Help
RSS
API
Feed
Maltego
Contact
Domain > back.rooter.tk
×
This indicator is
referenced
in AlienVault OTX pulse ""
Is this malicious?
Yes
No
Most users have voted this as
MALICIOUS
Reports
http://researchcenter.paloaltonetworks.com/2015/11...
https://otx.alienvault.com/pulse/565622074637f2388...
Files that talk to back.rooter.tk
MD5
A/V
bfa8ea27da428443cd21f9eef92b495a
[
Exploit-CVE2012-0158.h!rtf
] [
Exploit.MSWord.CVE-2012-0158.bn
] [
Exp/20120158-A
] [
HEUR_RTFEXP.A
] [
Exploit.CVE-2012-0158.a
] [
Exploit/Cve-2012-0158
] [
MSOffice/CVE20120158.fam!exploit
] [
virus.exp.20120158
]
b79481d9dc8e95b9588699d327aa0657
4c37ec9f600ad90381df2ccdcb00b0e6
[
Shellcode.B
] [
Exploit.SWF.CVE-2013-0634.b
] [
Exploit.SWF.CVE-2013-0634
]
6fa591d04f39722b1b908fe6fe37afbf
3237cc3490bb2ffe4877b087fd71e7b9
[
Backdoor.Tebit.a
] [
Suspicious.Cloud.5
] [
Backdoor.Win32.Tebit.a
] [
Trojan.Win32.Tebit.ctsnch
] [
UnclassifiedMalware
] [
Trojan.DownLoader9.5935
] [
TR/Rogue.1472692
] [
Trojan[Backdoor]/Win32.Tebit
] [
W32/Trojan.UEIN-8641
] [
Backdoor.Tebit
] [
Backdoor.Win32.Tebit.auzs
] [
Backdoor.Win32.Tebit
] [
W32/Tebit.A!tr.bdr
]
Whois
Property
Value
Name
Fax:
Organization
Phone:
Address
E-mail:
NameServer
F1G1NS1.DNSPOD.NET