MalwareBazaar Database

This page shows some basic information the YARA rule command_and_control including corresponding malware samples.

Database Entry


YARA Rule:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Firstseen:2022-06-22 15:06:58 UTC
Lastseen:2025-11-17 13:41:11 UTC
Sightings:6'394

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter