MalwareBazaar Database

This page shows some basic information the YARA rule command_and_control including corresponding malware samples.

Database Entry


YARA Rule:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Firstseen:2022-06-22 15:06:58 UTC
Lastseen:2024-12-12 00:52:38 UTC
Sightings:3'479

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter