MalwareBazaar Database

This page shows some basic information the YARA rule command_and_control including corresponding malware samples.

Database Entry


YARA Rule:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Firstseen:2022-06-22 15:06:58 UTC
Lastseen:2024-04-25 01:26:10 UTC
Sightings:1'977

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter