URLhaus Database

You are currently viewing the URLhaus database entry for http://193.233.175.123:4477/CheatClients/rate.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3661069
URL: http://193.233.175.123:4477/CheatClients/rate.exe
URL Status:Offline
Host: 193.233.175.123
Date added:2025-10-07 05:00:14 UTC
Last online:2025-12-15 07:XX:XX UTC
Threat:Malware download Malware download
Reporter: abusecat
Abuse complaint sent (?): Yes (2025-10-07 05:01:18 UTC to abuse{at}xorek[dot]cloud)
Takedown time:2 months, 9 days, 2 hours, 18 minutes Bad (down since 2025-12-15 07:20:06 UTC)
Tags:AgentTesla link botnet c2 java SheetRAT stealer trojan xmrig

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2025-12-14rate.exeexe 5eb5f76e34f39dc726619b00d1456961c39e1213ddf20507683c04b30bcd636bn/aSheetRAT
2025-10-16rate.exeexe 9d1fb38e9bf927463638cb8ddbf053ae9f8c4d7f6aa7e741b5ef06cccad167ffVirustotal results 61.97%AgentTesla
2025-10-15rate.exeexe 04f80286662d1e8fdf68ed2de555881545ff17d4d59ee10ebe59bef42446d606n/a 
2025-10-14rate.exeexe 8e8b30b90b73ff1776e14f4dd0750417fd50fb54664023cfeea22457b3594934Virustotal results 18.06%
2025-10-07rate.exeexe 3c52966cfe0cc44f32e780585af4cb43817797373706ab05086200b366199bd2Virustotal results 70.31%