Authenticate for API access | If you are experiencing issues with receiving data from abuse.ch platforms via API, please ensure your requests are authenticated.
➡️ Read here for more info

MalwareBazaar Database

This page shows some basic information the YARA rule command_and_control including corresponding malware samples.

Database Entry


YARA Rule:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Firstseen:2022-06-22 15:06:58 UTC
Lastseen:2025-07-05 15:28:10 UTC
Sightings:5'101

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter