Trojan.Win32.TeslaCrypt.I]
e16fcc441c52abaabdf0299ce9f9c067[Mal/Ransom-EC] [Trojan/Win32.Teslacrypt]
1feb0edc49c0bf671f01d01e7adf6641
51f4e19a5af56e53fb310e5225e62820[Uds.Dangerousobject.Multi!c] [Trojan.Symmi.DEC96] [Mal/Ransom-EC] [Trojan/Win32.Teslacrypt]
da03f4e79364a9c817ee87b4a852d22f
7705d87ced655fa6a46055c2a21682a0[Artemis!7705D87CED65] [Ransom.CryptoWall] [Troj.Banker.W32.Shifu!c] [Trojan.Win32.Encoder.eadukr] [Trojan.Cryptolocker.N] [Trojan-Banker.Win32.Shifu.atv] [Trojan.Win32.U.Ransom.868352[h]] [Trojan.Encoder.3797] [Artemis] [TR/AD.TeslaCrypt.Y.198] [Ransom:Win32/Tescrypt.H] [Trojan/Win32.Teslacrypt] [Trj/CI.A] [Trojan.Win32.Injector] [W32/Shifu.ATV!tr] [Win32/Trojan.4f3]
daa35d0da3b98e054c1ba8f848918930[Win32/Filecoder.TeslaCrypt.I] [Ransom_CRYPTESLA.YUYAHL] [Trojan-Banker.Win32.Shifu.atw] [Trojan.Win32.U.TeslaCrypt.524288[h]] [Troj.Banker.W32.Shifu!c] [Trojan.Encoder.3801] [Ransom_CRYPTESLA.YUYAHL] [BehavesLike.Win32.Sality.hc] [W32/TeslaCrypt.I!tr] [Trojan.Cripack.1] [Trojan/Win32.Teslacrypt] [Artemis!DAA35D0DA3B9] [Trojan-Random.TeslaCrypt3] [Trj/RansomCrypt.E]
a3e3e0da87c9b12495731f75995bcb48
c2aafa02d36fd6cb0e513425869af77a
965e35b8c1f797372fc12dd69ab2cf74[Mal/Ransom-EC] [Trojan/Win32.Teslacrypt]
c5bb44f96a9528e38f269953706350b3
e074d377c476fd85af72a6b5b89c70f5[Artemis!E074D377C476] [Suspicious.Cloud.2] [Win32/Filecoder.TeslaCrypt.I] [BehavesLike.Win32.Sality.hc] [Trojan.Symmi.DEC96] [Trojan/Win32.Teslacrypt]
ea1d5fc176c61ba1c990ffb618f4fca6[Troj.Banker.W32.Shifu!c] [Trojan.Cripack.1] [Trojan-Banker.Win32.Shifu.aua] [Win32.Trojan.Bp-dropperv.Bzmy] [Trojan.AVKill.59847] [BehavesLike.Win32.FakeSecTool.hc] [TR/Crypt.Xpack.445448] [Trojan[Banker]/Win32.Shifu] [Ransom:Win32/Tescrypt] [Trojan/Win32.Teslacrypt] [Win32/Filecoder.TeslaCrypt.I] [Trojan.Win32.Filecoder] [Malicious_Behavior.VEX.99] [FileCryptor.GUQ]
a32dfbffac8ac42de7364239953282ce[TR/Crypt.Xpack.445558] [Win32/Kryptik.ENJR] [Trojan.Cryptolocker.N] [W32/Kryptik.ENFX!tr] [Ransom*Win32/Tescrypt.E] [Trojan.MalPack.PK] [Trojan.Win32.Crypt] [Trojan-Ransom.Win32.Bitman.hxk] [TROJ_FORUCON.BMC] [Mal/Wonton-BZ] [Trojan.Encoder.3813]
c2c337b603020dc1a7de7acbe12b7f1b[Trojan.Rovnix.C] [Trojan.Rovnix.C] [Trojan.Encoder.3813] [Trojan.Rovnix.C] [Troj/Ransom-CDI] [Trojan-Ransom.Win32.Bitman.ibq] [Trojan.Win32.Crypt] [Trojan.Rovnix.C] [Trojan.MalPack.PK] [Trojan.Rovnix.C] [Ransom*Win32/Tescrypt.E] [Trojan.Rovnix.C] [Malicious_Behavior.VEX.93] [Trojan.Cryptolocker.N] [Crypt5.AHIX] [Win32/Kryptik.ENJR] [Trojan.Rovnix.C] [TR/Crypt.Xpack.445555]

Whois

PropertyValue
NameServer NS2.SITE4NOW.NET
Created 2007-11-29 00:00:00
Changed 2015-12-06 00:00:00
Expires 2016-11-29 00:00:00
Registrar GODADDY.COM, LLC