Unloading MintsLoader IoCs Using DNS Intelligence
A sophisticated malware campaign leveraging MintsLoader is targeting critical infrastructure and legal firms across the U.S. and Europe. MintsLoader’s advanced techniques, including using a domain generation algorithm (DGA) to create new command-and-control (C&C) servers, make detection difficult.1
Building on the 61 indicators of compromise (IoCs) related to the ongoing MintsLoader attack identified by threat researchers at eSentire2, the WhoisXML API research team utilized our comprehensive DNS intelligence and uncovered additional artifacts comprising: