Help RSS API Feed Maltego Contact                        

Domain > stun.ipshka.com

More information on this domain is in AlienVault OTX

Is this malicious?

Reports

https://otx.alienvault.com/pulse/55d2323d4637f2170...    
https://pastebin.com/YTN2E70f    

Files that talk to stun.ipshka.com

MD5A/V
ae61532ac8bf4eec303f4a3649981626[Troj.Spy.W32.Zbot] [Upatre.FH]
7e9123c4463e61da51fb46e88268c74d[Upatre-FAAJ!F130B4C9581F] [Upatre.FN] [HB_Arkam] [Possible_Arkam] [Win32.Outbreak]
51fcb735c0184525fe43a81604b7364c[Upatre.FH] [PE:Malware.FakePDF@CV!1.9C28]
c35b37203859b9c0be0e3255a79ed64d[Downloader-FSH!C35B37203859] [Upatre.FH] [Trojan-Downloader:W32/Upatre.I] [Trojan/W32.Staser.25088] [Trojan.Upatre] [W32/Trojan3.MMA] [Downloader.Upatre] [Win32/Upatre.NGObQLD] [TROJ_DLOADR.NHG] [Trojan.Win32.Staser.argl] [Dropper.U.Banker.25088.A] [Trojan.DownLoader11.47386] [W32/Trojan.YLGE-8046] [TR/Yarwi.A.55] [Trojan/Win32.Staser] [TrojanDownloader:Win32/Upatre] [Trojan/Win32.Upatre] [Trojan.Win32.Staser.ab] [Win32/TrojanDownloader.Waski.A] [Win32.Trojan.Staser.Swkp] [Trojan.Win32.Staser] [W32/Staser.ARGL!tr]
fd020eab574a73011a8b9ae4854e59f6[Upatre.FE] [Virus.Win32.Heur.c] [BehavesLike.Win32.Autorun.nt]
0fd2f7ddd58255ad0df40fa81f12af9a[Upatre.FE] [HB_Arkam] [Virus.Win32.Heur.c] [Upatre-FAAJ!0FD2F7DDD582] [Trojan-Downloader.Win32.Upatre.efc] [TROJ_UPATRE.JSV] [Downloader.Upatre] [W32/Trojan.YQJA-5770] [Win32/TrojanDownloader.Waski.F]
53879fe4b430d1de9c91a8b795d5b174[Trojan.Upatre] [W32/Trojan3.LOV] [Downloader.Upatre] [TROJ_UPATRE.KB] [Trojan-Downloader.Win32.Upatre.cvq] [Trojan.Downloader.JREO] [Troj.Spy.W32.Zbot] [Trojan.DownLoader11.38000] [Troj/Upatre-GL] [W32/Trojan.DPIO-4771] [TR/Rogue.pdav] [Win32.Malware!Drop] [Win32/TrojanDownloader.Waski.A] [Trojan-Spy.Zbot] [Crypt3.AZQN] [Trojan.Win32.Waski.BA] [Trojan-Downloader/W32.Upatre.20480.D] [Trojan.Win32.DownLoader11.dhbsbc] [Win32/Upatre.McSVDGD] [TrojWare.Win32.Kryptik.CNYX] [BehavesLike.Win32.Downloader.mm] [TrojanDownloader:Win32/Upatre.AF] [Trojan.Win32.A.Downloader.20480.BSK] [Trojan/Win32.Downloader] [Win32.Trojan-downloader.Upatre.Suxr] [W32/Upatre.CVQ!tr] [Trojan.Win32.Upatre.Aoc] [Trojan.Win32.Waski.bA] [Luhe.Fi]
3da018eb13c949c35b4461c3494413b8
38f4f489bd7e59ed91dc6ff95f37999f[Artemis!38F4F489BD7E] [Artemis] [Packer.W32.Hrup] [Trojan/Win32.Battdil] [Trojan.Win32.Injector.bBNPH] [Win32/Trojan.Multi.daf] [Spyware.Dyre] [Win32.Malware!Drop] [Infostealer.Dyranges] [TSPY_DYRE.EKW] [Trojan.Win32.Inject.sbcn] [TrojWare.Win32.UMal.~A] [Trojan.DownLoader11.37287] [BehavesLike.Win32.Trojan.gh] [Troj/Fondu-BW] [TR/Samca.28819495] [Backdoor:Win32/Tobaconn.B] [Trojan.Win32.Inject] [Inject2.BAHD] [Trojan.Win32.Inject.aqlq] [Trojan.Zbot]
45156a1b0e47cf240034352f20113866[Upatre.FH] [Downloader-FSH!45156A1B0E47] [W32/Trojan.FSVL-1686] [BehavesLike.Win32.BadFile.mm] [Win32.Outbreak] [Trojan.Downloader.Small.ABNL] [Trojan.Upatre] [W32/Trojan3.MJY] [Downloader.Upatre] [Trojan-Downloader.Win32.Upatre.eda] [TR/Spy.ZBot.afde] [TrojanDownloader:Win32/Upatre] [Win32/TrojanDownloader.Waski.A] [Trojan.Win32.Waski.BA]
5c4c8f0162ecd49585742fba7eb92461[Upatre.FH]
ada5d2d02c60bac115368a7907c13a0b[PE:Malware.XPACK-LNR/Heur!1.5594] [BehavesLike.Win32.Downloader.nm]
2e71320f06f3c3cc89392ca616a236c2[BehavesLike.Win32.Downloader.mm]
a45c07c0a9c60c36404fc970af6ebd07[W32.HfsAutoA.26C4] [BehavesLike.Win32.MoonLight.pt] [Virus.Win32.Heur.c] [Trojan/W32.Staser.44032] [Trojan.Staser.r5] [Trojan.Email.FakeDoc] [Trojan.Win32.Staser.djrwxn] [W32/Trojan2.OMJL] [Downloader.Upatre] [Win32/Upatre.JYaDNOC] [TROJ_UPATRE.JGA] [Trojan.Win32.Staser.armm] [Trojan-Downloader:W32/Upatre.J] [Trojan.DownLoader11.46947] [W32/Trojan.FBCF-1781] [TR/Spy.ZBot.paww] [Trojan/Win32.Staser] [TrojanDownloader:Win32/Upatre] [Trojan/Win32.ZBot] [Upatre-FAAJ!A45C07C0A9C6] [Trojan.Win32.Staser.aek] [Win32/TrojanDownloader.Waski.F] [Win32.Trojan.Spy.Lkxg] [Trojan.Win32.Staser] [Win32.Outbreak]
55dc20067aa9e53a9a20a5d0054d945b[Downloader-FSH!55DC20067AA9] [Upatre.FH] [Trojan-Downloader:W32/Upatre.I] [Trj/Chgt.N]
6d78432c8a2b75cdcad147ac0066f4da[Upatre.FH] [Win32.Outbreak]
badd639ec640995221df714e528f2b9d[HB_Arkam] [Virus.Win32.Heur.c] [Trojan.Upatre] [Win32.Malware!Drop] [Downloader.Upatre] [TROJ_UPATRE.JUW] [Trojan.Win32.Staser.asaa] [Trojan-Downloader:W32/Upatre.J] [Trojan.DownLoader11.48965] [BehavesLike.Win32.MoonLight.pt] [TR/Crypt.ZPACK.112269] [TrojanDownloader:Win32/Upatre] [Trojan/Win32.Waski] [Upatre-FAAJ!BADD639EC640] [BScope.Malware-Cryptor.Mystig] [Win32/TrojanDownloader.Waski.F] [Trojan.Win32.Staser]
cc033a2a6b49d72e0f6c545e6be4963c[Trojan-Downloader/W32.Upatre.24064.C] [Trojan.Downloader.UPT] [W32/Trojan3.MAH] [Downloader.Upatre] [Upatre.FH] [TROJ_WASKI.FDR] [Trojan-Downloader.Win32.Upatre.dvv] [UnclassifiedMalware] [Trojan.DownLoader11.40959] [Troj/DwnLdr-LZW] [W32/Trojan.HXZW-8825] [TR/ATRAPS.A.2116] [TrojanDownloader:Win32/Upatre.BA] [Win32.Malware!Drop] [Trojan.Win32.Waski.bA] [Win32/TrojanDownloader.Waski.A] [Trojan-Downloader.Waski]
97ab139588ee98d140143f606115165e
fa5b8af51d1ed8dc791a337ee8979d6b

Whois

PropertyValue
Email andre@telegroup.com.ua
NameServer ROSE.NS.CLOUDFLARE.COM
Created 2006-11-16 00:00:00
Changed 2015-04-09 00:00:00
Expires 2016-11-16 00:00:00
Registrar ARSYS INTERNET, S.L.

DNS Resolutions

DateIP Address
2014-11-05193.28.184.4 (ClassC)

Subdomains

DateDomainIP
stun.ipshka.com2014-11-05193.28.184.4
View on OTX | View on ThreatMiner








Data with thanks to AlienVault OTX, VirusTotal, Malwr and others. [Sitemap]



� Copyright 2019 AlienVault, Inc. | Legal| Status| Do Not Sell My Personal Information