URLhaus Database

You are currently viewing the URLhaus database entry for http://www.teamc2.duckdns.org/syslogs.sh which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3722831
URL: http://www.teamc2.duckdns.org/syslogs.sh
URL Status:flame Online (spreading malware for 22 days, 19 hours, 28 minutes)
Host: www.teamc2.duckdns.org
Date added:2025-12-02 05:20:36 UTC
Threat:Malware download Malware download
URLhaus blocklist:Blocked
Spamhaus DBL :Abused domain (malware)
SURBL :Blocked
Quad9 :Blocked
AdGuard :Blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: BlinkzSec
Abuse complaint sent (?): Yes (2025-12-02 05:21:20 UTC to report{at}abuseradar[dot]com)
Tags:botnetdomain mirai link sh ua-wget

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2025-12-13syslogs.shsh dc9c4bdeb4bc46033437f78cfc250e882eb3bfea33f3ce71e3ed814fb946636dn/aMirai
2025-12-13syslogs.shsh 11a15ab2eadb563867530c9a6d2b3a9569bbe4cd1464389ae99b2b64cc633bc4n/aMirai
2025-12-02syslogs.shsh bd48fb3dd067a827d6ea8ea03dccb6b9e2d48ff5d014d4ba2e8a7cb32fd25f9bVirustotal results 58.06%Mirai