Skip to content Dark Web Informer - Cyber Threat Intelligence
IOC

IOC Alert: Suspicious Crypto-themed Command-and-Control Infrastructure

📖 Overview

A domain-based indicator has been identified that mimics the DODOEX decentralized exchange interface. The infrastructure is associated with potential botnet command-and-control (C2) operations, using a convincing crypto-trading front. Confidence is assessed at 100%.


📌 Key Details

FieldInformation
TypeDomain
Indicatorapp.dodloxex[.]com
Threat TypeBotnet C2
MalwareUnknown
Confidence100%
Date28 Sep 2025 – 16:15:37 UTC
Tagsc2
ReporterPamparam
ReferenceNone

🔎 URLScan Result


📡 Domain & Certificate Info

  • DNS A Records: 104[.]21[.]11[.]130, 172[.]67[.]149[.]60
  • DNS AAAA Records: 2606:4700:3034::6815:b82, 2606:4700:3030::ac43:953c
  • Recent Certificates:
    • C=US, O=Let's Encrypt, CN=R13 (Valid: 2025-08-27 → 2025-11-25)
    • C=US, O=Let's Encrypt, CN=R13 (Valid: 2025-08-27 → 2025-11-25)


🛡️ Defensive Guidance

  • Block app.dodloxex[.]com and its associated IP addresses at DNS, proxy, and endpoint levels.
  • Watch for outbound traffic attempting to beacon or interact with DODOEX-themed fake domains.
  • Alert on user activity involving suspicious crypto swap interfaces outside known trusted exchanges.
  • Track certificate transparency logs for additional domains impersonating cryptocurrency services.

⚠️ This IOC highlights the use of crypto-exchange lookalike pages as camouflage for malicious C2 infrastructure. Such setups are often used to lure victims into interacting with a familiar interface while backend traffic is leveraged for command-and-control purposes.

Latest